Full Agenda
Timeline (EDT) | Session Details |
---|---|
10:00am - 10:10am | Event Kickoff & Introduction Dean Parsons, Event Chairperson & SANS Certified Instructor |
10:15am - 10:45am | Actionable Approaches to Threat Mitigation and Response in OT In today's interconnected world, Operational Technology (OT) environments face an ever-evolving array of threats. To safeguard critical infrastructure and ensure continuity, organizations must adopt proactive and practical approaches to threat mitigation and response. This session will delve into actionable strategies aimed at fortifying OT security: - Practical approaches to collecting and aggregating environmental intelligence and asset information to build an understanding of your environment - Understanding events vs incidents and how to respond accordingly - Ensuring safety, resilience, and availability while mitigating threats - Unifying people, process and technology into a cohesive and actionable infrastructure Kevin Kumpf, Chief OT/ICS Security Strategist at Cyolo |
10:50am - 11:20am | Do No Harm: OT Native Network Monitoring of OT Environments Operational Technology (OT) environments face increasingly sophisticated threats, underscoring the need for cybersecurity strategies tailored to their unique complexities. Traditional IT security methods are insufficient for OT/ICS environments, which demand a nuanced approach that safeguards critical infrastructure while preserving operational integrity. In this presentation, Nick Shaw of Dragos will discuss the importance of an OT-native cybersecurity methodology, utilizing the SANS Five Critical Controls and principles of non-disruptive extended visibility. This approach is designed to enhance protection while ensuring minimal disruption, thereby strengthening continuity without impeding vital operations. Participants will gain a clear understanding of how the Dragos Platform enables organizations to effectively implement critical controls within their own OT environments. They will learn practical strategies to maintain robust security measures that support ongoing operational processes without causing disruption. Nick Shaw, Principal Advisory Solution Architect at Dragos |
11:25am - 11:55am | Strategies for Securing OT/ICS Networks from Removable Media and Cyber Threats Transferring data securely and efficiently into high impact networks amidst digitalization and Industry 4.0 is a necessity, but also poses major security risks with the use of removable media like USBs and vendor laptops. Cyber threats can infiltrate air-gapped networks and potentially cause organization disruption or even cyber-physical damage. Security controls like static file scanning with traditional AV engines are often used, however, they continue to fall short in mitigating these threats. This session will cover the importance of integrating advanced scanning technologies, policy enforcement, discuss successful deployment options and outline strategies to effectively scan and sanitize files, and help ensure compliance with industry standards to safeguard secure environments against cyber threats. Matt Wiseman, Director of Product Marketing at OPSWAT |
12:00pm - 12:20pm | BREAK |
12:25pm - 12:55pm | Achieving Universal Zero Trust Access and Critical Asset Protection Zero Trust Network Access (ZTNA) has been growing in popularity for several years. Recently, we saw demand skyrocket with the disclosure of several vulnerabilities in popular VPN providers. While ZTNA is a more secure solution, there are still some concerns that traditional ZTNA may expose assets to threats, serving as a pivot point for lateral movement. It’s critical that organizations implement not just ZTNA, but asset protection as well. Attendees will gain an understanding of how zero trust principles interlace with asset protection concepts, and what to look for in technology offerings promising these capabilities. Roman Arutyunov, Co-Founder and Senior Vice President of Products at Xage |
1:00pm - 1:30pm | It Takes a Platform: Security Cyber-Physical Systems with Fortinet Security Fabric OT Security Platform Previously air-gapped OT environments are becoming increasingly connected due to Digital Transformation demands and production risk reduction initiatives while also supporting a growing need for remote access. The Fortinet OT Security Platform provides a broad, integrated, and automated platform addressing the challenges of IT-OT convergence and tailored to the constraints found in OT and IT. Solutions to convergence challenges include customizing products to unique OT environmental conditions, such as rugged firewalls and switches, advanced threat protection offerings including endpoint protection, deception, sandboxing, and SecOps tools that can scale across IT and OT. Richard Springer, Director of Marketing OT Solutions at Fortinet |
1:35pm - 2:05pm | Top Mistakes to Avoid in Security OT Networks Attend this talk to learn what your fellow OT practitioners have discovered in their journey to secure their OT infrastructure – across multiple industries. We’ll take you on a journey in securing your OT infrastructure – the critical steps, unearthing ‘gotchas’ that others have experienced, that all build upon each other to enhance your security. Walk away with practical guidance for securing your own OT infrastructure, regardless of whether you’re running a plant, a mill, BMS, hospital devices or other OT. Ben Stirling, ICS Security Engineering Lead at Claroty Pamela Warren, Public Sector Principal at Claroty |
2:10pm - 2:40pm | Scaling ICS Visibility to New Heights Eric Floyd, Director of Industrial Business Development and Alliances at Keysight Technologies Phil Page, Director of Tech Alliances & OEM Partners at Nozomi Networks |
2:45pm - 3:00pm | Event Recap & Closing Remarks Dean Parsons, Event Chairperson & SANS Certified Instructor |