Event Agenda
October 1st- 2nd 2024 // Chicago, Illinois
We are currently working on the 2024 agenda and will be updating it soon. In 2024, the conference will be held on October 1st- 2nd.
2023 agenda listed below.
Day 1 // October 3rd 2023 08:00 – 05:30 (CT) |
|
08:00Coffee & Registration | |
08:50Chairmans Opening Address – Sachin Shah,, OT/ICS Cyber Security Architect, Applied Materials |
|
09:00Panel Discussion: Addressing the Risk of the Evolving Threat Landscape Targeting Industrial Environments .
– Moderator: Derek Harp, Founder & Chairman, Control System Cyber Security Association International |
|
09:40Presentation: Reduce Risk, Gain Operational Insights while Protecting Operational Technology To protect the critical infrastructure in manufacturing, industrial organizations need to harness the power of segmentation to secure their resources, systems, and users, as well as minimize the risk of attackers gaining access to their critical infrastructure. Keeping production systems secure requires attention and planning. Employing the principles of network segmentation for production environments can reduce risk and provide operational benefits while securing the mix of modern and legacy systems used in OT environments. . – Christopher Blauvelt, Director, OT Consulting Systems Engineer, Fortinet |
|
10:20Presentation: Advancing the Security and Resilience of ICS through Stakeholder Engagement and Collaboration – Nitin Natarajan, Deputy Director, CISA |
|
10:50Networking Break |
TRACK A | |
Track A Chair – Sachin Shah,, OT/ICS Cyber Security Architect, Applied Materials |
|
11:30Presentation: Reducing Cybersecurity Risk on the Shop Floor In this session we will cover vulnerabilities, risk evaluation and the various decision criteria used to remediate or mitigate them. . – Dwayne Edwards, Senior Security Engineer, Tenable |
|
12:00Presentation: Dealing with Disruption: Balancing Digitalization with Security • Considerations for evaluating business investments in emerging manufacturing technologies, industry 4.0 and connected products. • Practical advice to enhance the cybersecurity profile at strategic levels to ensure it receives recognition, attention and resources. • Lessons learned and security best practices to be adopted following the acceleration towards digital. . – Lana Davenport, CISO, Sylvamo |
|
12:30Presentation: Reducing the Complexities of Building an Automated Global OT Asset Inventory Managing Operational Technology assets is a daunting task that has been traditionally bogged down by manual processes and outdated tools like Excel spreadsheets. In this 10-minute presentation, we showcase a solution that automates the creation and management of OT asset inventories. We’ll explore how this solution not only replaces outdated methods but sets a new gold standard for OT asset management. From automated data collection to real-time vulnerability tracking, discover how OTbase provides a comprehensive, automated approach to building your OT asset inventory. . – TaVonne Harris, VP Sales, Langner |
Track B | |
Track B Chair – Dennis Reitz, Head of Manufacturing & Lab Security, Takeda |
|
11:30Presenting Sponsor: Choosing the Right Security Partner for Your OT Network Infrastructure In the era of heightened cyber threats, securing Operational Technology (OT) networks is a top priority for organizations. This presentation delves into the crucial process of selecting the optimal security partner for safeguarding your OT network infrastructure. It outlines the distinct challenges posed by OT environments, offers insights into key considerations for choosing the right partner, and emphasizes the significance of a well-informed decision. By aligning your organization with a capable security partner, you can enhance the resilience and protection of your OT network infrastructure in an increasingly interconnected world. . – Jason Diesel, Senior Solutions Architect, TXone |
|
12:00Presentation: Designing Cybersecurity Strategies for the Future
– Chris McLaughlin, CISO, Johns Manville |
|
12:30Presentation: Prevent First! Move Beyond Detection! Zero-Trust PLC Protection from Insiders, Third-Party Providers, and Human Errors Manufacturing and industrial companies today are adopting IT best practices to safeguard their OT environments. However, what proves effective for IT doesn’t necessarily translate to OT, demanding the implementation of an OT-focused approach. . Although IDS solutions have found widespread deployment for providing visibility and post-incident anomaly detection in OT environments, their scope falls short. While network visibility retains its significance, protecting OT devices (and particularly PLCs) emerges as paramount. Embracing a device-level zero-trust mechanism stands out as the most fitting strategy. A passive prevention approach that does not affect performance and avoids production disruption becomes imperative. In this discourse, Jay Smilyk, General Manager of the Americas at NanoLock Security, will delve into how the zero-trust mechanism can be applied to OT devices and how it can prevent production shutdown. . – Jay Smilyk, GM of the Americas, Nanolock Security |
Plenary Sessions | |
12:40Seated Lunch Hosted by Fortinet |
Track A | |
01:40Presentation: Cybersecurity Resilience in Manufacturing: A Process-Driven Approach to Zero Trust In today’s dynamic manufacturing landscape, the convergence of OT and IT has become more pronounced than ever. While having effective, zero-trust solutions is essential, establishing and adhering to robust cybersecurity policies and compliance standards are critical to safeguarding manufacturing facilities. This session will focus on a process-driven approach to address vulnerabilities within manufacturing environments – primarily files, devices, and networks as they are the common entry points for cyber threats. Further, we will explore the labor-intensive nature of OT security processes, which can introduce vulnerabilities due to human error and impact both digital and physical systems. . Jason Morris, Area Sales Director at OPSWAT specializing in the manufacturing sector, will cover the strategies for mitigating these vulnerabilities, guide the audience in understanding their unique risk tolerance and threat landscape, and provide insights on tailoring policies that suit manufacturing environments that address vulnerabilities at the file, device, and network entry points. . – Jason Morris, Area Sales Director, Opswat |
|
02:10Case Study: Securing our Production Facilities: Integrating Security in Our Plants Join this session as we share some lessons learned through leading a cross-functional team across Manufacturing Engineering, Manufacturing Operations, GMIT, and Global Telecom tasked with developing, deploying, and sustaining cybersecurity controls globally at GM’s manufacturing facilities. – Jorge Ramirez, Global Director of Manufacturing & Chief Manufacturing Cybersecurity Officer, General Motors . |
|
02:40Presenting Sponsor: Out of Sight, out of Control: How to Overcome your IT and OT Asset Visibility and Security Challenges With digital transformation and the explosion of connected assets, security teams now have a blind spot into what devices are actually on their network, and what risks they bring. Join Rob Ravenscroft, Principal, Security and Architecture Engineering, Battelle and Bryan Gillson, Head of Vertical Market Strategy, Ordr as they discuss practical strategies for securing every “thing” that’s connected to the network. The presenters will discuss how to advance from visibility to use cases such as vulnerability management, identification of security coverage gaps and malicious communications, to accelerating network access control. .
–Rob Ravenscroft, Principal, Security Architecture and Engineering, Battelle |
Track B | |
01:40Presentation: Building Cyber Resilience Into OT / ICS Systems OT and ICS engineers understand the critical importance of preventing production line outages. Continuous uptime of OT / ICS is essential to profitability, satisfied customers, and a smoothly flowing supply chain. Averting outages requires the ability to anticipate and fend off failures in every part of the process, regardless of the potential source of the problem. A stubborn weak link can be found in the computers that control OT/ ICS, which are vulnerable to a variety of ills, including cyberattacks, hardware component failures, software glitches, and human errors. Join Michael Bova, Acronis expert on cybersecurity and business continuity in OT / ICS environments for an examination of:
– Michael Bova, Enterprise Account Executive, Acronis |
|
02:10Presentation: Enabling Successful Third Party Risk Management Programs Join this talk as we share some important lessons learned through running a third party risk management program and practical advice on how to do so successfully, e.g. defining requirements for third-party cyber risk management upfront, increasing monitoring and assurance activity over third-parties, and visiting third-party locations. . – Beth Schulte, CISO, Louisiana Pacific Corp |
|
02:40Presentation: Remote Operations and Reduced Attack Surface? The Best of Both Worlds While the adoption of remote operations is increasing so is the overall attack surface of the plant floor. Recognizing these risks is the first step in securing critical operations while effectively preventing intrusions. In this session you’ll learn about the overall plant floor attack surface as well as:
With real world examples and concrete steps to continue your remote operations journey. |
Plenary Sessions | |
03:10Plenary Sponsor: Manufacturing Cybersecurity - Common Missteps There are so many technology companies telling how their products can mitigate the cybersecurity risk. Although these claims may be true, if not implemented within a defined and well planned OT Cybersecurity Program the results will be disappointing. In this session, we will discuss leading Manufacturing Cybersecurity mistakes that result in missing deadlines, increasing costs, frustrating stakeholders, and ultimately leaving the plant floor vulnerable to cyberattacks despite the efforts. . – Preston Futrell, Partner, IBM |
|
03:40Networking Break | |
04:10Roundtables: Choose from 1 of 5 Roundtable Topics Delegates will split into groups, each making up a roundtable to discuss a specific issue and exchange ideas and experiences related to it. A moderator will be facilitating the discussion at every table:T1. Managing Increased OT Security Risks with IT/OT Convergence & Digitalization Initiatives. – Roger Hill, Sr Director OT Security, Kudelski Security . T2. What’s a Threat to You? Overview of the Recent Threat Landscape Against OT Environments and How to Improve the ICS/OT Security Posture – Andy Wilpizeski, Senior Solutions Architect, Dragos . T3. Data-Centric Approach to a Resilient System Defining Threat Versus Risk Analytics – Anthony Pierce, Security Field CTO, Splunk . T4. Detect, Defend, Deny: From OT Visibility to Instant Containment – Ritesh Agrawal, Founder & CEO, Airgap Networks . T5. Manufacturing in the Cloud: Safeguarding Your Data and Operations – Joe Moles, SVP Customer Security Operations, Red Canary |
|
04:50Panel Discussion: Establishing Trust after Manufacturing’s Cloud Migration Cloud applications are currently driving the global economy, and new manufacturing operation systems are being developed and connected to the cloud. However, more web-based applications and data in the cloud also means higher cyber risk. Join our panellists as they discuss:
– Moderator: Sandra Parker, Director, Manufacturing Cybersecurity, Dow |
|
05:30Closing Remarks |
|
05:30Drinks Reception |
|
07:00Dinner hosted by Palo Alto Networks (Invite only) |