Agenda

Presentations already confirmed include:


►Secure by Design: Strengthening Cybersecurity in Manufacturing

Matthew Rogers, Industrial Control Systems Cybersecurity Expert, CISA

  • The international focus on shifting security to the manufacturer.
  • Key Secure by Design principles to consider as a manufacturer and as a customer of other manufacturers in the supply chain.
  • Considerations for navigating out of legacy operational technology patterns when embedding security into the product.
  • The importance of tying together human centered design research and cybersecurity

►A year in OT Cybersecurity: Insights from a Fresh Perspective    

Stefan Caluser, IT Cyber Security Engineer, British Steel

  • Key challenges and effective strategies from my first year in OT cybersecurity.
  • Navigating Unique OT Security Challenges: Case studies and mitigation techniques beyond traditional IT approaches.
  • Gaining valuable insights through collaboration with industry peers in OT security.
  • Enhancing cybersecurity awareness on the shop floor with practical, role-specific strategies.

►0-Day Bingo: Depth in Incident Response   

Rob Flanders, Head of Threat and Incident Response, BAE Systems

  • Insights and experiences from BAE Systems on managing cyber-attacks.
  • Strategies for safeguarding critical infrastructure and supply chain partners.
  • The growing complexity of the cyber threat landscape.
  • Reducing the impact of incidents through proactive defence.

►Threat Detection & Incident Response in Cloud-Based Manufacturing Systems

Aliya Kurmanbayeva, Cloud Security Lead Engineer, Škoda Auto

  • Why cloud-based security monitoring is critical for manufacturing.
  • Common threats in cloud-based manufacturing (ransomware, supply chain attacks).
  • Using SIEM solutions like Microsoft Sentinel to detect threats.
  • Best practices for incident response in hybrid cloud environments.

►State of CPS Security: OT Exposures 2025

Elliot Gidley, CTO, Claroty 

Elliot delves into the new research report 'State of CPS Security: OT Exposures 2025.' The report covers 940,000-plus OT Devices Analyzed across 270 Organisations and lays out the greatest risks associated with OT and ICS beyond merely assessing the criticality of a vulnerability.

Key takeaways: 

  • Prioritise Highest Risk: Redefine vulnerability management and prioritize remediation based on KEVs that are insecurely exposed to the internet and linked to ransomware.
  • Shift to Exposure Management: Enrich your risk assessment with known exploits, exploit prediction scores, and business impact assessments to focus on the most consequential impacts to production and narrow the effort to risks that are exploitable today.
  • Ensure Secure Access: Secure access is an indispensable control given the need for remote access to OT environments from employees and third parties
  • Protect the Network:Network segmentation is a critical control within CPS environments.