Event Agenda
October 1st- 2nd 2024//
Chicago, Illinois
Day 2 // October 4th 2023 08:15 – 04:10 (CT) |
|
07:30Breakfast hosted by Veracity (Invite only) | |
08:15Registration and Coffee | |
08:50Chairman’s Opening Address | |
09:00Panel Discussion: How to Establish a World-Class Cybersecurity Program for Manufacturing Companies .
– Moderator: Stephen Davis, CISO, Revlon |
|
09:40Presentation: Best Practices to Manage OT Assets to Ensure Operational Continuity Join this session and learn how to overcome the challenges of limited visibility and operational inefficiencies that manual processes impose on manufacturers. You will learn about solutions to connect systems, people and processes—eliminating blind spots and maximizing productivity. . –Karan Shrivastava, Director of Product Management, ServiceNow |
|
10:10Keynote Plenary: What You Need to Know About the Latest Cybersecurity Threats In this keynote, Morgan Adamski, Director Cybersecurity Collaboration Center, NSA shares lessons learned from sharing cybersecurity threat information with defense industrial base companies, and how manufacturing companies can take such lessons on board to ultimately protect their assets. . – Morgan Adamski, Director Cybersecurity Collaboration Center, NSA |
|
10:40Networking Break |
Track A | |
11:20Presentation: Securing Remote Application Control in the Age of Industry 4.0 The pandemic brought big challenges to industries, making it hard for owners to keep things going safely and efficiently with fewer people around. They had to use remote ways to connect, like VPNs and creative firewall rules. This worked well, but it also opened many new attack vectors.Now, companies have more complicated systems with lots of people, data, and devices all connected. It’s not easy to keep everything safe. We will talk about smart ways to protect these systems, including consolidated and effective access methods and trust rules. These are crucial for making sure our digital changes work well and stay safe in the Industry 4.0 world. . – Joe O’Donnell, GM OT / IoT-SVP Corporate Development, Cyolo |
|
11:50Presentation: How to Design an OT Security Program: Lessons Learned Join this session as we review different frameworks that can be used for designing an OT security program: IEC 62443, SANS 5 ICS cybersecurity critical controls, Cybersecurity Framework Version 1.1 Manufacturing Profile… And how we designed one within Ingevity and what we learned from the process. . – Derek Anderson, Manager OT Cybersecurity, Ingevity |
|
12:20Presentation: Zero Trust Security for Zero Operational Downtime OT environment vulnerability and exposure to threats are at an all-time high which will only accelerate going forward. CXOs face a precarious balancing act of maintaining availability, uptime, and safety while deploying and maintaining world-class security. Attend to learn how Palo Alto Networks has helped clients with their zero trust security journey in OT environments. space – Del Rodillas, Senior Director of Product Management, Industrial Cybersecurity, Palo Alto Networks |
Track B | |
11:20Presentation: Moving Past Network Visibility: How to Improve Your Overall Cybersecurity Program Network visibility is a common starting point for many operational entities, but is limited in the depth and breadth of endpoint data it can collect. It also can leave significant gaps in accurate risk analysis efforts and is why more and more organizations are adopting targeted endpoint solutions. By going directly to the assets themselves, organizations worldwide are gaining significant, multidimensional visibility into OT environments that enable context specific risk indicators that, in turn, allow for the development of targeted, appropriate, and OT-safe procedures to mitigate risks. space In this session, Verve CEO, John Livingston, will discuss: space
– John Livingston, CEO, Verve |
|
11:50Presentation: Mitigating the Supply Chain Ripple Effect: Our Approach to Third Party Risk Join this talk as we shed light on our journey of updating security to work cross-functionally throughout our organisation in order to accept a reasonable level of third party risk. . – Paige Lambert, Sr Manager, Information Risk Management, Kimberly-Clark Corporation |
|
12:20Presentation: OT/IT Convergence, Cybersecurity Sweet Spots What matters the most to cybersecurity when you’re facing a planned or unplanned convergence of OT and IT? In this era of competing priorities, a few basic underlying cybersecurity truths still exist. Join this session to cut through the noise and understand the true ballast points of cybersecurity that will help you plan and act accordingly in a converged environment. space – Jason Rivera, Director Cybersecurity Consulting, Security Risk Advisors |
– | |
12:30Seated Lunch Hosted by ServiceNow |
Track A | |
01:30Case Study: Aligning Enterprise Cyber Risk and Business Strategy: Lessons from the Field Aligning your cybersecurity posture with business objectives is essential to protect your business against cyber attacks. But how do we get there? In this session, we share actionable insights on: space
–Ahmeed Ahmeed, Director Cyber and Information Security, Inteva Products |
|
02:00Presentation: The Evolution of OT Security Towards Cyber-Physical Risk Management In this presentation Yair will take us on a journey through time from 1784 right up to today and what security controls have been put in place to protect our physical systems, now interconnected, cyber-physical. He will paint a picture that will logically demonstrate that focusing on risk, and then creating mitigations by having contextual understanding of the physical environments with OT is the next step in security evolution. He will talk about the journey of OTORIO’s founder’s as being part of the Israeli IDF and creation of the Iron Dome to protect their citizens from physical attack to the idea of protection of cyber physical systems in the same contextual way. Yair will leave the audience with top 5 actions to ensure operational security with an emphasis of building a OT risk and security program. space – Yair Attar, CTO & Co-founder, OTORIO |
|
02:30Fireside Chat: How to Get IT and OT to Work Together on an OT Security Program Strong leadership from key stakeholders is necessary to ensure that both IT and OT collaborate, and use best practices and tools available to them. Join this conversation as our experts share their first-hand experience with:
– Moderator: Stephen Davis, CISO, Revlon |
Track B | |
01:30Case Study: From Siloed Environment to Global OT Security: Takeda’s Journey Join this talk as we discuss how we moved away from a siloed environment through implementing a global approach to OT security, different from that towards IT security but working seamlessly together. We’ll walk you through the milestones of a 4-5 year journey where we built not only the foundational technology, but also governance and processes. Finally, we’ll share some lessons learned and considerations on how our approach might change if we had to start from scratch. space -Dennis Reitz, Head of Manufacturing & Lab Security, Takeda |
|
02:00Presentation: Leveraging a Managed Services Company to Help Bridge the OT Cyber Security Skills Gap This presentation aims to remove some of the hesitancy or trepidation around utilising a Managed Services Provider to address the lack of skill set and gap in knowledge prevalent in OT cybersecurity. By covering how an MSSP can address an organisation’s security posture, there will be valuable points brought to bear on utilising an MSSP for anything from staff augmentation to full-blown, three-tiered services in a Managed SOC situation. Attention will be paid to the economics of leveraging an OT MSSP as well. . – Ken Dohan, Sr. Director, OT Cyber & MSSP, Americas, Cybolt |
|
02:30Fireside Chat: Increasing Organizational Resiliency through Solid Incident Response Plans
– Moderator: Sandra Parker, Director, Manufacturing Cybersecurity, Dow |
Plenary Sessions | |
03:00Networking Break | |
03:30Roundtables: Choose from 1 of 5 Roundtable Topics . T1. Should we leverage existing IT policies and processes and apply them to OT, or do OT completely separately? – Sachin Shah, OT/ICS Cyber Security Architect, Applied Materials . T2. How do you choose a framework to design your OT security program? – Derek Anderson, Manager OT Cybersecurity, Ingevity . T3. Building the business case in today’s economy: how do we get buy-in from executive leadership? – Peter Zwieryznski, Director of Information Security, Koppers . T4. Secure Perspectives: Discussion on Key Findings of the 2023 (CS)2AI-KPMG Control System Cybersecurity Report – Derek Harp, Founder & Chairman, Control System Cyber Security Association International . T5. Breach & Attack Simulation: Adopting a Threat-Informed Approach to Defense – Bri Rolston, Senior Cybersecurity Researcher, Control Idaho National Laboratory |
|
04:10Group Discussion: A People-Centric Approach to Cyber Security: Steps to Support Successful Outcomes .
– Moderator: Cathy Olsen, CISO, Packsize |
|
04:50End of Conference |