Main Conference Day 1 & Workshops

7:30 am - 8:00 am Workshop Registration and Networking Breakfast

8:00 am - 9:30 am WORKSHOP A: Understanding the Risk Profile of Legacy Assets in Diverse Environments

OT environments pose significant challenges that can make cybersecurity management an extremely

complicated environment to navigate. When you add legacy systems into the mix that have been

integrated without much consideration for cybersecurity, you are faced with systems vulnerable to cyber

attacks.


Join this workshop to understand and respond to:


● Navigating industry specific regulatory compliance for cybersecurity

● Integrating risk and lifecycle management across your OT assets

● Overcoming the challenge of legacy systems vulnerability to cyber attacks

● Prioritizing vulnerabilities through a targeted approach to risk management

● Streamlining activities to achieve cost efficiencies

9:30 am - 9:45 am Morning Networking Break for Workshop Attendees

9:45 am - 11:15 am WORKSHOP C: Identifying System Vulnerabilities and Cyber Threats in a Converged IT/OT Operating Environment

The convergence of IT and OT can bridge the gap between digital and physical worlds and connect data

management systems and industrial operations. However, this convergence can introduce significant

security challenges.


Join this workshop to understand and respond to:


● Deploying a holistic security system that addresses vulnerabilities and risk across IT/OT

● Integrating security policies, practices and technologies that cover data and industrial processes

● Overcoming security protocols that do not seamlessly integrate with one another

● Considering upgrades to legacy systems in response to reduced security features

● Examining the impacts of IT/OT convergence on ICS security

8:00 am - 9:30 am WORKSHOP B: Deploying Identity and Access Management Solutions for OT and Critical Infrastructure

Compromised identities and stolen credentials present major opportunities for cyber criminals. With

operational technologies that control critical infrastructure systems becoming increasingly connected, the

risk of attack via compromised identity dramatically increases.


Join this workshop to understand and respond to:


● Identifying the cyber attack risks that connected and remotely accessible OT systems face

● Potential solutions for users with multiple identities and credentials for different assets

● Overcoming the challenges faced when OT assets are not compatible with modern identity and access

management solutions

● Responding to losing access to OT assets in remote areas when the network is down

● Reducing your attack surface with multi-layer identity-based access management

9:30 am - 9:45 am Morning Networking Break for Workshop Attendees

9:45 am - 11:15 am WORKSHOP D: Developing Endpoint & Anti-Virus Protection Strategies for OT Systems

OT devices in Industry 4.0 operating environments are susceptible to cyber attacks which can affect

productivity and safety, and result in major financial loses to an organisation. This has highlighted the

urgent need for operators to deploy endpoint protection so each OT device can protect itself and prevent

communication from unauthorized devices.


Join this workshop to understand and respond to:


● Overcoming vulnerability to malware attacks on endpoint devices that lack robust security measures

● Avoiding expensive downtime from a malware infection on critical OT devices

● Enhancing your security posture and providing an additional layer of protection to your OT security

strategy

● Responding to increasingly sophisticated cyber attacks with malware designed to exploit unique OT

system vulnerabilities

● Providing continuous monitoring and protection with real time defense safeguards

11:00 am - 11:30 am Registration Opens for Main Conference Attendees

11:30 am - 11:35 am Welcome From Conference Director

11:35 am - 11:40 am Opening Remarks from Conference Chair

11:40 am - 12:15 pm Keynote Panel: The Top OT Security Challenges for CISO’s in 2024-2025: Anticipating and Proactively Addressing Emerging OT Cybersecurity Threats

Bemi Anjous - CISO, Noble Corporation
George Crawford - CIO/CISO, Catapault Energy
Steve Herrin - CISO, DTE Energy

The adoption of connected devices is driving innovation and growth across smart operating environments, but with increased convergence of IT/OT devices, comes new risks and vulnerabilities to cyber attack. With many organizations not having the necessary visibility of threats across their OT systems, it is essential that security leaders remain vigilant against an ever-expanding array of threats.


Our industry leading panelists will discuss:


● Developing a zero-trust approach to data protection across diverse platforms and locations

● Building cybersecurity controls to thwart ransomware attacks without disrupting the user experience

● Developing strategies that work effectively across converged IT/OT systems

● Cost-driven decision-making vs security-driven decision-making

img

Bemi Anjous

CISO
Noble Corporation

img

George Crawford

CIO/CISO
Catapault Energy

img

Steve Herrin

CISO
DTE Energy

12:15 pm - 12:45 pm Enhancing Visibility and Mitigating Cyber Vulnerabilities in Air-Gapped OT Systems

● Identifying unknown points of IT/OT convergence

● Understanding the opportunities for attackers to slip through the air gap

● Using self-learning AI solutions that provide visibility and threat detection

● Threat response and incident reporting that your workforce can easily understand

12:45 pm - 1:45 pm Networking Luncheon

Legacy OT systems are vulnerable to cyber attack as they were not built with security in mind and are compromised by outdated systems and lack of compatibility with new security technology. Many organizations may also not understand the dangers posed by legacy systems which is exasperated by lack of visibility across OT systems and security knowledge amongst their workforce.


Join this session to discuss:


● Finding the balance between maintaining legacy systems and transitioning to new technology

● Regularly auditing of your legacy systems to provide a clearer picture of potential vulnerabilities

● Isolating legacy systems from your network to protect your entire infrastructure from attack

● Identifying the security tools that will work effectively across legacy systems

Sarra Pilgrim

Digital Operations, OT Cyber Product Owner
Collins Aerospace

img

Aaron Baillio

Director of Information Security
Summit Utilities, Inc

img

David Bang

Senior Trust Advisor: Global Security Awareness
LyondellBasell

img

Gypsy Morinelli

PCN Cyberwise Product Manager
Chevron

2:15 pm - 2:45 pm Adopting a Proactive and Transformative Approach to OT Security with Full Integration and Threat Intelligence

● Securing converged IT-OT Networks with a security fabric that ensures your devices are protected

● Providing automated responses to attacks in any vector

● Continuous monitoring of behaviors in OT networks to provide intelligence about known and unknown threats

● Closing OT security gaps and delivering full visibility across your networks

Interactive Discussion Groups

A

2:45 pm - 3:25 pm IDG A: Secure Remote Access

B

2:45 pm - 3:25 pm IDG B:OT Malware

C

2:45 pm - 3:25 pm IDG C: Asset Inventory & Risk Management

D

2:45 pm - 3:25 pm IDG D: Identity & Access management

E

2:45 pm - 3:25 pm IDG E: Continuous Threat Detection

3:25 pm - 4:00 pm Innovation Acceleration Session

This structured networking session is the ideal opportunity for you to capitalize on time out of the office by speaking to each of our event

partners in attendance and learning about the essential solutions available to your specific challenges. How does it work? It’s easy. You

spend five minutes at a booth of your choice, and when the bell rings you’ll be directed to the next one to start another round of learning and

networking. At the end of the session, you’ll have met a selection of our event partners, and for any you have missed, you can connect with

them at the networking cocktail reception at the end of the day.

4:00 pm - 4:30 pm Panel: Developing Strong Identity and Access Management Controls to Increase Resilience Against Cyber Attacks

Faith Osode - Director Cybersecurity, Baker Hughes
Nick Cioll - CEO, Progressive Energy
Grigor Bambekov - Former SVP Business Transformation, Delek U.S.

Having the best security tools and technologies in place can be totally undermined if you don’t have solid identity and access management as

the foundation of your cybersecurity efforts. You must ensure that you have a complete view of the identities flowing across your OT environment

if you want to avoid a devastating cyber attack.


Join this panel to discuss:


● Addressing siloed, manual and insecure OT IAM procedures

● Influencing senior leaders on the benefits of investment in modern OT IAM solutions

● Overcoming push back from OT during implementation of IAM controls

● Responding to increased regulatory requirements on improving cybersecurity for critical infrastructure control systems

img

Faith Osode

Director Cybersecurity
Baker Hughes

img

Nick Cioll

CEO
Progressive Energy

img

Grigor Bambekov

Former SVP Business Transformation
Delek U.S.

4:30 pm - 5:00 pm Mitigating Against the Potential Consequences of Cyber attacks on Multiple OEM Systems

● Simplifying protection and monitoring across your OEM vendors

● Investing in a solution that enhances security across segmented networks

● Providing vulnerability and risk assessment across multiple endpoints

● Gaining access to real-time visibility to malware threats

5:00 pm - 5:45 pm Closing Keynote Address: Establishing an Insider Threat Mitigation Program to Safeguard your Critical OT Systems

Ensuring that you have the necessary policies, procedures, and technologies in place can help prevent or reduce the opportunities for insider threats and stay alert to anomalous user behavior. With many organizations focusing on external threats, not being proactive with insider threats can be a costly oversight.


Join this session to discuss:


● Understanding the tactical approaches, you can take to mitigate insider threat opportunities

● Building awareness of malicious internal threats from rogue employees and contractors

● Adopting a layered approach across a range of security controls and processes

● Implementing 24/7 network and endpoint monitoring to detect malicious behavior

5:45 pm - 5:50 pm Chair’s’ Closing Remarks, Day One Concludes

5:50 pm - 6:50 pm Networking Reception for all Attendees, Speakers & Sponsors