Thurs
June 20
Plenary
9.30 AM
Welcome
Tony Mannion, Industrial Cyber Security Business Development Manager, SolutionsPT
9.45 AM
Keynote: Anatomy of a Cyber-Incident in an OT Environment
Lee Carter, Industrial Cyber Security Product Manager, SolutionsPT
This presentation takes you through a typical day for an OT professional, highlighting their role in mitigating cyberattacks in today's industrial environment. We'll explore existing security measures and identify common deficiencies exposed during an attack. Finally, based on industry best practices, we'll discuss actionable steps to strengthen your OT security posture.
10:15 AM
Keynote: Industrial cyber security journey, a customer experience
John Thornley, Operational Technology Lead Engineer, Diageo
Challenges faced, successes and a personal journey of discovery implementing a cyber security strategy.
10:45 AM
Bringing OT cyber security out of the shadows
Richard Allan, Regional Director North Europe, TXOne Networks
TXOne Networks, mastering the language of the shadows in the realm of Industrial Ot/IoT cybersecurity, illuminates the path for manufacturing firms to combat cyber threats. Their cutting-edge OT native solutions protect critical infrastructure, ensuring operational continuity. Join us at Cyber SecureOT 2024 to learn how TXOne’s expertise can help you navigate the darkness of cybersecurity threats.
11:35 AM
Work smarter to detect threats and manage risks in your industrial network
Wycliffe Sylvester - Fraser, Solutions Engineer, Claroty
Using learnings from Claroty's State of XIoT bi annual report, this session will discuss the current threat landscape and what strategies can be used to mitigate today's security and operational risks and challenges. The session will leverage real world examples as published by Team 82.
12:05 PM
Endpoint OT security (prevention of increase of attacks)
Stephen Grey, Regional Partner Manager, BlackBerry
UK manufacturers face a battery of cyber security risks, ranging from simple employee error through to complex targeted attacks. Our research found that production stoppages were the most common result of a cyber-attack (65%), with reputational damage ranking second (43%). Companies further revealed that new customers now want reassurance on details of the cyber security in place before signing contracts.
12:35 PM
Aligning your cyber security strategy to optimize business outcomes (and how to get a bigger security budget)
Dom Storey, Principal OT Architect, Tenable
ITSEC security professionals have traditionally communicated risk in the language of vulnerabilities: how many CVEs a machine has, severity mix and so on. We have been spearheading the move away from static vulnerability scores to real-time cyber-exposure indices, weaving asset context, vulnerabilities, threat detection, configuration drift detection and attack path analysis into an integrated view that identifies true system exposure. By mapping this exposure approach into the higher level risk matrices used by executives (financial, safety, environmental and reputation risk) we can align IT and OT ITSEC data with C-level corporate language and initiatives to maximise our utility and drive further ITSEC investment.
13:05 PM
Lunch and Exhibition
14:35 PM
15:35 PM
Technical Lab 2
Your choice of workshop style breakout session. Click HERE for details
16:20 PM
Conference conclusion