Agenda Day 1

7:00 AM - 8:00 AM IT/OT Systems: Making Them Work Together

  • Financial confines of replacing antique systems in OT
  • Implementation of systems to bridge conversion between operations and information systems
  • Advancing training techniques for employees directly involved

8:00 AM - 8:45 AM Registration and Coffee

8:45 AM - 9:00 AM Chairperson’s Welcoming Remarks

9:00 AM - 9:45 AM Cyberattacks & Emerging Threats: Ransomware, Other Threats from the Cutting Edge and Lessons Learned from Recent Breaches

  • Identifying the objectives needed to complete the cyber intrusion
  • Understanding the inherent advantages a defender has if the attack is properly identified
  • Identifying the end target of the intrusion in a timely manner

9:45 AM - 10:30 AM A Vendor’s Approach at Increasing Cyber Security

  • Programs and applications designed to detect and block malware
  • Current and future market needs in cybersecurity and malware protection
  • Planning budgetary confinements around sufficient security measures

10:30 AM - 10:45 AM Morning Refreshment Break

10:45 AM - 1:00 PM Identifying and Evaluating Privacy Risks and Making Smart Privacy Engineering Decisions

  • Understanding the distinctions and overlaps between privacy and security
  • Helping to understand the privacy risks and ramifications of new technology implementations
  • Designing information systems to protect privacy, now and in the future

10:45 AM - 1:00 PM Developing and Implementing Effective User Awareness Training Programs

  • Adapting vulnerability assessment of current programs and their successes
  • Educating staff and employees on system updates to prepare for proper detection of system changes
  • Implementing company wide changes to uphold safety management among staff

10:45 AM - 1:00 PM Facilitating IT Management Techniques for Uniform Incident Response

  • Implementing proper management techniques for IT Security
  • Reacting to threat detection and incident response
  • Investigating accurate channels for incident response measures

1:00 PM - 2:00 PM Networking Luncheon

All the morning hustle and bustle has probably made for a much- needed lunch break! Join us for a delicious lunch and make new friends at your table.

2:00 PM - 2:45 PM Budgetary and Infrastructure Changes to Revamp Security Efficiency: What is the Investment Needed?

· Increasing budgets in basic needs- data rooms and tech equipment
· Investing in the renewal of system facilities and removing vulnerable software
· Updating training for new equipment and employee capabilities.

2:45 PM - 3:30 PM Panel: Industrial Control Systems (ICS) Security: Innovations and Bridging the Gap in IT-OT Convergence

· Updating operational systems to meet current needs to limit hacking
· Integrating IT components into the OT systems to limit risk of production failures
· Treating the OT system hacks as a safety issue rather than security issue

3:30 PM - 4:00 PM Chairperson Closing Remarks/ Break

4:00 PM - 5:00 PM End of Day 1- Cocktail Reception

OPERATION: HACKER ATTACK
Meet with hackers who will give you a real time showing of their hacking capabilities and what makes it so easy to enter systems.