Wednesday, September 22, 2021
The Journey to OT Cybersecurity Resilience: Readiness in a Digitally Transformed World (Physical Live)
Day Schedule Sept 22nd. Free to all Asset Owners. All times are EST
Breakfast 8-8:45 am
Golf 9:00 am
Lunch 12:30 pm
Workshop: 1:30 pm
1:30 pm – 5:00 pm Workshop
Fortinet Workshop The Journey to OT Cybersecurity Resilience: Readiness in a Digitally Transformed World
1:30 pm Welcome, introduction, Rick Peters, CISO
1:50 pm Cybersecurity Expert Panel, Willian Noto, Director Product Marketing
Panelists: Rick Peters, M. Garcia, Royal Caribbean, Andrew Kling, Schneider Electric
2:50 pm Break
3:00 pm Cyber Readiness Continuous Improvement, Danny Bren, CEO - Otorio
· Threat Intelligence
· Risk Assessment for improving maturity
4:00 pm The Cybersecurity Maturity Journey: People, Process and Technology | Rick Peters, CISO, Willian Noto, Director Product Marketing
4:30 pm Threat Actors You’ll Meet Along the Way (fun interactive discussion) | Rick Peters, CISO, Willian Noto, Director Product Marketing
5:00 pm Wrap up
With the explosion of applications and connected devices on the network, securing the enterprise becomes more complex. The operational technology (OT) networks bring an expanding perimeter of thousands of edges that have to be managed and protected. This trend is shifting how we think about the cybersecurity needs of an industrial control systems (ICS) environment.
As information technology (IT) and OT converge, leaders are challenged to protect the enterprise against advanced threats across an expanding attack surface and a complex ecosystem which includes too many vendors, too many alerts and slow response time. On top of this, organizations must balance increasing compliance and regulatory requirements all while threat actors attempt to take advantage of the disruption caused by this digital transformation.
During this Fortinet-led, interactive workshop, you’ll have an opportunity to
- Engage with a panel of your peers on how they have tackled the convergence challenge and set up their journey toward continual cybersecurity improvement.
- Test your knowledge on the impact of a breach on your OT environment and the cybersecurity needs you should consider for detection through prevention.
- Leverage a set of best practices that provide practical guidance for building and maturing your security strategy including tips on measuring the return on your security investments.
FORTINET WORKSHOP LEADERS:
Richard K. Peters (Rick), CISO, Operational Technology North America
Rick brings the Fortinet OT-CI team more than 37 years of cybersecurity and global partnering experience working across foreign, domestic, and commercial industry sectors at the National Security Agency (NSA). As Fortinet’s Operational Technology North American CISO, he delivers cybersecurity defense solutions and insights for the OT/ICS/SCADA critical infrastructure environments. Prior to Fortinet, Rick led development of cyber capability across Endpoint, Infrastructure, and Industrial Control System technologies at the agency. Previously, Rick also served as an executive leader supporting the Information Assurance Directorate at the NSA. Earlier in his career, he served in a broad range of leadership and Engineering roles including Chief of Staff for the NSA Cyber Task Force and a 5-year forward liaison charged with directing integration of cyber and cryptologic solutions for U.S. Air Force Europe, Ramstein AFB, Germany.
William Noto, Director of Product Marketing – Operational Technology
William Noto leads Fortinet’s OT security product marketing initiatives globally. Prior to joining Fortinet, William spent 12 years at General Electric in both the GE Wind and GE Digital business units. At GE, William held product management and sales roles developing OT security offerings including WindSCADA Secure, the Predix Edge platform, and the OpShield and Achilles product lines. William holds an MBA from the UMass Isenberg School of Management and a BA in Computer Science from Middlebury College.
Thursday, September 23, 2021
A discussion on the parameters of the EO, the impacts on operational technology, what end users can expect and current thinking on what it does and not cover for us!
Targeted ransomware has emerged as a major threat to industrial operations / OT systems. The Colonial Pipeline and JBS shutdowns are only the latest incident - in 2020, 53 industrial sites were shut down by targeted ransomware. The trend is likely to worsen - today's targeted attacks use tools and techniques comparable to those used exclusively by nation states only a half decade ago.
Operational Technology (OT) cyber risk manages cyber threats to physical operations. Some enterprise security mechanisms are very costly to apply in OT systems because of extended safety, equipment protection and other OT risk management programs. We see emergency risk avoidance mechanisms which are unique to the OT space, but are under-utilized by enterprise risk management and security practitioners.
This presentation highlights three such innovative cyber risk management approaches and examines their effectiveness against the pervasive threat of targeted ransomware with particular attention on the operations risk. The presentation will outline a simple and robust approach to managing OT cyber risks, including Security PHA Review (SPR), Consequence-Driven, Cyber-Informed Engineering (CCE), and Secure Operations Technology (SEC-OT). Secure sites in the industry are improving protection for their operations by cherry-picking techniques from these new methodologies. Join us for a whirlwind tour of trends in OT and industrial operations attacks and defenses.
The topic of software bill of materials (SBoM) to provide transparency into software supply chain risks and vulnerabilities for critical infrastructure is gaining momentum through such efforts as the Cybersecurity Executive Order 14028 and the EEI Model Procurement Contract Language. Additionally demand for suppliers to provide insights into their hardware supply chains and foreign adversarial risks is also producing the need for compliance with NDAA Section 889. These requests for transparency have raised many questions about how to meet requirements and do so in a secure fashion.
Join Fortress Information Security to learn how a Cyber Bill of Materials can support supply chain risk management for asset owners and suppliers alike.
Presentation Highlights and Take-Aways:
· An overview of recent cyber-attacks and the supply chain threat landscape for ICS
· Breakdown of supply chain security regulations: Section 889 A & B, NERC-CIP regulations and Executive Order 14028
· The Importance of both Software (SBOM) and Hardware Bill of Materials (HBOM) & 4th Party Evaluations
· Identifying and mitigating supplier concerns for adoption – Cutting through the Fear, Uncertainty and Doubt
· Continuous Monitoring, Attestation sharing and use of Blockchain as a force multiplier to secure the industry
· BOM supplier and purchaser coordination for success
There is a large effort to quickly bring SBOM to the OT industry. Then what? I get impact analysis will in part be faster. But what about provenance? What happens if a US company discovers there is a SW component from China? Or the Chinese discover the component they thought was from Hong Kong is actually from Japan? The geopolitical implications can be significant. How is the drive towards regionalism and away from globalism going to affect our industry?
How do SBOMS currently work (examples)- What are they? Who is currently utilizing them?
How can asset owners use SBOM?
Additional dialogue if time allows:
Are they secure? Is the code being updated upstream?
Who is going to maintain SBOMs?
Who at the facility (asset owner/end user) is responsible for maintaining and monitoring the SBOM?
Concept to Commissioned - A UK NG Case Study Implementing an Innovative Networking Solution called SEL OT SDN (Physical and Virtual)
There are plethora of incredible cyber risk reducing innovative solutions being brought to market. This discussion will highlight the milestones required for an OT system owner and vendor to overcome in order to bring significant risk reducing solutions from innovation, to market, to implementation. Operational Technology Software Defined Networking (OT SDN) will be the backdrop to this story line between UK NG and SEL.
Topics to be discussed in order for innovation to be implemented:
- Innovation requires acceptance into standards and frameworks
- Standard and frameworks require acceptance into regulation
- Regulation is important for acquisition and to become added to specification and designs
- Timing and funding become involved to put innovation into new or legacy projects
- Innovation acceptance additionally involves training, education, experience, and cultural change
- Any innovation also requires careful consideration to not increase operational risk
All of the above compete with adversaries who use the time it take to move from innovation to implementation to find gaps and seams and weaknesses in these system before they are even deployed. This presentation will address ways to reduce the time between milestones to implement innovation faster and safer to ultimately reduce risk?
Friday, September 24, 2021
- OT monitoring
- SOC integration
- Digital Immunity
- 3rd Party Risk
- Remote Access
Panel: Innovation and Security- How can we embrace technology innovation securely (Physical and Virtual)
Technology Maturity - what impacts does this have on the implementation?
How much disruption when integrating into existing processes should be expected and how can we keep that to a minimum?
How can we view "innovation" as a journey rather than a destination-is the environment adaptable? How can it be made adaptable? Are the "innovations" scalable so we are not always starting from scratch?
How do we keep risk to a minimum? What does the process of execution look like?
Is speed of the implementation prioritised and what impacts does it have
In this era of converged Building Control Systems, the HVAC, Lighting, Fire, Parking, Elevators, Digital Signage have now become attack surfaces that can be used to compromise not just the building systems, but also the tenants and visitors of the building and their organizational IT systems. In this session we will explore some of the best practices for adopting Zero Trust architectures, use of Cloud services, SOC-as-a-Service, and Contingency Planning/Disaster Recovery for when a cyber incident does occur. Buildings are exceptionally difficult to protect as they are used in every sector but can have different ownership types (REITS, government, private sector), levels of physical security (contract guard, secure facility, Defense Industrial Base, etc.), different levels of energy security (stand-by power, prime power, Distributed Energy Resources), different levels of recovery/resiliency (medical, data centers, commercial office space, residential, etc.) and different financial business models (Triple Net Lease, Energy Savings Performance Contracts, LEED, EPA Energy Star, etc.). The session will look at the proliferation of attack surfaces address, examine the cost savings versus the potential impacts, how to balance risk to succeed -what does that risk management strategy look like? The building owners ultimately need to decide if they are sacrificing security for efficiency and the role their building will play in their portfolio for the next decades.
How are we:
Cybersecurity needs to lead the business case
Getting data out of OT?
Using data coming out of OT?
How can we protect it once we have it?
Is it accessible?
How are we using the data?
How can we separate actionable intelligence from white noise?
What is the business case, why are we gathering it?
Panel Case Study: Business Continuity Planning, How TPA successfully navigated and prepared for the pandemic. (Physical)
· How the vision developed and why we felt this journey was necessary
· Identifying gaps in current plans and understanding the stakeholders in planning
· Breaking down silo's between departments - A look at the challenges, how do we bring the vision to fruition?
· Collaboration between IT and Operations Maturing of our efforts and their impacts (enhanced security, cultural shift in taking ownership of cyber/operational interconnectivity)
· What we see in the future
Further panellists to be announced.
OEMs are taking a more active approach to product security and development, Patching is one of the oldest and most traditional ways to manage risk. It also is a slow and expensive way to manage risk so it is frequently avoided in the OT world. What else should be considered to manage risk?