Control Systems Cybersecurity USA (8th annual live) Control Systems Cybersecurity USA (8th annual live)

Attend

This event is invite-only.

Date


EDT
 

Location

Kenzie's
7600 Mystic Dunes Lane
Celebration, FL

Schedule

Wednesday, September 22, 2021

- EDT
The Journey to OT Cybersecurity Resilience: Readiness in a Digitally Transformed World (Physical Live)
Richard K. Peters
Richard K. Peters
Fortinet, Operational Technology North American CISO
William Noto
William Noto
Fortinet, Director, Product Marketing, Operational Technology

Day Schedule Sept 22nd. Free to all Asset Owners. All times are EST

Breakfast 8-8:45 am
Golf 9:00 am
Lunch 12:30 pm
Workshop: 1:30 pm 

Register here

1:30 pm – 5:00 pm Workshop

Fortinet Workshop The Journey to OT Cybersecurity Resilience: Readiness in a Digitally Transformed World

1:30 pm  Welcome, introduction, Rick Peters, CISO

1:50 pm  Cybersecurity Expert Panel, Willian Noto, Director Product Marketing

                Panelists:  Rick Peters, M. Garcia, Royal Caribbean, Andrew Kling, Schneider Electric

2:50 pm  Break

3:00 pm  Cyber Readiness Continuous Improvement, Danny Bren, CEO - Otorio

·         Threat Intelligence

·         Risk Assessment for improving maturity

·         Etc.

4:00 pm The Cybersecurity Maturity Journey: People, Process and Technology | Rick Peters, CISO,  Willian Noto, Director Product Marketing 

4:30 pm  Threat Actors You’ll Meet Along the Way (fun interactive discussion) | Rick Peters, CISO,  Willian Noto, Director Product Marketing 

5:00 pm Wrap up

5:15 end

Overview:

With the explosion of applications and connected devices on the network, securing the enterprise becomes more complex.   The operational technology (OT) networks bring an expanding perimeter of thousands of edges that have to be managed and protected.  This trend is shifting how we think about the cybersecurity needs of an industrial control systems (ICS) environment.

As information technology (IT) and OT converge, leaders are challenged to protect the enterprise against advanced threats across an expanding attack surface and a complex ecosystem which includes too many vendors, too many alerts and slow response time.  On top of this, organizations must balance increasing compliance and regulatory requirements all while threat actors attempt to take advantage of the disruption caused by this digital transformation.

During this Fortinet-led, interactive workshop, you’ll have an opportunity to

  • Engage with a panel of your peers on how they have tackled the convergence challenge and set up their journey toward continual cybersecurity improvement.
  • Test your knowledge on the impact of a breach on your OT environment and the cybersecurity needs you should consider for detection through prevention.
  • Leverage a set of best practices that provide practical guidance for building and maturing your security strategy including tips on measuring the return on your security investments.

FORTINET WORKSHOP LEADERS:

Richard K. Peters (Rick), CISO, Operational Technology North America

Rick brings the Fortinet OT-CI team more than 37 years of cybersecurity and global partnering experience working across foreign, domestic, and commercial industry sectors at the National Security Agency (NSA).  As Fortinet’s Operational Technology North American CISO, he delivers cybersecurity defense solutions and insights for the OT/ICS/SCADA critical infrastructure environments.  Prior to Fortinet, Rick led development of cyber capability across Endpoint, Infrastructure, and Industrial Control System technologies at the agency.  Previously, Rick also served as an executive leader supporting the Information Assurance Directorate at the NSA.  Earlier in his career, he served in a broad range of leadership and Engineering roles including Chief of Staff for the NSA Cyber Task Force and a 5-year forward liaison charged with directing integration of cyber and cryptologic solutions for U.S. Air Force Europe, Ramstein AFB, Germany.

 William Noto, Director of Product Marketing – Operational Technology

William Noto leads Fortinet’s OT security product marketing initiatives globally. Prior to joining Fortinet, William spent 12 years at General Electric in both the GE Wind and GE Digital business units. At GE, William held product management and sales roles developing OT security offerings including WindSCADA Secure, the Predix Edge platform, and the OpShield and Achilles product lines. William holds an MBA from the UMass Isenberg School of Management and a BA in Computer Science from Middlebury College.

Thursday, September 23, 2021

- EDT
Keynote: This is your Wake Up Call, How can we improve? (Physical Live)
Patrick Miller
Patrick Miller
Independent Consultant

A discussion on recent attacks, where we are as industry, what mistakes we are seeing time and time again within the industry and how we may wish to address them so we can progress more effectively.

 

- EDT
Executive Order Impacts on OT Security (Physical)
Pedro Serrano
Pedro Serrano
Grand River Dam Authority, Chief Information Security Officer (CISO)

A discussion on the parameters of the EO, the impacts on operational technology, what end users can expect and current thinking on what it does and not cover for us! 

- EDT
Industrial Defender Asset Management Demo

Asset visibility and management are two distinct but equally indispensable aspects of industrial cybersecurity. Ensuring visibility and management solutions can work in parallel to make the data received actionable is crucial. 

A simple way to do this is to use a single tool that offers asset visibility and management in one place, with both active and passive options. Gaining situational awareness through asset visibility, and self-control through asset management can prepare your OT systems to withstand cyber threats.

 

Industrial Defender safely collects, monitors and manages your OT assets at scale using agent, agentless or passive data collection methods.

 

Watch this demo to learn how our solution goes beyond asset visibility to enable you to:

  • Quickly onboard and decommission assets
  • Analyze how your assets are changing over time
  • Create baselines to monitor for anomalies in an asset’s software, patches, ports & services, firewall rules, user accounts and more
- EDT
Networking and Sponsor Demonstrations

Meet all of our sponsors in the physical exhibitor room for demonstrations, coffee and snacks. 

Hear live demonstrations on our virtual platform!
Industrial Defender: 11am live demo

 

- EDT
Targeted Ransomware requires New Approaches to OT Cyber Risk Management (Physical Live)
Michael Firstenberg
Michael Firstenberg
Waterfall Security Solutions, Director of Industrial Security

Targeted ransomware has emerged as a major threat to industrial operations / OT systems. The Colonial Pipeline and JBS shutdowns are only the latest incident - in 2020, 53 industrial sites were shut down by targeted ransomware. The trend is likely to worsen - today's targeted attacks use tools and techniques comparable to those used exclusively by nation states only a half decade ago. 

Operational Technology (OT) cyber risk manages cyber threats to physical operations. Some enterprise security mechanisms are very costly to apply in OT systems because of extended safety, equipment protection and other OT risk management programs. We see emergency risk avoidance mechanisms which are unique to the OT space, but are under-utilized by enterprise risk management and security practitioners. 

This presentation highlights three such innovative cyber risk management approaches and examines their effectiveness against the pervasive threat of targeted ransomware with particular attention on the operations risk. The presentation will outline a simple and robust approach to managing OT cyber risks, including Security PHA Review (SPR), Consequence-Driven, Cyber-Informed Engineering (CCE), and Secure Operations Technology (SEC-OT). Secure sites in the industry are improving protection for their operations by cherry-picking techniques from these new methodologies. Join us for a whirlwind tour of trends in OT and industrial operations attacks and defenses.

- EDT
Working Together to Achieve Supply Chain Transparency (Physical Live)
Tony Turner
Tony Turner
Fortress Information Security, VP Security Solutions

The topic of software bill of materials (SBoM) to provide transparency into software supply chain risks and vulnerabilities for critical infrastructure is gaining momentum through such efforts as the Cybersecurity Executive Order 14028 and the EEI Model Procurement Contract Language. Additionally demand for suppliers to provide insights into their hardware supply chains and foreign adversarial risks is also producing the need for compliance with NDAA Section 889. These requests for transparency have raised many questions about how to meet requirements and do so in a secure fashion.

 

Join Fortress Information Security to learn how a Cyber Bill of Materials can support supply chain risk management for asset owners and suppliers alike.

 

Presentation Highlights and Take-Aways:

·  An overview of recent cyber-attacks and the supply chain threat landscape for ICS

·  Breakdown of supply chain security regulations: Section 889 A & B, NERC-CIP regulations and Executive Order 14028

·  The Importance of both Software (SBOM) and Hardware Bill of Materials (HBOM) & 4th Party Evaluations

·  Identifying and mitigating supplier concerns for adoption – Cutting through the Fear, Uncertainty and Doubt

·  Continuous Monitoring, Attestation sharing and use of Blockchain as a force multiplier to secure the industry

·  BOM supplier and purchaser coordination for success

- EDT
Networking Lunch and Expo

Network with our physical exhibitors, or meet them virtually!

(If you have watched presentations online this morning you can navigate to any of the virtual stand spaces. )

- EDT
Securing the ICS Software Supply Chain (Virtual)
Eric Byres (Virtual pres)
Eric Byres (Virtual pres)
aDolus Technology Inc, CEO

Thanks first to the Solarwinds attack and then Executive Order 14028 -  Improving the Nation’s Cybersecurity, the security of the software supply chain has become the hot topic of the year. The Colonial Pipeline ransomware attack made critical infrastructure security front page news. This talk will look at the intersection of these two challenges - why securing the supply chain for critical OT environments is now an urgent priority for asset owners, suppliers and government agencies. In this session you will learn:

  • Why supply chain and ransomware attacks are dramatically increasing 
  • The new obligations set out in EO14028 that industry will need to follow
  • How EO14028 requirements will ripple far beyond government contracts
  • How Software Bill of Materials (SBOMs) will help secure software supply chains
  • What asset owners should be demanding from their OEM Vendors to secure OT systems
  • Why AI will be crucial for locating and prioritizing product vulnerabilities



- EDT
There is a large effort to quickly bring SBOM to the OT industry. Then What? (Physical Live)
Andrew Kling
Andrew Kling
Schneider Electric, Product Security Officer

There is a large effort to quickly bring SBOM to the OT industry. Then what? I get impact analysis will in part be faster. But what about provenance? What happens if a US company discovers there is a SW component from China? Or the Chinese discover the component they  thought was from Hong Kong is actually from Japan? The geopolitical implications can be significant. How is the drive towards regionalism and away from globalism going to affect our industry?

- EDT
Networking Expo (Physical and Virtual!)

Meet our exhibitors physically or virtually! 

If you have watched presentations this morning you will already have seen the booths online and be able to access their demonstrations through that link. 

If not you will need to contact us [email protected] 

 

- EDT
Panel: How do SBOM's work and How do Asset Owners Deploy One? (Physical and Virtual)
Eric Byres (Virtual pres)
Eric Byres (Virtual pres)
aDolus Technology Inc, CEO
Tony Turner
Tony Turner
Fortress Information Security, VP Security Solutions
Chris Blask
Chris Blask
Advisor and SME, Chair ICS ISAC
Steve Springett (Virtual pres)
Steve Springett (Virtual pres)
OWASP CycloneDX Core Working Group, Chair of the OWASP CycloneDX Core Working Group

How do SBOMS currently work (examples)- What are they? Who is currently utilizing them?
How can asset owners use SBOM?

Additional dialogue if time allows:
Are they secure? Is the code being updated upstream?
Who is going to maintain SBOMs?
Who at the facility (asset owner/end user) is responsible for maintaining and monitoring the SBOM?

- EDT
How to Approach Cybersecurity in a Transitional Industry (Physical Live)
Franky Thrasher
Franky Thrasher
ENGIE Electrabel, Nuclear Cybersecurity Manager

A deeper discussion into cybersecurity for a post operational world, dismantlement, inventory tracking and management and the challenges for operational decommissioning.

- EDT
Concept to Commissioned - A UK NG Case Study Implementing an Innovative Networking Solution called SEL OT SDN (Physical and Virtual)
Philip Tonkin (Virtual pres)
Philip Tonkin (Virtual pres)
National Grid, Global Head of Cyber Operational Technology
Tim Watkins
Tim Watkins
Schweitzer Engineering Laboratories, Lead Application Engineer for Networks / Systems with focus in OT-SDN

There are plethora of incredible cyber risk reducing innovative solutions being brought to market.  This discussion will highlight the milestones required for an OT system owner and vendor to overcome in order to bring significant risk reducing solutions from innovation, to market, to implementation.  Operational Technology Software Defined Networking (OT SDN) will be the backdrop to this story line between UK NG and SEL.   

 

Topics to be discussed in order for innovation to be implemented:

  • Innovation requires acceptance into standards and frameworks 
  • Standard and frameworks require acceptance into regulation
  • Regulation is important for acquisition and to become added to specification and designs
  • Timing and funding become involved to put innovation into new or legacy projects
  • Innovation acceptance additionally involves training, education, experience, and cultural change  
  • Any innovation also requires careful consideration to not increase operational risk

 

All of the above compete with adversaries who use the time it take to move from innovation to implementation to find gaps and seams and weaknesses in these system before they are even deployed. This presentation will address ways to reduce the time between milestones to implement innovation faster and safer to ultimately reduce risk?


 

Friday, September 24, 2021

- EDT
Large Program Rollouts, New Technologies Cross Sector (Physical and Virtual)
Steve Batson
Steve Batson
Deloitte, Senior Manager Cyber Risk Emerging Technologies / IOT
Ramsey Hajj
Ramsey Hajj
Deloitte & Touche LLP, Principal Cyber Risk
Jason Hunt
Jason Hunt
Deloitte & Touche LLP, Senior Manager  Cyber Risk
Douglas Powers
Douglas Powers
Deloitte & Touche LLP, Managing Director
Kevin Gautreaux
Kevin Gautreaux
FED EX, Manager Cyber Security Information Security
  • OT monitoring
  • Segmentation
  • SOC integration
  • Standards
  • Digital Immunity
  • 3rd Party Risk
  • Remote Access
- EDT
Panel: Innovation and Security- How can we embrace technology innovation securely (Physical and Virtual)
Andy Bochman (Virtual pres)
Andy Bochman (Virtual pres)
National & Homeland Security Idaho National Laboratory, Senior Grid Strategist
Steve Batson
Steve Batson
Deloitte, Senior Manager Cyber Risk Emerging Technologies / IOT
Tim Watkins
Tim Watkins
Schweitzer Engineering Laboratories, Lead Application Engineer for Networks / Systems with focus in OT-SDN
Richard K. Peters
Richard K. Peters
Fortinet, Operational Technology North American CISO

Technology Maturity - what impacts does this have on the implementation?
How much disruption when integrating into existing processes should be expected and how can we keep that to a minimum?
How can we view "innovation" as a journey rather than a destination-is the environment adaptable? How can it be made adaptable? Are the "innovations" scalable so we are not always starting from scratch? 
How do we keep risk to a minimum? What does the process of execution look like?
Is speed of the implementation prioritised and what impacts does it have


- EDT
Expo and Networking

Meet our exhibitors physically or virtually! You will have had access to the presentations and have seen the opportunity to meet our exhibitors through the same platform, if you need help contact [email protected] 

 

- EDT
Adapting to the Threat Environment (Virtual)
Rob Scott (Virtual pres)
Rob Scott (Virtual pres)
Bechtel, Senior Project Manager and Cybersecurity Business Manager
Katie Pehrson (Virtual pres)
Katie Pehrson (Virtual pres)
Bechtel, Industrial Control Systems Lab Manager
  • Vanishing divide between IT and OT
  • What is the voice of the customer?
  • Dealing with the hype and understanding the threats
  • Integration of technologies and partnerships
  • Beyond OT Cybersecurity to Asset Performance Management
- EDT
Networking Expo and Lunch

 Time for food and networking! See you in the exhibitor hall, physical or virtual! You will already have access to our exhibitors if you have been watching presentations! If you need help contact [email protected]

 

- EDT
Building Control Systems-Don’t Trust Anybody or Anything (Physical)
Michael Chipley
Michael Chipley
PMC Group, President

In this era of converged Building Control Systems, the HVAC, Lighting, Fire, Parking, Elevators, Digital Signage have now become attack surfaces that can be used to compromise not just the building systems, but also the tenants and visitors of the building and their organizational IT systems. In this session we will explore some of the best practices for adopting Zero Trust architectures, use of Cloud services, SOC-as-a-Service, and Contingency Planning/Disaster Recovery for when a cyber incident does occur. Buildings are exceptionally difficult to protect as they are used in every sector but can have different ownership types (REITS, government, private sector), levels of physical security (contract guard, secure facility, Defense Industrial Base, etc.), different levels of energy security (stand-by power, prime power, Distributed Energy Resources), different levels of recovery/resiliency (medical, data centers, commercial office space, residential, etc.) and different financial business models (Triple Net Lease, Energy Savings Performance Contracts, LEED, EPA Energy Star, etc.). The session will look at the proliferation of attack surfaces address, examine the cost savings versus the potential impacts, how to balance risk to succeed -what does that risk management strategy look like? The building owners ultimately need to decide if they are sacrificing security for efficiency and the role their building will play in their portfolio for the next decades.

- EDT
DoD’s Priorities, Major Efforts and Way Forward (Virtual)
Daryl Haegley (Virtual pres)
Daryl Haegley (Virtual pres)
DOD, Director, Mission Assurance & Deterrence Principal Cyber Advisor to SECDEF OASD HD&GS

A presentation on the US DoD’s priorities, major efforts and way forward.  

- EDT
Panel: OT Data Science (Physical and Virtual)
Carter Manucy
Carter Manucy
Florida Municipal Power Agency, IT/OT & Cybesecurity Director
Sarah Freeman (Virtual pres)
Sarah Freeman (Virtual pres)
Cybercore Integration Center at Idaho National Laboratory (INL), Industrial Control Systems (ICS) Cyber Security Analyst
Michael Lester (Virtual pres)
Michael Lester (Virtual pres)
Emerson Automation Solutions, Director of Cybersecurity Strategy, Governance and Architecture
Peter Lund
Peter Lund
Industrial Defender, VP, Product Development

How are we:
Cybersecurity needs to lead the business case
Getting data out of OT?
Using data coming out of OT?
How can we protect it once we have it?
Is it accessible?
How are we using the data?
How can we separate actionable intelligence from white noise?
What is the business case, why are we gathering it?

- EDT
Networking and Expo

Enjoy the networking! It's been a long time! Be safe, however! You can network online also, if you have questions about accessing the platform contact [email protected]

- EDT
Panel Case Study: Business Continuity Planning, How TPA successfully navigated and prepared for the pandemic. (Physical)
Ray Secrest
Ray Secrest
Tampa International Airport (TPA), Sr. Manager, Information Security
Aimee Pidgeon
Aimee Pidgeon
Tampa Airport, Manager, Emergency Management and Special Projects

·       How the vision developed and why we felt this journey was necessary 

·       Identifying gaps in current plans and understanding the stakeholders in planning 

·       Breaking down silo's between departments - A look at the challenges, how do we bring the vision to fruition?

·       Collaboration between IT and Operations Maturing of our efforts and their impacts (enhanced security, cultural shift in taking ownership of cyber/operational interconnectivity)

·       What we see in the future

 

- EDT
Panel: How Can We Manage Risk Faster? (Physical and Virtual)
Andrew Kling
Andrew Kling
Schneider Electric, Product Security Officer
Michael Lester (Virtual pres)
Michael Lester (Virtual pres)
Emerson Automation Solutions, Director of Cybersecurity Strategy, Governance and Architecture

Further panellists to be announced.

OEMs are taking a more active approach to product security and development, Patching is one of the oldest and most traditional ways to manage risk. It also is a slow and expensive way to manage risk so it is frequently avoided in the OT world. What else should be considered to manage risk?

- EDT
Closing Wash Up and Key Takeaways

We return in November in London for the European UK show, then we host the Rail Cybersec Summit in London in February and in March! www.cybersenate.com

Thank you for your contribution, time and commitment!