Event Agenda

October 1st- 2nd 2024 // Chicago, Illinois

Register Now

Event Agenda

October 1st- 2nd 2024 // Chicago, Illinois

Register Now

We are currently working on the 2024 agenda and will be updating it soon. In 2024, the conference will be held on October 1st- 2nd.

2023 agenda listed below.

Day 1 // October 3rd 2023
08:00 – 05:30 (CT)
08:00Coffee & Registration 
08:50Chairmans Opening Address

Sachin Shah,, OT/ICS Cyber Security Architect, Applied Materials
09:00Panel Discussion: Addressing the Risk of the Evolving Threat Landscape Targeting Industrial Environments
.

  • How are you identifying vulnerabilities in industrial environments? What steps can be taken to enable end-to-end visibility?
  • How are you prioritizing risk mitigation efforts?
  • How are you protecting vulnerable and unpatched OT systems from exploitation while keeping plants running?

Moderator: Derek Harp, Founder & Chairman, Control System Cyber Security Association International
Peter Zwieryznski, Director of Information Security, Koppers
Keon Mcewen, Global Lead, SOC, Industrial Cybersecurity, ABS Group
Dennis Reitz, Head of Manufacturing & Lab Security, Takeda
Gabe Authier, CPO, Industrial Defender

09:40Presentation: Reduce Risk, Gain Operational Insights while Protecting Operational Technology

To protect the critical infrastructure in manufacturing, industrial organizations need to harness the power of segmentation to secure their resources, systems, and users, as well as minimize the risk of attackers gaining access to their critical infrastructure. Keeping production systems secure requires attention and planning. Employing the principles of network segmentation for production environments can reduce risk and provide operational benefits while securing the mix of modern and legacy systems used in OT environments.
.
Christopher Blauvelt, Director, OT Consulting Systems Engineer, Fortinet
10:20Presentation: Advancing the Security and Resilience of ICS through Stakeholder Engagement and Collaboration

Nitin Natarajan, Deputy Director, CISA
10:50Networking Break 
TRACK A
Track A Chair

Sachin Shah,, OT/ICS Cyber Security Architect, Applied Materials
11:30Presentation: Reducing Cybersecurity Risk on the Shop Floor

In this session we will cover vulnerabilities, risk evaluation and the various decision criteria used to remediate or mitigate them.
.
– Dwayne Edwards, Senior Security Engineer, Tenable
12:00Presentation: Dealing with Disruption: Balancing Digitalization with Security

• Considerations for evaluating business investments in emerging manufacturing technologies, industry 4.0 and connected products.
• Practical advice to enhance the cybersecurity profile at strategic levels to ensure it receives recognition, attention and resources.
• Lessons learned and security best practices to be adopted following the acceleration towards digital.
.
– Lana Davenport, CISO, Sylvamo
12:30Presentation: Reducing the Complexities of Building an Automated Global OT Asset Inventory

Managing Operational Technology assets is a daunting task that has been traditionally bogged down by manual processes and outdated tools like Excel spreadsheets. In this 10-minute presentation, we showcase a solution that automates the creation and management of OT asset inventories. We’ll explore how this solution not only replaces outdated methods but sets a new gold standard for OT asset management. From automated data collection to real-time vulnerability tracking, discover how OTbase provides a comprehensive, automated approach to building your OT asset inventory.
.
– TaVonne Harris, VP Sales, Langner
Track B
Track B Chair

Dennis Reitz, Head of Manufacturing & Lab Security, Takeda
11:30Presenting Sponsor: Choosing the Right Security Partner for Your OT Network Infrastructure

In the era of heightened cyber threats, securing Operational Technology (OT) networks is a top priority for organizations. This presentation delves into the crucial process of selecting the optimal security partner for safeguarding your OT network infrastructure. It outlines the distinct challenges posed by OT environments, offers insights into key considerations for choosing the right partner, and emphasizes the significance of a well-informed decision. By aligning your organization with a capable security partner, you can enhance the resilience and protection of your OT network infrastructure in an increasingly interconnected world.
.
Jason Diesel, Senior Solutions Architect, TXone
12:00Presentation: Designing Cybersecurity Strategies for the Future

  • How to evolve cybersecurity maturity by integrating people, process and technology
  • How to define the business’ cyber risk-appetite statement based on identified exposures, and how to translate it to a dashboard that enables management to oversee and steer transformation
  • Considerations on enhancing the role of the CISO within a manufacturing company

Chris McLaughlin, CISO, Johns Manville
.

12:30Presentation: Prevent First! Move Beyond Detection! Zero-Trust PLC Protection from Insiders, Third-Party Providers, and Human Errors

Manufacturing and industrial companies today are adopting IT best practices to safeguard their OT environments. However, what proves effective for IT doesn’t necessarily translate to OT, demanding the implementation of an OT-focused approach.
.
Although IDS solutions have found widespread deployment for providing visibility and post-incident anomaly detection in OT environments, their scope falls short. While network visibility retains its significance, protecting OT devices (and particularly PLCs) emerges as paramount. Embracing a device-level zero-trust mechanism stands out as the most fitting strategy. A passive prevention approach that does not affect performance and avoids production disruption becomes imperative. In this discourse, Jay Smilyk, General Manager of the Americas at NanoLock Security, will delve into how the zero-trust mechanism can be applied to OT devices and how it can prevent production shutdown.
.
Jay Smilyk, GM of the Americas, Nanolock Security
Plenary Sessions
12:40Seated Lunch Hosted by Fortinet
Track A
01:40Presentation: Cybersecurity Resilience in Manufacturing: A Process-Driven Approach to Zero Trust

In today’s dynamic manufacturing landscape, the convergence of OT and IT has become more pronounced than ever. While having effective, zero-trust solutions is essential, establishing and adhering to robust cybersecurity policies and compliance standards are critical to safeguarding manufacturing facilities. This session will focus on a process-driven approach to address vulnerabilities within manufacturing environments – primarily files, devices, and networks as they are the common entry points for cyber threats. Further, we will explore the labor-intensive nature of OT security processes, which can introduce vulnerabilities due to human error and impact both digital and physical systems.
.
Jason Morris, Area Sales Director at OPSWAT specializing in the manufacturing sector, will cover the strategies for mitigating these vulnerabilities, guide the audience in understanding their unique risk tolerance and threat landscape, and provide insights on tailoring policies that suit manufacturing environments that address vulnerabilities at the file, device, and network entry points.
.
Jason Morris, Area Sales Director, Opswat
02:10Case Study: Securing our Production Facilities: Integrating Security in Our Plants

Join this session as we share some lessons learned through leading a cross-functional team across Manufacturing Engineering, Manufacturing Operations, GMIT, and Global Telecom tasked with developing, deploying, and sustaining cybersecurity controls globally at GM’s manufacturing facilities.
Jorge Ramirez, Global Director of Manufacturing & Chief Manufacturing Cybersecurity Officer, General Motors
.
02:40Presenting Sponsor: Out of Sight, out of Control: How to Overcome your IT and OT Asset Visibility and Security Challenges
With digital transformation and the explosion of connected assets, security teams now have a blind spot into what devices are actually on their network, and what risks they bring. Join Rob Ravenscroft, Principal, Security and Architecture Engineering, Battelle and Bryan Gillson, Head of Vertical Market Strategy, Ordr as they discuss practical strategies for securing every “thing” that’s connected to the network. The presenters will discuss how to advance from visibility to use cases such as vulnerability management, identification of security coverage gaps and malicious communications, to accelerating network access control.
.

  • Digital transformation and IT/OT convergence
  • Key IT/OT asset visibility challenges faced
  • Current maturity around adoption of asset management and security solutions
  • Successful strategies and solutions for managing infrastructure sprawl
  • Considerations for moving beyond visibility to advanced security and segmentation use cases

Rob Ravenscroft, Principal, Security Architecture and Engineering, Battelle
Bryan Gillson, Head of Vertical Market Strategy, Ordr

Track B
01:40Presentation: Building Cyber Resilience Into OT / ICS Systems

OT and ICS engineers understand the critical importance of preventing production line outages. Continuous uptime of OT / ICS is essential to profitability, satisfied customers, and a smoothly flowing supply chain. Averting outages requires the ability to anticipate and fend off failures in every part of the process, regardless of the potential source of the problem. A stubborn weak link can be found in the computers that control OT/ ICS, which are vulnerable to a variety of ills, including cyberattacks, hardware component failures, software glitches, and human errors. Join Michael Bova, Acronis expert on cybersecurity and business continuity in OT / ICS environments for an examination of:

  • The range of vulnerabilities that afflict OT / ICS computers
  • Various technology, process and people-oriented approaches to addressing OT computer downtime
  • Case studies of manufacturers who have successfully addressed these challenges to reduce OT computer outages to a matter of minutes

Michael Bova, Enterprise Account Executive, Acronis

02:10Presentation: Enabling Successful Third Party Risk Management Programs

Join this talk as we share some important lessons learned through running a third party risk management program and practical advice on how to do so successfully, e.g. defining requirements for third-party cyber risk management upfront, increasing monitoring and assurance activity over third-parties, and visiting third-party locations.
.
Beth Schulte, CISO, Louisiana Pacific Corp
02:40Presentation: Remote Operations and Reduced Attack Surface? The Best of Both Worlds

While the adoption of remote operations is increasing so is the overall attack surface of the plant floor. Recognizing these risks is the first step in securing critical operations while effectively preventing intrusions.  In this session you’ll learn about the overall plant floor attack surface as well as:

  • How to discover and manage remote access risk
  • Demystifying “zero-trust” into actionable tasks, and
  • Tackling conflicting priorities of operations and cyber security

With real world examples and concrete steps to continue your remote operations journey.
.
Ron Fabela, Field CTO, Xona Systems

Plenary Sessions
03:10Plenary Sponsor: Manufacturing Cybersecurity - Common Missteps

There are so many technology companies telling how their products can mitigate the cybersecurity risk. Although these claims may be true, if not implemented within a defined and well planned OT Cybersecurity Program the results will be disappointing. In this session, we will discuss leading Manufacturing Cybersecurity mistakes that result in missing deadlines, increasing costs, frustrating stakeholders, and ultimately leaving the plant floor vulnerable to cyberattacks despite the efforts.
.
Preston Futrell, Partner, IBM
03:40Networking Break 
04:10Roundtables: Choose from 1 of 5 Roundtable Topics

Delegates will split into groups, each making up a roundtable to discuss a specific issue and exchange ideas and experiences related to it. A moderator will be facilitating the discussion at every table:T1. Managing Increased OT Security Risks with IT/OT Convergence & Digitalization Initiatives.
Roger Hill, Sr Director OT Security, Kudelski Security
.
T2. What’s a Threat to You? Overview of the Recent Threat Landscape Against OT Environments and How to Improve the ICS/OT Security Posture
Andy Wilpizeski, Senior Solutions Architect, Dragos
.
T3. Data-Centric Approach to a Resilient System Defining Threat Versus Risk Analytics
Anthony Pierce, Security Field CTO, Splunk
.
T4. Detect, Defend, Deny: From OT Visibility to Instant Containment
Ritesh Agrawal, Founder & CEO, Airgap Networks
.
T5. Manufacturing in the Cloud: Safeguarding Your Data and Operations
Joe Moles, SVP Customer Security Operations, Red Canary
04:50Panel Discussion: Establishing Trust after Manufacturing’s Cloud Migration

Cloud applications are currently driving the global economy, and new manufacturing operation systems are being developed and connected to the cloud. However, more web-based applications and data in the cloud also means higher cyber risk. Join our panellists as they discuss:

  • How can you gain maximum visibility to protect your data in the cloud?
  • What are in your opinion the top 3 steps to establishing digital trust?
  • How do IT/OT need to work together to address the risks deriving from cloud migration?

Moderator: Sandra Parker, Director, Manufacturing Cybersecurity, Dow
Sachin Shah,
OT/ICS Cyber Security Architect, Applied Materials
Lana Davenport, CISO, Sylvamo
Eric Clauss, VP Global IoT Sales, Keyfactor
Amit Pawar, VP of Consulting and Services, Xage Security

05:30Closing Remarks
05:30Drinks Reception
07:00Dinner hosted by Palo Alto Networks (Invite only)

Register Now

Choose Your Pass

Join the Line-Up

Submit a Proposal

Request a Sponsor Pack

Access Here