
Speakers
Director James Nesbitt In the past, you will have heard about attacks on critical infrastructure facilities with well-known malware, campaigns, and actor groups - and year after year the numbers of reported attacks on ICS systems are rising. In this presentation, we will briefly discuss historically significant attacks on ICS systems, current systems, and then dive into where we think the future of ICS attacks will go. From our own research, we will give key insights on ICS attacks and discuss methods attackers could be leveraged in the near future. Under NERC CIP 13 both responsible entities (users/owners and suppliers) are required to develop supply chain risk management plans, to include: We will be ensuring all participants meet each other with our new Ice Breaker session right before lunch. This ensures all attendees meet each other, exchange business cards and explain their main purpose for attending. More information to follow. The conference drinks reception is sponsored by Trendmicro. Cyber Senate will be meeting in the registration area with all Nozomi guests to travel to the restaurant. Participants confirmed need to be in the foyer at 7:15pm latest. Director James Nesbitt Computing environments, including command and control infrastructure, suffer from a lack of software diversity, leaving static targets available to attackers to perform reconnaissance and exploitation. These environments would benefit greatly from proactive defense mechanisms (PDMs) that can shift the software users’ interaction, thereby limiting the time that attackers can interact with a potentially vulnerable system and increase resilience. Proactive defense mechanisms could also allow vulnerable software to be removed from the environment seamlessly upon disclosure of a vulnerability, giving organizations time to patch. These mechanisms would not only increase the cost of attack dramatically but also increase the resilience of the system to an outage from a cyber attack. Some popular types of PDMs are Moving Target Defense, Cyber Deception and Active Defense. Secure from what or whom? Fundamentally, control systems were not originally designed with security as a primary driving factor. What types of designs would be resilient to various classes of a cyber attack? How do you implement a robust security architecture without compromising the safety and reliability of the system? The Department of Defense (DoD) relies on a global network of critical infrastructure to project, support, and sustain its forces and operations worldwide. The incapacitation, exploitation, or destruction of one or more of its assets would seriously damage DOD's ability to carry out its core missions. Unfortunately, critical infrastructure is often vulnerable to attacks on underlying control systems which are typically networked and poorly protected, making them easily accessible and at risk from local and remote threats regardless of whether the systems are connected or connectable. Moreover, due to their crucial importance, industrial control systems have increasingly been the target of nation-state, criminal and terrorist activities intended to disrupt and deny services. Adversaries have developed and demonstrated non-kinetic means to disrupt critical warfighting infrastructure, denying our ability to project force and maintain multi-domain dominance. Why ANSI/ISA/IEC62443? · Establishing a common IT/OT language Thank you to all our speakers, sponsors and guests for supporting us each year!Schedule
Tuesday, September 24, 2019
Chris Blask
Unisys, Global Director Industrial and IoT Security
James Nesbitt
Cyber Senate, Director and Founder
Introduction to our Chairman and ModeratorSteve Brown
Xcel Energy, Vice President, Enterprise Security Services & Chief Security Officer
Richard Ku
Trend Micro, Sr. Vice President Commercial IoT Security Business and Market Development
Daryl Haegley
DoD - Office of the Principal Cyber Advisor to the Secretary of Defense, Director, Cyber Mission Assurance and Deterrence
Stephen Hilt
Trend Micro, Sr. Threat Researcher
Philip Tonkin
National Grid, Global Head of Cyber Operational Technology
Steve Brown
Xcel Energy, Vice President, Enterprise Security Services & Chief Security Officer
Noel Zamot
ATABEY GROUP LLC, President
F. Mitch McCrory
Sandia National Laboratories, Manager, Energy Security Department
Andrew Kling
Schneider Electric, Industry Automation Product Security Officer
Stephen Batson
Deloitte, Senior Manager, Risk and Financial Advisory
Processes for Procurement planning (incident notification, coordination of response, vendor access management and control, disclosure, verification of software integrity and authenticity.
Reassessments to address evolving threats
-Contract negotiations reassessed to address areas of risk
What will NERC look for? How well risk mitigation concepts were integrated and implemented, especially vendor risk assessments and security provisions in contracts.
What can we do to prepare?
-Technologies to automate processes
-Centralise documentation
-Streamline collaboration
-Integrated risk management platforms to map policies to controls
How do we manage costs?Philip Tonkin
National Grid, Global Head of Cyber Operational Technology
Matthew Bohne
Honeywell, Vice President, Chief Product Security Officer
Ayman Al Issa
McKinsey & Company, Industrial Cybersecurity Lead and Senior Expert.
Rick Kaun
Verve Industrial Protection, VP of Solutions
Philip Tonkin
National Grid, Global Head of Cyber Operational Technology
Richard Ku
Trend Micro, Sr. Vice President Commercial IoT Security Business and Market Development
Jeff Cornelius, Ph.D
Darktrace, Executive Vice President
Ian Fitzgerald
Truckee Donner Public Utility District, CIO/Information Technology Director
Franky Thrasher
ENGIE Electrabel, Manager Nuclear Cybersecurity
David Batz
Edison Electric Institute, Senior Director, Cyber & Infrastructure Security
Franky Thrasher
ENGIE Electrabel, Manager Nuclear Cybersecurity
Carter Manucy
Florida Municipal Power Agency, Cyber Security Manager
Frank Honkus
E-ISAC, Associate Director, Threat Intelligence, CRISP Program Manager
Richard Ku
Trend Micro, Sr. Vice President Commercial IoT Security Business and Market Development
Stephen Hilt
Trend Micro, Sr. Threat Researcher
Trend Micro, a global leader in cybersecurity, is passionate about making the world safe for exchanging digital information, today and in the future. Artfully applying our XGen™ security strategy, our innovative solutions for consumers, businesses, and governments deliver connected security for data centers, cloud workloads, networks, endpoints, and Operational Technology Networks (OT).
Visit us at www.trendmicro.com
Wednesday, September 25, 2019
Chris Blask
Unisys, Global Director Industrial and IoT Security
James Nesbitt
Cyber Senate, Director and Founder
Introduction to our Chairman and ModeratorChris Blask
Unisys, Global Director Industrial and IoT Security
Nathaniel Evans
Argonne National Laboratory, Cyber Operations Analysis and Research Lead
F. Mitch McCrory
Sandia National Laboratories, Manager, Energy Security Department
Stephen Batson
Deloitte, Senior Manager, Risk and Financial Advisory
Nathan Faith
Exelon Nuclear Corporate Security, Cyber Security Manager
Nathaniel Evans
Argonne National Laboratory, Cyber Operations Analysis and Research Lead
Daryl Haegley
DoD - Office of the Principal Cyber Advisor to the Secretary of Defense, Director, Cyber Mission Assurance and Deterrence
Andre Ristaino
ISCI, Managing Director
Jason Christman
Johnson Controls, Vice President, Chief Product Security Officer
Glenn Merrell
ISA99-08 / 10 Co-chair ISA, ISA Certified Automation Professional Industrial Control Systems Security / Freelance Consulting
FAQ's addressed and talking points to follow
Andrew Kling
Schneider Electric, Industry Automation Product Security Officer
Ray Secrest
Tampa International Airport, Sr. Security Manager
Ayman Al Issa
McKinsey & Company, Industrial Cybersecurity Lead and Senior Expert.
Ayman Al Issa
McKinsey & Company, Industrial Cybersecurity Lead and Senior Expert.
· Conduct Risk/Gap assessments of OT environments
· Instituting a Business Security Liaison program to act as a security focal point for the business units
· Introducing monitoring tools, processes and procedures and consolidation of tools and services between organizations
· Development of a strategic roadmap w/each business unit to document goals and remediation schedules prioritized based on documented risk