Main Conference Day 2

7:15 am - 8:00 am Check In & Networking Breakfast

8:05 am - 8:10 am Chair’s Opening Remarks

8:10 am - 8:45 am Opening Keynote Panel: Determining the Value of an OT Cyber Risk System when Making Investment Decisions

Darwin Jebha - VP & CIO, Thermon Inc
Grant Ecker - Founder & Chairman, Chief Architect Network
Preston Boley - Industrial Automation Security and Systems Manager, BASF

When CISO’s face investment decisions on cybersecurity solutions they must understand and communicate the business focused risks that will engage business leaders on prioritizing cyber investments. Understanding the business-critical worst-case outcomes and financial impacts of an attack can really drive your investment strategy, and measuring cyber risk can also help your organization respond to regulatory requirements and avoid penalties for non-compliance.


Our industry leading panelists will discuss:


● Risk calculation based on minimizing the impact and damages to an organization of a successful cyber attack

● Prioritizing threats and the costs of mitigation measures

● Influencing senior decision-makers by using language they understand – what are the business impacts of a cyber attack

● Identifying the cost of avoidance when quantifying cyber risk to OT systems

img

Darwin Jebha

VP & CIO
Thermon Inc

img

Grant Ecker

Founder & Chairman
Chief Architect Network

img

Preston Boley

Industrial Automation Security and Systems Manager
BASF

8:45 am - 9:15 am Utilizing Digital Twins to Identify Potential Cyber Vulnerabilities across your OT Network

● Ensuring you have high quality data from across your operating systems as a starting point in your digital twin deployment

● Enabling security testing on your digital twin to understand system vulnerabilities

● Intrusion detection and prevention to monitor networks for malicious activity

● Understanding your organizations security posture by achieving asset visibility and vulnerability identification

9:15 am - 9:50 am Keynote Presentation: Identifying Cyber Threats Posed by Gen AI in the Shifting Threat Landscape

Gen AI is changing the threat landscape and offering cyber criminals the opportunity to create more complex and sophisticated attacks. With the increased threats that Gen AI pose, a major revaluation of cybersecurity strategies will be required to mitigate current and future threats.


Join this presentation to discuss.


● Understanding Gen AI capability to identify and exploit system vulnerabilities

● Gaining awareness of the opportunities for Gen AI models to infiltrate IIoT systems and damage physical equipment

● Reviewing existing cyber and physical security solutions in response to increasingly sophisticated threats

● Identifying cyber risks posed by Gen AI powered co-pilots

9:50 am - 10:20 am How to Use AI and Machine Learning to Automate and Enhance your OT Cyber Defense

● AI-assisted cyber defense to improve the speed and accuracy of response

● Big data analysis and threat detection enhancement

● Utilizing AI across your cybersecurity lifecycle including the ability to secure OT/IoT networks

● Bridging the gaps in cyber talent and reduced resources with automated cybersecurity in the OT/IoT environment

10:20 am - 10:50 am Morning Networking Break

Historically IT and OT departments have not been required to collaborate so the reorganization of traditionally siloed processes and systems can be challenging. However, with increased IT/OT convergence it has become essential that the functionality of both worlds come together to optimize systems to enhance data-driven decision making and reduce vulnerabilities to cyber attacks.


Join this panel to discuss:


● Overcoming a lack of collaboration which can lead to security oversights in complex converged environments

● Reorganizing previously siloed IT and OT teams to manage and operate newly converged technology

● Overcoming gaps in security vulnerabilities caused by lack of visibility of OT devices

● Driving more efficient asset management by managing IT and OT systems through a common methodology

img

Reynaldo Gonzalez

Principal Cybersecurity Architect
Cummins Inc

img

Samuel Parra

NA Manufacturing Integration Lead (GEC/DI)
BASF

img

Durgesh Kalya

BTN PCT Automation - OT Security/Network Expert
Covestro

11:25 am - 11:55 am How to Build a Successful Business Case for OT Cybersecurity Investment

Rick Kaun - VP Solutions, Verve

One of the biggest challenges organizations face is developing a robust business plan that creates the right momentum, focus, and budget that is required to protect against cyber-related threats. A successful business plan in OT cybersecurity includes making demonstrable and measurable improvements in an organization’s OT security posture and aligns organizational resources and overall team buy-in.


● Define overall expectations and set measurable goals

● Gather data on potential threats and risks

● Identify key stakeholders and successfully secure cross-department buy-in

● Create a risk remediation roadmap and vendor-agnostic management solutions

img

Rick Kaun

VP Solutions
Verve

11:55 am - 12:25 pm Cybersecurity by Design: Building OT Cyber Regulations and Licensing into in the Design of a New Nuclear Power Plant

Timothy Isaac - Cyber Security Specialist, NuScale Power
  • Developing cyber informed engineering programs
  • Building cyber skills capability across your organization
  • Identifying and responding to cyber threats across your supply chain
  • Reducing cyber attack vectors across our control systems


img

Timothy Isaac

Cyber Security Specialist
NuScale Power

Interactive Discussion Groups

K

12:25 pm - 1:00 pm IDG F: Threat and Anomaly Detection

L

12:25 pm - 1:00 pm IDG G: Digital Twin for Cyber Vulnerabilities

M

12:25 pm - 1:00 pm IDG H: Security for Converged IT/OT Networks

1:00 pm - 2:00 pm Networking Luncheon

2:00 pm - 2:30 pm Proactive Strategies for Cyber Resilience Across ICS/SCADA Systems

● Understanding the vulnerability and threat landscape across ICS and SCADA systems

● Overcoming asset visibility blind spots that can hinder cyber threat mitigation

● Prioritizing vulnerability through effective risk assessment

● Leveraging strategic ICS/SCADA insights to optimize your risk posture

2:30 pm - 3:00 pm Zones and Conduits, From on Premises to the Cloud

Dennis Hackney - OT Cyber Engineering Team Lead- Infrastructure, Chevron

Zones and conduits(Z&C) security can work with cloud integration, with proper planning. At Chevron, we are evaluating where it is appropriate to make the transition from on premises operational technologies (OT) or Industrial Control Systems (ICS), to the Cloud. We have concluded, that at some level, we must consider a future that includes industrial control involving some Cloud-integrated components. One thing we do know, is that this is not an easy decision to make nor is it an easy task to fulfill.


Join this thought provoking, and timely presentation and hear about:


• Examples of how control system elements that are Cloud-enabled from available market information

• Some of the expected benefits of Industrial Internet of Things, Edge Computing, and the Cloud.

• An overview of zones and conduits in a traditional field / on-premises environment

• Considerations that change between the traditional environment and software-based infrastructure in the Cloud

• A design of a Zones and Conduits in the Cloud model


img

Dennis Hackney

OT Cyber Engineering Team Lead- Infrastructure
Chevron

3:00 pm - 3:30 pm Closing Keynote Panel: Tackling Ransomware Attacks that Target Critical Infrastructure Systems

Prashant Prashant - Senior Cybersecurity Engineer, Enbridge

In its annual Internet Crime Report, the FBI noted that 2 in 5 ransomware attacks reported in 2023 targeted organizations in the critical infrastructure sector. As a high value target for state-based cyber espionage and ransomware criminal groups, the potential for severe and widespread disruptions is clear and the need for increased cybersecurity approaches to ransomware attacks has never been greater.


Join this panel to discuss:


● Discuss the devastating impact of ransomware attacks on critical infrastructure

● What is causing OT environments to become more exposed to ransomware attacks and how to mitigate against them

● Ensuring that you have crisis management and recovery testing in place for a ransomware attack in critical systems

● Putting strategies in place to build awareness across your high-risk workers

img

Prashant Prashant

Senior Cybersecurity Engineer
Enbridge

3:50 pm - 3:55 pm Chair’s Closing Remarks, OT Cybersecurity Summit Concludes