Date and Time | Title | |
---|---|---|
Aug 28, 2024 11:00am - 12:02pm (Eastern) | [Opening Keynote] Protecting Against OT and IoT Threats As Operational Technology (OT) and the Internet of Things (IoT) become integral components of organizational infrastructures, the cybersecurity landscape expands into uncharted territory. This session is dedicated to unraveling the intricacies of safeguarding against threats in the OT and IoT realms. Explore strategies for protecting critical infrastructure, manufacturing processes, and interconnected devices from evolving cyber threats. Industry experts share insights, case studies, and practical approaches to fortify defenses, emphasizing the unique challenges posed by the convergence of OT and IoT. Join this comprehensive discussion on securing the future of interconnected technologies in the face of emerging cyber risks. | |
Aug 28, 2024 12:00pm - 12:51pm (Eastern) | AI & Insider Threat: A Story about Data Loss Prevention | |
Aug 28, 2024 12:00pm - 1:04pm (Eastern) | Integrate Transformative OT Cybersecurity Programs to Increase Effectiveness At the operational field, plant, or edge level, growing risks like cybersecurity must be managed amid a need to democratize and expand technology within an increasingly connected workplace. Traditional approaches of handling cyber, analytics, edge, and others as separate IT projects and not addressing these needs as various pieces of a major holistic change effort (including many non-technology aspects) are causing them to fail outright or have poor results. Operational management frameworks are designed to provide consistency and reliability at the field level for various reasons, including safety and environmental priorities, and can create friction with innovative techniques and large-scale change. Culture clashes between OT, IT, and Operations teams and priorities worsen this situation. It’s important to appreciate how transformative OT cybersecurity programs are in order to integrate those objectives and ways of working into existing frameworks. This also allows cybersecurity teams to take advantage of new models and emerging technology which can accelerate progress. Finding and supporting these solutions is not enough though; companies need to apply a different approach to leading their internal change to overcome resistance and improve engagement. | |
Aug 28, 2024 12:00pm - 12:41pm (Eastern) | Manufacturing Foundational Digital Resilience In an increasingly interconnected world, the manufacturing and energy sector faces unprecedented challenges in safeguarding its digital infrastructure. The rise of Industry 4.0 has brought about a fusion of physical and digital systems, making the protection of data, Visibility of IoT (Internet of Things) and OT (Operational Technology) not just a necessity, but a cornerstone for sustainable growth. This talk will focus on foundational digital resilience within the energy and manufacturing industry, emphasizing the importance of visibility across all data sectors, removing internal and external silos, and functional strategies to achieve cybersecurity and infrastructure goals. The discussion will cover the New NIST CSF (V2) controls and key elements of digital resilience, including the adoption of proactive security measures, the role of advanced analytics in threat detection, and the importance of returning to foundational strategies of defense in depth, data to outcome and framework alignment across all levels of an organization. We will discuss strategies for mitigating risks associated with supply chain vulnerabilities, ensuring operational continuity, and maintaining the integrity of critical manufacturing data. By establishing a comprehensive and resilient digital foundation, manufacturers can protect themselves against the growing threat landscape. | |
Aug 28, 2024 1:00pm - 1:49pm (Eastern) | Managing Smart Buildings Service Provider Fragmentation Building control systems have been around since the late 1970s. These systems were digitally controlled and proprietary. The building staff could run the building, but the logic/programming required the system service provider’s knowledge to maintain. Over time, the building staff’s reliance on the service provider grew to the point that the service provider not only has unrestricted local access but also unrestricted remote access. And in most cases, the service provider provides and controls remote access. When you take this into account and multiply it by the number of building control systems per building, the number of service provider technicians that currently have access, and former employees that possibly have access, and then multiply this by the number of buildings owned, this number can be huge. Now take into consideration that most of the service providers are not bound to cybersecurity service provider agreements. These buildings are a high degree of risk exposure for building owners. Learning Objectives:
| |
Aug 28, 2024 1:00pm - 1:47pm (Eastern) | [Panel] Automation in an OT & IoT World | |
Aug 28, 2024 2:00pm - 3:00pm (Eastern) | Pig Butchering, BEC, and Artificial Intelligence: What the Secret Service Wants You to Know | |
Aug 28, 2024 2:00pm - 2:48pm (Eastern) | [Panel] The Current Threat Landscape If we’ve learned one thing from the pandemic it’s that cybercriminals do not take breaks. They are constantly retooling and trying new approaches. They collaborate—often better than we do. It is time for us to join forces, identify the most likely of risks to our organizations, and strengthen our networks. We’ve got to get our developers on board, as well, as it’s got to be secure before it goes to market. And what about all the careless clicking from employees? It’s a huge task, but we don’t have to do it alone. Join our panel of experts as they unpack the current threat landscape and offer ideas on how to start making effective changes within your organization. | |
Aug 28, 2024 3:00pm - 3:54pm (Eastern) | Employing a Strategic Approach to Managing Shared Supply Chain Risk | |
Aug 28, 2024 3:00pm - 3:38pm (Eastern) | Fortifying Identity Security Defenses with AI-Powered Threat Protection Cybersecurity threats are targeting identity vulnerabilities. Traditional methods fall short against complex threats. Our webinar will highlight AI-driven solutions for identity threat protection and the importance of a unified security strategy. What you will learn:
| |
Aug 28, 2024 4:00pm - 5:07pm (Eastern) | [Closing Keynote] Navigating the Future: Privacy and Cybersecurity Challenges in the Era of an All-Connected World The proliferation of smart products being manufactured is staggering. If you can see it, smell it, touch it, wear it, ride in it, hear it, or…whatever…you can computerize it in some way to improve life, surveil others, provide protection, fix bodies, be entertaining; the list is endless. A lot of thought goes into making “bells and whistles” to make a product useful in some way at a price low enough to motivate purchases, reaping as much profits to the manufacturers and retailers, and/or benefits to those using the product, as possible. The potential for building radical, innovative advancements in transportation, lifestyles, clothing, consumer health, education, safety, environment, technology, recreation, housing, finance, nutrition and communication is exciting! However, what often gets lost in the excitement of the possibilities are the manufacturers’ and retailers’ considerations for, and critical conversations about, the privacy and cybersecurity risks inherent in using these smart devices and associated components. Subsequently, security and privacy controls are not engineered into the full smart products’ components. This session will explore the multifaceted challenges surrounding privacy and cybersecurity in the era of a world where anything that exists could potentially be a smart product. Rebecca will delve into the intricacies of data collection, transmission, and storage within these technologies, examining the potential vulnerabilities and privacy concerns that arise as consumers surreptitiously become interconnected with their surroundings, and ultimately a wide range of organizations that utilize their collected data in a variety of ways. Key topics to be addressed include the secure transmission of sensitive personal data, the collection and sharing of personal data by smart products, and the ethical considerations of balancing advancements in consumer products with individual data protection. Real-world use cases will be presented, illustrating both the potential benefits and risks associated with such products as smart automobiles and roadways, smart jewelry, smart travel products and fitness trackers. Attendees will gain valuable insights into best practices for engineering robust cybersecurity capabilities into such products, ensuring personal data confidentiality, and navigating the evolving regulatory landscape. This session aims to empower manufacturing engineers, technology developers, and policymakers with the knowledge needed to strike a balance between innovation and the protection of consumer privacy in the dynamic and expanding landscape of smart consumer products. Join us for an engaging discussion that paves the way for a secure and ethical future in an increasingly connected world. |