Loading…
This event has ended. Visit the official site or create your own event on Sched.
6th Annual Industrial Control Cyber Security USA Conference with the Cyber Senate - Register here 
www.industrialcontrolcybersecusa.com

Questions or help get in touch at marketing@cybersenate.com
All our events can be viewed here www.cybersenate.com/new-events
Tuesday, September 24
 

8:00am EDT

Breakfast and welcome from the Cyber Senate
Director James Nesbitt
Introduction to our Chairman and Moderator

Speakers
avatar for Chris Blask

Chris Blask

Global Director Industrial and IoT Security, Unisys
Mr. Blask’s career spans the breadth of the cybersecurity spectrum for more than 25 years. He invented one of the first commercial firewall products, built a multi-billion dollar firewall business at Cisco System, co-founded an early SIEM vendor, and authored the first book on SIEM... Read More →
avatar for James Nesbitt

James Nesbitt

Director and Founder, Cyber Senate
Industrial Control Cyber Security Events Founder, Advisor, Podcaster. Industry 4.0 professional. James has over 20 years of engagement with critical infrastructure industries spanning Europe and North America, assessing their challenges in developing and defining cyber resilience... Read More →


Tuesday September 24, 2019 8:00am - 8:30am EDT
Mystic Dunes Resort

8:30am EDT

Keynote Panel: The Current State of ICS Maturity and Awareness
    • How mature is cybersecurity in ICS? 
    • Are we articulating cyber risk appropriately?
    • Are we seeing a shift in C Level awareness? 
    • Is regulation pushing the sector forward?
    • Are investments in cyber infrastructure ramping up?
    • How are we collectively meeting the challenges of the ageing workforce and terminology barriers?
    • Is security still seen as a hindrance? How can we move past this perception?

Speakers
avatar for Steve Brown

Steve Brown

Vice President, Enterprise Security Services & Chief Security Officer, Xcel Energy
Steve Brown is the Vice President, Enterprise Security Services and Chief Security Officer of Xcel Energy. He is responsible for all aspects of the company’s Cyber Security, Physical Security, Enterprise Continuity, Strategy Performance, and Security Governance & Risk Programs... Read More →
avatar for Daryl Haegley

Daryl Haegley

Director, Cyber Mission Assurance and Deterrence, DoD - Office of the Principal Cyber Advisor to the Secretary of Defense
Career includes military, federal, civilian and commercial consulting experience. Currently assigned to the Office of the Principal Cyber Advisor to the Secretary of Defense, advising on cyberspace activities, cyber mission forces, and offensive and defensive cyber operations and... Read More →
avatar for Richard Ku

Richard Ku

Sr. Vice President Commercial IoT Security Business and Market Development, Trend Micro
Richard Ku has over 28+ years of hands-on experience working in the hi-tech and cyber security industry in a number of leading roles, as an individual engineer, threat researcher and senior management of different security product groups and market segments across End-point, Server... Read More →


Tuesday September 24, 2019 8:30am - 9:15am EDT
Mystic Dunes Resort

9:15am EDT

Past, Present, and Future of ICS Attacks
In the past, you will have heard about attacks on critical infrastructure facilities with well-known malware, campaigns, and actor groups - and year after year the numbers of reported attacks on ICS systems are rising. In this presentation, we will briefly discuss historically significant attacks on ICS systems, current systems, and then dive into where we think the future of ICS attacks will go. From our own research, we will give key insights on ICS attacks and discuss methods attackers could be leveraged in the near future.

Speakers
avatar for Stephen Hilt

Stephen Hilt

Sr. Threat Researcher, Trend Micro
Stephen Hilt is a Sr. Threat Researcher at Trend Micro. Stephen focuses on General Security Research, Threat Actors, Malware behind attacks, and Industrial Control System Security. Stephen enjoys breaking things and putting them back together with a few extra parts to spare. Stephen is... Read More →


Tuesday September 24, 2019 9:15am - 9:45am EDT
Mystic Dunes Resort

9:45am EDT

Case Study: Moving Towards a Digitised Substation
  • Vision to enable the future and meet energy demands through digitisation, increasing flexibility and enhancing physical safety
  • Digitisation and our approach to operations and asset management, why the sector needs to change
  • Cybersecurity by design and prerequisite
  • Design standards from the top down
  • Ethernet communications IEC 61850
  • Integrated engineering throughout asset lifecycle
  • Digitisation will enable proactive condition-based maintenance procedures, monitoring and data collection
  • Deployment challenges
  • Trusted partnerships and future-proofing through collaboration

Speakers
avatar for Philip Tonkin

Philip Tonkin

Global Head of Cyber Operational Technology, National Grid
Philip has worked in the energy business for over 20 years, working in a wide range of disciplines.  From field engineering to senior leadership positions, he has always been passionate about solving the challenges of digitising the energy supply industry.   Using an understanding... Read More →


Tuesday September 24, 2019 9:45am - 10:15am EDT
Mystic Dunes Resort

10:15am EDT

Networking Coffee
Tuesday September 24, 2019 10:15am - 10:45am EDT
Mystic Dunes Resort

10:45am EDT

Panel: Cybersecurity Preparedness; Design and Architecture
  • How can we adopt a secure by design approach, given the challenges of new technology being introduced?
  • What tools can show us the entire network including the lower layers of ICS?
  • Is there a culture of "Leave well enough alone?" How can we overcome this?
  • Is enough attention being given to configuration control?
  • Are we patching regularly?
  • Are we getting better at locking down remote access to ICS environments?

Speakers
avatar for Steve Brown

Steve Brown

Vice President, Enterprise Security Services & Chief Security Officer, Xcel Energy
Steve Brown is the Vice President, Enterprise Security Services and Chief Security Officer of Xcel Energy. He is responsible for all aspects of the company’s Cyber Security, Physical Security, Enterprise Continuity, Strategy Performance, and Security Governance & Risk Programs... Read More →
avatar for F. Mitch McCrory

F. Mitch McCrory

Manager, Energy Security Department, Sandia National Laboratories
F. Mitch McCrory manages the Energy Security department at Sandia National Laboratories. Mitch currently is the co-National Technical Director for the Department of Energy, Office of Nuclear Energy’s (DOE-NE) Cyber Security Program and is the Physical Security Initiative Lead for... Read More →
avatar for Noel Zamot

Noel Zamot

President, ATABEY GROUP LLC
Mr. Zamot previously served as the Revitalization Coordinator for the Financial Oversight and Management Board (FOMB) for Puerto Rico. This was a Congressionally mandated role tasked with attracting private capital to revitalize Puerto Rico’s critical infrastructure, setting the... Read More →


Tuesday September 24, 2019 10:45am - 11:30am EDT
Mystic Dunes Resort

11:30am EDT

Industry 4.0: Cyber Securing Legacy Systems across the Business
  • Manufacturing is a highly competitive industry. Sensitivities to risk, in any form, are high. In many respects, some of the most valuable intellectual property a manufacturing firm carries is in its manufacturing processes.
    • Consequently, protection of this IP becomes an imperative
  • Similarly, nuisance attacks can be some of the most damaging, especially if you are caught unprepared. Ransomware has risen to the top of this list. Witness the City of Baltimore recovery.
    • Awareness of cyber risks, anticipating an attack, being prepared
  • Today, nations have weaponized cyber-space. Manufacturers are part of a nation’s economies, part of the critical infrastructure of the world. With targets now painted on manufacturing plants, how do we rise to these newest threats?
  • Manufacturers need to increase their cyber-preparedness to get the full benefits of Industry 4.0. Business leaders must support their teams, both culturally and financially, to help them secure their systems.
  • There is a simple formula to use in which risk assessment must be less than or equal to risk tolerance, which results in a remediation plan to balance the equation. In this talk, we will cover the evolving world and the need to take steps to secure your manufacturing plant.
 


Speakers
avatar for Andrew Kling

Andrew Kling

Industry Automation Product Security Officer, Schneider Electric
Over his thirty-plus year career, Andy has spearheaded world-class security development initiatives and provided Next Generation solutions as a Senior Architect in the Process Automation industry.An industry-recognized authority on Cybersecurity, Andy currently serves as the Industry... Read More →


Tuesday September 24, 2019 11:30am - 12:00pm EDT
Mystic Dunes Resort

12:00pm EDT

Preparing for NERC CIP-013-1
Under NERC CIP 13 both responsible entities (users/owners and suppliers) are required to develop supply chain risk management plans, to include:
Processes for Procurement planning (incident notification, coordination of response, vendor access management and control, disclosure, verification of software integrity and authenticity.
Reassessments to address evolving threats
-Contract negotiations reassessed to address areas of risk
What will NERC look for? How well risk mitigation concepts were integrated and implemented, especially vendor risk assessments and security provisions in contracts.

What can we do to prepare?
-Technologies to automate processes
-Centralise documentation
-Streamline collaboration
-Integrated risk management platforms to map policies to controls

How do we manage costs?

Speakers
avatar for Stephen Batson

Stephen Batson

Senior Manager, Risk and Financial Advisory, Deloitte
Mr. Batson functions as a Senior Manager for Deloitte with 30 years of experience focused on designing and securing utility IT and ICS systems to meet NIST, NRC, NERC, IAEA, IEC, and ISO 27000 series cyber security standards and regulations. Mr. Batson is responsible for strategy... Read More →


Tuesday September 24, 2019 12:00pm - 12:30pm EDT
Mystic Dunes Resort

12:30pm EDT

Ice Breaker Introductions
We will be ensuring all participants meet each other with our new Ice Breaker session right before lunch. This ensures all attendees meet each other, exchange business cards and explain their main purpose for attending. 

Tuesday September 24, 2019 12:30pm - 1:00pm EDT
Mystic Dunes Resort

1:00pm EDT

Networking Lunch
Tuesday September 24, 2019 1:00pm - 2:00pm EDT
Mystic Dunes Resort

2:00pm EDT

Panel: Supply Chain Cyber Security: Do we Understand the Risk?
  • What resources are required for us to maintain a clear picture of our supply chain?
  • Do we know what needs to be protected and why? How do we protect these assets?
  • Do we know the value of the information and assets our suppliers hold?
  • Do we have an understanding of who our suppliers are and how do we establish confidence in their cybersecurity maturity levels?
  • Are we getting any better at communicating our security needs?

Speakers
avatar for Philip Tonkin

Philip Tonkin

Global Head of Cyber Operational Technology, National Grid
Philip has worked in the energy business for over 20 years, working in a wide range of disciplines.  From field engineering to senior leadership positions, he has always been passionate about solving the challenges of digitising the energy supply industry.   Using an understanding... Read More →
avatar for Ayman Al Issa

Ayman Al Issa

Industrial Cybersecurity Lead and Senior Expert, McKinsey & Company
Ayman Al Issa is the McKinsey Industrial Cybersecurity Lead and Senior Expert. prior to joining McKinsey, he was the Chief Technologist for Booz Allen Hamilton’s Industrial Cyber Security practice in the international market and he was the Cybersecurity Business Development Lead... Read More →
avatar for Matthew Bohne

Matthew Bohne

Vice President, Chief Product Security Officer, Honeywell
Matthew Bohne is the Vice President and Chief Product Security Officer for Honeywell Building Technologies. He is responsible for leading the product cybersecurity and privacy program and strategy for the company. He leads a global team of talented security professionals who use a... Read More →


Tuesday September 24, 2019 2:00pm - 2:45pm EDT
Mystic Dunes Resort

2:45pm EDT

Panel: The Evolution of IT/OT Convergence
  • As the convergence of systems and security management evolve, how can we converge IT and OT securely?
  • Is cybersecurity a priority in an organisations IT/OT alignment? 
  • Are we seeing high levels of (cyber) cooperation across IT and OT divisions?
  • What challenges do we have to overcome to secure convergence?

Speakers
avatar for Philip Tonkin

Philip Tonkin

Global Head of Cyber Operational Technology, National Grid
Philip has worked in the energy business for over 20 years, working in a wide range of disciplines.  From field engineering to senior leadership positions, he has always been passionate about solving the challenges of digitising the energy supply industry.   Using an understanding... Read More →
avatar for Rick Kaun

Rick Kaun

VP of Solutions, Verve Industrial Protection
Rick Kaun is the VP of Solutions for Verve Industrial Protection: An OT cyber security solution provider. For over 16 years he has worked with all manner of industries on all sizes of projects around the word from front end scoping to large scale design and deployment of end to end... Read More →
avatar for Richard Ku

Richard Ku

Sr. Vice President Commercial IoT Security Business and Market Development, Trend Micro
Richard Ku has over 28+ years of hands-on experience working in the hi-tech and cyber security industry in a number of leading roles, as an individual engineer, threat researcher and senior management of different security product groups and market segments across End-point, Server... Read More →


Tuesday September 24, 2019 2:45pm - 3:30pm EDT
Mystic Dunes Resort

3:30pm EDT

Networking Coffee
Tuesday September 24, 2019 3:30pm - 4:00pm EDT
Mystic Dunes Resort

4:00pm EDT

Fireside Chat Case Study: Artificial Intelligence and Automated Threat Response for OT Environments
  • How the latest AI technologies automate OT, ICS, sensor and IoT threat detection
  • Why Security automation and orchestration makes sense
  • Reduce risks and operational errors, improve efficiency, and address the sophisticated cybersecurity threats appearing as cyber-attackers increasingly target industrial environments 

Speakers
avatar for Ian Fitzgerald

Ian Fitzgerald

CIO/Information Technology Director, Truckee Donner Public Utility District
Ian FitzgeraldChief Information Officer / Director of ITTruckee Donner Public Utility DistrictIan Fitzgerald is a unified enterprise IT/OT expert with 22 years of experience successfully implementing advanced cutting edge technology in the utility sector. Currently focused on large... Read More →
avatar for Jeff Cornelius, Ph.D

Jeff Cornelius, Ph.D

Executive Vice President, Darktrace
Jeff Cornelius joined Darktrace in February of 2014 as Executive Vice President.  His background with large Enterprise Software organizations over the past 18 years lends itself to the needs of an innovative, market-defining organization.  Jeff oversees the strategic direction and... Read More →


Tuesday September 24, 2019 4:00pm - 4:30pm EDT
Mystic Dunes Resort

4:30pm EDT

How to Integrate Threat Intelligence into Critical Infrastructure
More information to follow.

Speakers
avatar for Franky Thrasher

Franky Thrasher

Manager Nuclear Cybersecurity, ENGIE Electrabel
Franky Thrasher is the Nuclear Cybersecurity Manager for ENGIE in this role he specializes in industrial control system security and has developed and successfully implemented a cyber-security program specifically dedicated to critical infrastructure, namely both nuclear power plants... Read More →


Tuesday September 24, 2019 4:30pm - 5:00pm EDT
Mystic Dunes Resort

5:00pm EDT

Panel: Bridging the Gaps - Risk Mitigation Information Sharing. Are we improving at Developing Trust?
  • How do we currently perceive risks associated with sharing information with trading partners? Are we still operating in competitive silos? How can we overcome this more effectively?
  • How can we reinforce the vital role played by interpersonal relationships and develop trust-based performance-control process models? How can we, in turn, develop these into key business enablers?
  • Is the "culture of security" limited to our own organisations?
  • Are perceptions changing?
  • What examples do we have of successful information sharing partnerships?


Speakers
avatar for Franky Thrasher

Franky Thrasher

Manager Nuclear Cybersecurity, ENGIE Electrabel
Franky Thrasher is the Nuclear Cybersecurity Manager for ENGIE in this role he specializes in industrial control system security and has developed and successfully implemented a cyber-security program specifically dedicated to critical infrastructure, namely both nuclear power plants... Read More →
avatar for Frank Honkus

Frank Honkus

Associate Director, Threat Intelligence, CRISP Program Manager, E-ISAC
As the Associate Director, Threat Intelligence, I assist leadership for the development and execution of Electricity Information Sharing and Analysis Center (E-ISAC) activities related to cyber and physical security threats, and electric sector risk assessment and mitigation activities... Read More →
avatar for Carter Manucy

Carter Manucy

Cyber Security Manager, Florida Municipal Power Agency
Carter Manucy is the Cyber Security Manager for Florida Municipal Power Agency, a joint-action agency in Orlando, Florida.  At FMPA his responsibility is for OT cyber and physical security as well as NERC CIP compliance.  While working at FMPA, Carter has held numerous roles in... Read More →
avatar for David Batz

David Batz

Director, EEI
With over 20 years of electric company experience, David Batz brings significant industry knowledge in understanding and applying appropriate security solutions to address emerging threats and issues. In addition, Mr. Batz leverages a decade of energy regulatory compliance as well... Read More →


Tuesday September 24, 2019 5:00pm - 5:30pm EDT
Mystic Dunes Resort

5:30pm EDT

End of Day One: Drinks Reception Sponsored by Trend Micro
The conference drinks reception is sponsored by Trendmicro.

Trend Micro, a global leader in cybersecurity, is passionate about making the world safe for exchanging digital information, today and in the future. Artfully applying our XGen™ security strategy, our innovative solutions for consumers, businesses, and governments deliver connected security for data centers, cloud workloads, networks, endpoints, and Operational Technology Networks (OT).

Visit us at www.trendmicro.com

Speakers
avatar for Richard Ku

Richard Ku

Sr. Vice President Commercial IoT Security Business and Market Development, Trend Micro
Richard Ku has over 28+ years of hands-on experience working in the hi-tech and cyber security industry in a number of leading roles, as an individual engineer, threat researcher and senior management of different security product groups and market segments across End-point, Server... Read More →
avatar for Stephen Hilt

Stephen Hilt

Sr. Threat Researcher, Trend Micro
Stephen Hilt is a Sr. Threat Researcher at Trend Micro. Stephen focuses on General Security Research, Threat Actors, Malware behind attacks, and Industrial Control System Security. Stephen enjoys breaking things and putting them back together with a few extra parts to spare. Stephen is... Read More →



Tuesday September 24, 2019 5:30pm - 7:00pm EDT
Mystic Dunes Resort

7:15pm EDT

Invitation Only Dinner Hosted by Nozomi Networks
Cyber Senate will be meeting in the registration area with all Nozomi guests to travel to the restaurant. Participants confirmed need to be in the foyer at 7:15pm latest.


Tuesday September 24, 2019 7:15pm - 9:30pm EDT
Chatham Place- Contact Cyber Senate for details
 
Wednesday, September 25
 

8:00am EDT

Breakfast and welcome from the Cyber Senate
Director James Nesbitt
Introduction to our Chairman and Moderator

Speakers
avatar for Chris Blask

Chris Blask

Global Director Industrial and IoT Security, Unisys
Mr. Blask’s career spans the breadth of the cybersecurity spectrum for more than 25 years. He invented one of the first commercial firewall products, built a multi-billion dollar firewall business at Cisco System, co-founded an early SIEM vendor, and authored the first book on SIEM... Read More →
avatar for James Nesbitt

James Nesbitt

Director and Founder, Cyber Senate
Industrial Control Cyber Security Events Founder, Advisor, Podcaster. Industry 4.0 professional. James has over 20 years of engagement with critical infrastructure industries spanning Europe and North America, assessing their challenges in developing and defining cyber resilience... Read More →


Wednesday September 25, 2019 8:00am - 8:30am EDT
Mystic Dunes Resort

8:30am EDT

Industry 4.0 - The Driver for Adoption
  • Digital transformation of the Industrial sector is a top priority for C level executives
  • Automation and efficiency, leveraging data and intelligence across the asset base is key to remaining profitable and competitive.
  • Ensuring cybersecurity is seen as a business enabler and not a barrier to transformation
  • Integrating cybersecurity into industry 4.0, where do we begin and managing the bolt on culture
  • How can we help raise awareness of the threats, as position ourselves as key to business continuity – availability and reliability and speak the same language

Speakers
avatar for Chris Blask

Chris Blask

Global Director Industrial and IoT Security, Unisys
Mr. Blask’s career spans the breadth of the cybersecurity spectrum for more than 25 years. He invented one of the first commercial firewall products, built a multi-billion dollar firewall business at Cisco System, co-founded an early SIEM vendor, and authored the first book on SIEM... Read More →


Wednesday September 25, 2019 8:30am - 9:00am EDT
Mystic Dunes Resort

9:00am EDT

Next Generation Defense
Computing environments, including command and control infrastructure, suffer from a lack of software diversity, leaving static targets available to attackers to perform reconnaissance and exploitation. These environments would benefit greatly from proactive defense mechanisms (PDMs) that can shift the software users’ interaction, thereby limiting the time that attackers can interact with a potentially vulnerable system and increase resilience. Proactive defense mechanisms could also allow vulnerable software to be removed from the environment seamlessly upon disclosure of a vulnerability, giving organizations time to patch.  These mechanisms would not only increase the cost of attack dramatically but also increase the resilience of the system to an outage from a cyber attack.  Some popular types of PDMs are Moving Target Defense, Cyber Deception and Active Defense.  
 

Speakers
avatar for Nate Evans

Nate Evans

Cyber Operations Analysis and Research Lead, Argonne National Laboratory
Dr. Nathaniel Evans received his Doctorate in Computer Engineering with a specialty in Cyber Security from Iowa State University, one of the first NSA Centers of Excellence in the country.  He has spent time working in the Intelligence Community and for a variety of companies including... Read More →


Wednesday September 25, 2019 9:00am - 9:30am EDT
Mystic Dunes Resort

9:30am EDT

Secure Architectures: Research into what makes a Secure Architecture
Secure from what or whom? Fundamentally, control systems were not originally designed with security as a primary driving factor. What types of designs would be resilient to various classes of a cyber attack? How do you implement a robust security architecture without compromising the safety and reliability of the system?
  • The next generation of US commercial nuclear power plants, now under construction, uses digital control systems to monitor plant conditions and control plant functions. Current fleet plants require cost-effective and secure digital systems to improve operational efficiency and save costs. There are significant benefits to digital control systems, but they come with potential vulnerabilities to cyber-attacks and/or digital failure. It is crucial that the next generation ICS are proven secure and credited for passively safe designs.
  • The DOE-NE have stood up a cybersecurity research and development program to enable science-based methods and technologies necessary for cost-effective, cyber-secure digital instrumentation, control and communication in collaboration with nuclear energy stakeholders. This program is managed jointly by Sandia National Laboratories (SNL) and Idaho National Laboratories (INL).
  • Part of this program is a research thrust called Secure Architectures to establish a science-based foundation to inform the fundamental architectural features, design requirements, and operational standards for nuclear facility digital systems. Activities currently in progress at SNL under this thrust include establishing a capability to perform empirical analysis to rank the security effectiveness of proposed enhancements and new control system designs.
  • The use of high fidelity simulation enables the advancement and docketing of advanced reactor designs. The ability to run realistic tests to ensure the strength of the digital systems will advise the development of new procedures, training and design for upgrades to the existing fleet and advanced reactors and has the potential to inform the new regulatory requirements that will be created for future designs.
  • Due to the complexity of digital control system, it is difficult if not impossible to fully inspect systems at installation, so our program also includes a Supply Chain Risk Management R&D thrust to deliver science-based tools, methodologies, and guidelines for cyber-resistant supply chains, procurement standards, and supplier validation.

Speakers
avatar for F. Mitch McCrory

F. Mitch McCrory

Manager, Energy Security Department, Sandia National Laboratories
F. Mitch McCrory manages the Energy Security department at Sandia National Laboratories. Mitch currently is the co-National Technical Director for the Department of Energy, Office of Nuclear Energy’s (DOE-NE) Cyber Security Program and is the Physical Security Initiative Lead for... Read More →


Wednesday September 25, 2019 9:30am - 10:00am EDT
Mystic Dunes Resort

10:00am EDT

Networking Coffee Break
Wednesday September 25, 2019 10:00am - 10:45am EDT
Mystic Dunes Resort

10:45am EDT

Panel: Evolving Cyber Risk to Safety Critical Systems: Understanding and Mitigating Dependencies Between Cybersecurity Vulnerabilities and System Safety
  • Traditional methods to assess the safety of critical infrastructure are insufficient in relation to understanding system failures in complex interconnected systems
  • Implications of increased connectivity
  • How do we integrate cyber security and safety into a risk management methodology?

Speakers
avatar for Stephen Batson

Stephen Batson

Senior Manager, Risk and Financial Advisory, Deloitte
Mr. Batson functions as a Senior Manager for Deloitte with 30 years of experience focused on designing and securing utility IT and ICS systems to meet NIST, NRC, NERC, IAEA, IEC, and ISO 27000 series cyber security standards and regulations. Mr. Batson is responsible for strategy... Read More →
avatar for Nathan Faith

Nathan Faith

Cyber Security Manager, Exelon Nuclear Corporate Security
As a long-standing contributor in the public and private partnership toward cyber security programs, Nathan has a deep-rooted passion towards critical infrastructure protection. He has served as a contributing author on numerous industry documents and holds leadership positions on... Read More →
avatar for Nate Evans

Nate Evans

Cyber Operations Analysis and Research Lead, Argonne National Laboratory
Dr. Nathaniel Evans received his Doctorate in Computer Engineering with a specialty in Cyber Security from Iowa State University, one of the first NSA Centers of Excellence in the country.  He has spent time working in the Intelligence Community and for a variety of companies including... Read More →


Wednesday September 25, 2019 10:45am - 11:30am EDT
Mystic Dunes Resort

11:30am EDT

Enhancing the Protection and Situational Awareness of CS Networks Associated with Critical Infrastructure on DoD Installations and Supporting DoD Missions
The Department of Defense (DoD) relies on a global network of critical infrastructure to project, support, and sustain its forces and operations worldwide. The incapacitation, exploitation, or destruction of one or more of its assets would seriously damage DOD's ability to carry out its core missions. Unfortunately, critical infrastructure is often vulnerable to attacks on underlying control systems which are typically networked and poorly protected, making them easily accessible and at risk from local and remote threats regardless of whether the systems are connected or connectable. Moreover, due to their crucial importance, industrial control systems have increasingly been the target of nation-state, criminal and terrorist activities intended to disrupt and deny services. Adversaries have developed and demonstrated non-kinetic means to disrupt critical warfighting infrastructure, denying our ability to project force and maintain multi-domain dominance.

Speakers
avatar for Daryl Haegley

Daryl Haegley

Director, Cyber Mission Assurance and Deterrence, DoD - Office of the Principal Cyber Advisor to the Secretary of Defense
Career includes military, federal, civilian and commercial consulting experience. Currently assigned to the Office of the Principal Cyber Advisor to the Secretary of Defense, advising on cyberspace activities, cyber mission forces, and offensive and defensive cyber operations and... Read More →


Wednesday September 25, 2019 11:30am - 12:00pm EDT
Mystic Dunes Resort

12:00pm EDT

Using IEC 62443 Standards for Securing Building Management Systems
  • Overview of IEC 62443 Standards and ISASecure Certifications
  • BMS Introduction
  • Brief history and terminology
  • IEC 62443-4-2 component alignment to technical security requirements
  • Future state of BMS



Speakers
avatar for Jason Christman

Jason Christman

Vice President, Chief Product Security Officer, Johnson Controls
Jason Christman is Vice President and Chief Product Security Officer for Johnson Controls. He defines product cybersecurity strategy for the company and leads the Global Product Security organization in its mission to manage full lifecycle risk across the company’s diverse portfolio... Read More →
avatar for Andre Ristaino

Andre Ristaino

Managing Director, ISCI
Andre Ristaino is the Managing Director of the ISA Automation Standards Compliance Institute (ASCI) based in Research Triangle Park, N.C. He provides staff leadership for ISA’s conformance certification programs, including the ISASecure IACS certification program managed under the... Read More →


Wednesday September 25, 2019 12:00pm - 12:45pm EDT
Mystic Dunes Resort

12:45pm EDT

Networking Lunch
Wednesday September 25, 2019 12:45pm - 2:00pm EDT
Mystic Dunes Resort

2:00pm EDT

Applying and Implementing ISA/IEC 62443
Why ANSI/ISA/IEC62443?
FAQ's addressed and talking points to follow
 

Speakers
avatar for Glenn Merrell

Glenn Merrell

ISA Certified Automation Professional Industrial Control Systems Security / Freelance Consulting, ISA99-08 / 10 Co-chair ISA
Mr. Glenn Merrell, CAP is a senior industry consultant applying extensive experience in Industrial Control Systems (ICS), automation, safety, Critical Infrastructure Protection (CIP) and industrial security. Mr. Merrell is an ISA Certified Automation Professional with over 30 years... Read More →


Wednesday September 25, 2019 2:00pm - 2:30pm EDT
Mystic Dunes Resort

2:30pm EDT

Panel: Asset Inventory - Determining our critical Assets and the Essential functions of those Critical Assets
  • How effectively are we tracking our assets?
  • With an asset inventory, what can we do with it?
  • Are we getting any better at identifying cyber assets associated with a critical asset?
  •  Where we are in relation to inventory and control of hardware assets
  • Where we are in relation to inventory and control of software assets
  • Why ITAM is crucial for effective cybersecurity 
  • Developing situational awareness around what threats and vulnerabilities matter
  • Building asset discovery intelligence tools to monitor networks and asset communications
  • Setting baselines or monitoring
  • Ensuring our monitoring is scaleable

Speakers
avatar for Ayman Al Issa

Ayman Al Issa

Industrial Cybersecurity Lead and Senior Expert, McKinsey & Company
Ayman Al Issa is the McKinsey Industrial Cybersecurity Lead and Senior Expert. prior to joining McKinsey, he was the Chief Technologist for Booz Allen Hamilton’s Industrial Cyber Security practice in the international market and he was the Cybersecurity Business Development Lead... Read More →
avatar for Andrew Kling

Andrew Kling

Industry Automation Product Security Officer, Schneider Electric
Over his thirty-plus year career, Andy has spearheaded world-class security development initiatives and provided Next Generation solutions as a Senior Architect in the Process Automation industry.An industry-recognized authority on Cybersecurity, Andy currently serves as the Industry... Read More →
avatar for Ray Secrest

Ray Secrest

Sr. Security Manager, Tampa International Airport
Ray Secrest is the Sr. Manager of Information Security at Tampa International Airport (TPA). He is a proven security professional and leader of security teams and programs specializing in risk-reduction, compliance, vulnerability assessments, security awareness and training across... Read More →


Wednesday September 25, 2019 2:30pm - 3:15pm EDT
Mystic Dunes Resort

3:15pm EDT

Networking Coffee
Wednesday September 25, 2019 3:15pm - 4:00pm EDT
Mystic Dunes Resort

4:00pm EDT

Case Study: Integrating a Holistic Cyber Security program into the OT Environment
·         Establishing a common IT/OT language
·         Conduct Risk/Gap assessments of OT environments
·         Instituting a Business Security Liaison program to act as a security focal point for the business units
·         Introducing monitoring tools, processes and procedures and consolidation of tools and services between organizations
·         Development of a strategic roadmap w/each business unit to document goals and remediation schedules prioritized based on documented risk 

Speakers
avatar for Ayman Al Issa

Ayman Al Issa

Industrial Cybersecurity Lead and Senior Expert, McKinsey & Company
Ayman Al Issa is the McKinsey Industrial Cybersecurity Lead and Senior Expert. prior to joining McKinsey, he was the Chief Technologist for Booz Allen Hamilton’s Industrial Cyber Security practice in the international market and he was the Cybersecurity Business Development Lead... Read More →


Wednesday September 25, 2019 4:00pm - 4:30pm EDT
Mystic Dunes Resort

4:30pm EDT

Wash up and End of Conference!
Thank you to all our speakers, sponsors and guests for supporting us each year!

Wednesday September 25, 2019 4:30pm - 4:45pm EDT
Mystic Dunes Resort
 

Twitter Feed

Filter sessions
Apply filters to sessions.