09:00 - 09:05
|
Chairman's Welcome
|
09:05 - 09:25
|
► Securing IoT – Creating a secure, digital shop floor
Rob Flanders, Head of Threat and Incident Response, BAE Systems
- Integration with Enterprise Security Systems
- Pitfalls and Examples
- Lessons Learned and Strategic Approaches
|
09:25 - 09:45
|
► Challenges and Best Practices for Securing Modern Operational Technology Networks Tim Roddy, Vice President of Marketing, Open Systems - Why legacy approaches to securing operational technology are failing
- How you should update your network security and network access controls to protect this critical infrastructure
- How a secure access services edge (SASE) solution can support your smart OT security strategy
|
09:45 - 10:05
|
► Securing Manufacturing Infrastructure with Internet Intelligence
Nick Palmer, Senior Solutions and Customer Success Engineer, Censys
- How to gain visibility of misconfigurations and how they can expose manufacturing operations to serious disruption from attackers.
- Methods of understanding attacker infrastructure associated with malicious operations to support threat intelligence use cases.
- How to secure your wider internet facing infrastructure to prevent attackers moving laterally towards your manufacturing operations to interrupt production and extort money
|
10:05 - 10:20
|
► The Utopia of European Cybersecurity Certification – Automation of Compliance
Dr. Jesus Luna Garcia, Cybersecurity Governance – Cloud and AI, Robert Bosch GmbH
- The challenges and opportunities of the upcoming certifications derived from the European Cybersecurity Act
- The benefits of automating traditional cybersecurity certification processes, summarizing practical experiences related to the upcoming EU certification scheme for cloud services (EUCS)
- How automation can support cybersecurity certifications related to new EU Regulations (e.g., NIS2, and AI Act)? A view on our ongoing activities
|
10:20 - 10:25
|
Comfort Break
|
10:25 - 10:40
|
► Current Security Trends, Challenges and Opportunities in Operational Technology Giles Dunn, Partner, UK OT Cyber Lead, EY - What are the trends and challenges we are seeing across Operational Technology including new regulatory demands.
- Can we finally see Cyber spend as an operational benefit
- What opportunities can we realise from cyber good practice
|
10:40 - 11:00
|
► Securing IoT and OT with DNS Trish Almgren, Senior Product Marketing Manager & Field Evangelist, Infoblox - Ransomware for manufacturers is on the rise, with more than 60% of breaches coming from cloud infrastructure or applications, remote endpoints, or IoT devices/networks
- Learn how to get unified visibility and control across your distributed, hybrid environments
- Understand how to secure IoT and OT devices
- Discover how to stop attacks before they occur
|
11:00 - 11:20
|
► Evolution in Cyber Security Skill Demand within the Manufacturing Sector
David Manfield, Associate Director – Head of Cyber Security Practice, Investigo
- The drivers of demand
- The Talent market
- Changes / growth areas in the sector
- Upskilling / cross training existing workforce
- A view ahead
|
11:20 - 11:25
|
Comfort Break
|
11:25 - 12:00
|
► Fireside Chat: Mitigating personal liability: the changing climate for security professionals Simon Brady, Managing Editor & Event Chairman, AKJ Associates (Moderator) Jonathan Armstrong, Lawyer (Compliance & IT) & Training Partner, L-EV8 - The changing politics of security
- Current cases
- Social Media scrutiny
- Insurance options for CISOs
- Golden parachutes and legal support
|
12:00 - 12:20
|
► Combating Cyber Threats in Manufacturing: Insights from the 2023 Phishing Benchmark Report Javvad Malik, Lead Security Awareness Advocate, KnowBe4 Pam Balsam, Snr. Regional Enterprise Account Manager, KnowBe4 - Delve into the key findings of the 2023 Phishing Benchmark Report by KnowBe4.
- Gain invaluable insights into the current state of phishing risks and robust cyber defence strategies within the manufacturing sector.
- Shed light on the evolving tactics employed by cybercriminals to exploit human vulnerability and breach organisational defences.
- Gain a comprehensive understanding of the phishing landscape, including the most used attack vector, industry-specific trends, and the potential consequence of successful phishing campaigns.
|
12:20 - 12:40
|
► Strategies for a successful OT Cybersecurity Programs Shiv Kataria, Senior Key Expert R&D, Siemens - Developing a robust and practical framework
- The dichotomy of Security vs operational efficiency
- Converged networks and teams
- Leverage the new technology for timely response
|
12:40 - 12:50
|
► Navigating the Confluence: Challenges and Solutions in IT/OT Convergence Rohan Vermeulen, Automation Infrastructure Lead (OT/ICS), Pfizer - Overcoming the clash of culture
- Security at the crossroads
- Bridging the skills gap
|