09:00 - 09:05

Chairman's Welcome 


09:05 - 09:25

► Securing IoT – Creating a secure, digital shop floor
Rob Flanders, Head of Threat and Incident Response, BAE Systems

  • Integration with Enterprise Security Systems
  • Pitfalls and Examples
  • Lessons Learned and Strategic Approaches
09:25 - 09:45

► Challenges and Best Practices for Securing Modern Operational Technology Networks

Tim Roddy, Vice President of Marketing, Open Systems

  • Why legacy approaches to securing operational technology are failing
  • How you should update your network security and network access controls to protect this critical infrastructure
  • How a secure access services edge (SASE) solution can support your smart OT security strategy
09:45 - 10:05

► Securing Manufacturing Infrastructure with Internet Intelligence

Nick Palmer, Senior Solutions and Customer Success Engineer, Censys

  • How to gain visibility of misconfigurations and how they can expose manufacturing operations to serious disruption from attackers.
  • Methods of understanding attacker infrastructure associated with malicious operations to support threat intelligence use cases.
  • How to secure your wider internet facing infrastructure to prevent attackers moving laterally towards your manufacturing operations to interrupt production and extort money
10:05 - 10:20

► The Utopia of European Cybersecurity Certification – Automation of Compliance

Dr. Jesus Luna Garcia, Cybersecurity Governance – Cloud and AI, Robert Bosch GmbH

  • The challenges and opportunities of the upcoming certifications derived from the European Cybersecurity Act
  • The benefits of automating traditional cybersecurity certification processes, summarizing practical experiences related to the upcoming EU certification scheme for cloud services (EUCS)
  • How automation can support cybersecurity certifications related to new EU Regulations (e.g., NIS2, and AI Act)? A view on our ongoing activities
10:20 - 10:25

Comfort Break

10:25 - 10:40

► Current Security Trends, Challenges and Opportunities in Operational Technology

Giles Dunn, Partner, UK OT Cyber Lead, EY

  • What are the trends and challenges we are seeing across Operational Technology including new regulatory demands. 
  • Can we finally see Cyber spend as an operational benefit  
  • What opportunities can we realise from cyber good practice


10:40 - 11:00

► Securing IoT and OT with DNS

Trish Almgren, Senior Product Marketing Manager & Field Evangelist, Infoblox 

  • Ransomware for manufacturers is on the rise, with more than 60% of breaches coming from cloud infrastructure or applications, remote endpoints, or IoT devices/networks
  • Learn how to get unified visibility and control across your distributed, hybrid environments
  • Understand how to secure IoT and OT devices  
  • Discover how to stop attacks before they occur
11:00 - 11:20

► Evolution in Cyber Security Skill Demand within the Manufacturing Sector

David Manfield, Associate Director – Head of Cyber Security Practice, Investigo

  • The drivers of demand  
  • The Talent market
  • Changes / growth areas in the sector
  • Upskilling / cross training existing workforce
  • A view ahead
11:20 - 11:25

Comfort Break

11:25 - 12:00

► Fireside Chat: Mitigating personal liability: the changing climate for security professionals

Simon Brady, Managing Editor & Event Chairman, AKJ Associates (Moderator)
Jonathan Armstrong, Lawyer (Compliance & IT) & Training Partner, L-EV8

  • The changing politics of security 
  • Current cases 
  • Social Media scrutiny 
  • Insurance options for CISOs 
  • Golden parachutes and legal support
12:00 - 12:20

► Combating Cyber Threats in Manufacturing: Insights from the 2023 Phishing Benchmark Report

Javvad Malik, Lead Security Awareness Advocate, KnowBe4 
Pam Balsam, Snr. Regional Enterprise Account Manager, KnowBe4

  • Delve into the key findings of the 2023 Phishing Benchmark Report by KnowBe4.
  • Gain invaluable insights into the current state of phishing risks and robust cyber defence strategies within the manufacturing sector.
  • Shed light on the evolving tactics employed by cybercriminals to exploit human vulnerability and breach organisational defences. 
  • Gain a comprehensive understanding of the phishing landscape, including the most used attack vector, industry-specific trends, and the potential consequence of successful phishing campaigns. 
12:20 - 12:40

► Strategies for a successful OT Cybersecurity Programs

Shiv Kataria, Senior Key Expert R&D, Siemens

  • Developing a robust and practical framework
  • The dichotomy of Security vs operational efficiency
  • Converged networks and teams
  • Leverage the new technology for timely response
12:40 - 12:50

► Navigating the Confluence: Challenges and Solutions in IT/OT Convergence

Rohan Vermeulen, Automation Infrastructure Lead (OT/ICS), Pfizer

  • Overcoming the clash of culture
  • Security at the crossroads
  • Bridging the skills gap