Tuesday, September 24, 2019
Trend Micro, Sr. Vice President Commercial IoT Security Business and Market Development
DoD - Office of the Principal Cyber Advisor to the Secretary of Defense, Director, Cyber Mission Assurance and Deterrence
- How mature is cybersecurity in ICS?
- Are we articulating cyber risk appropriately?
- Are we seeing a shift in C Level awareness?
- Is regulation pushing the sector forward?
- Are investments in cyber infrastructure ramping up?
- How are we collectively meeting the challenges of the ageing workforce and terminology barriers?
- Is security still seen as a hindrance? How can we move past this perception?
ATABEY GROUP LLC, President
Sandia National Laboratories, Manager, Energy Security Department
- How can we adopt a secure by design approach, given the challenges of new technology being introduced?
- What tools can show us the entire network including the lower layers of ICS?
- Is there a culture of "Leave well enough alone?" How can we overcome this?
- Is enough attention being given to configuration control?
- Are we patching regularly?
- Are we getting better at locking down remote access to ICS environments?
National Grid, Global Head of Cyber Operational Technology
Honeywell, Vice President, Chief Product Security Officer
McKinsey & Company, Industrial Cybersecurity Lead and Senior Expert.
- What resources are required for us to maintain a clear picture of our supply chain?
- Do we know what needs to be protected and why? How do we protect these assets?
- Do we know the value of the information and assets our suppliers hold?
- Do we have an understanding of who our suppliers are and how do we establish confidence in their cybersecurity maturity levels?
- Are we getting any better at communicating our security needs?
Darktrace, Executive Vice President
Truckee Donner Public Utility District, CIO/Information Technology Director
- How the latest AI technologies automate OT, ICS, sensor and IoT threat detection
- Why Security automation and orchestration makes sense
- Reduce risks and operational errors, improve efficiency, and address the sophisticated cybersecurity threats appearing as cyber-attackers increasingly target industrial environments
Wednesday, September 25, 2019
Panel: Evolving Cyber Risk to Safety Critical Systems: Understanding and Mitigating Dependencies Between Cybersecurity Vulnerabilities and System Safety
Deloitte, Senior Manager, Risk and Financial Advisory
Exelon Nuclear Corporate Security, Cyber Security Manager
Argonne National Laboratory, Cyber Operations Analysis and Research Lead
- Traditional methods to assess the safety of critical infrastructure are insufficient in relation to understanding system failures in complex interconnected systems
- Implications of increased connectivity
- How do we integrate cyber security and safety into a risk management methodology?