CyberX cordially invites you to a seminar about
Emerging ICS/SCADA Threats and How to Maximize Operational Resilience
Wednesday, June 20 – 13:30 – 18:00, followed by apéritif
Kameha Suite Frankfurt, Taunusanlage 20, 60325 Frankfurt Am Main
Register now, seating is limited and all attendees must be pre-approved
A new class of targeted ICS malware such as TRITON and Industroyer/CrashOverride, as well as WannaCry and NotPetya, have shown that the cyber risk to production uptime is real.
Boards of directors now understand that sophisticated malware can indeed be used to hijack industrial devices, lock down production facilities, and impact -financial results. Other potential impacts of a successful ICS cyberattack include catastrophic safety failures, environmental release of hazardous materials, and theft of corporate trade secrets.
But what can be done to mitigate ICS risks? OT environments are quite different than IT environments, with longer patch cycles, legacy devices, weak authentication, undocumented network topologies, and specialized non-IT protocols.
During the seminar, we will hear case studies, discuss the new ICS/SCADA threat landscape, understand why perimeter security tools are not sufficient and talk about why and how to fuse OT security into the corporate SOC.
This event is an opportunity to network with your peers and share best practices for protecting ICS/SCADA networks from new and emerging ICS threats.
13:30 – 14:00 – Welcome and Co¬ffee
14:00 – 14:15 – Introduction
Omer Schneider, CEO & Co-Founder, CyberX, Former Commander of Military Cyber Unit
14:15 – 15:00 – Keynote Session: Creating a Unified Strategy for IT/OT/IIoT Security
Bernd Jaeger, Practice Lead IoT/ICS Security, Telekom Security, T-Systems International GmbH
15:00 – 15:30 – A New Strategic Approach to Protecting Global Manufacturing Sites from ICS Cyber Threats
Yaniv Maimon, Deloitte Cyber Risk Services, Pharmaceuticals Project Lead
15:30 – 16:00 – Case Study: Why the Increase in Cyber Threats to Critical Infrastructures Required a Shift in Our Security Strategy
Gregor Nyffeler, Head of IT, EWZ Energy
16:00 – 16:30 – Break
16:30 – 17:15 – A History of Nation-State Attacks on Critical Infrastructure
Phil Neray, VP of Industrial Cybersecurity, CyberX
17:15 – 17:45 – Technical Demo: Maturity Model & Key Use Cases for ICS Security
Joe DiPietro, VP of Customer Success, CyberX
17:45 – open – Drinks, Appetizers & Peer Networking
The speakers will be on premises for conversations and Q&A
Founded by military cyber experts with nation-state expertise defending critical infrastructure, CyberX provides the most widely-deployed industrial cybersecurity platform for continuously reducing ICS risk. The CyberX platform combines an embedded understanding of industrial devices, protocols, and applications with ICS-specific continuous monitoring and anomaly detection, asset and network topology discovery, risk and vulnerability management, automated threat modeling, and threat intelligence.
To see CyberX’s OT security platform in action, request a demo here.
|13:00-13:30||Registration & Coffee|
Omer Schneider, CEO/Co-Founder
Case Study: Continuous Monitoring of Cyber and Operational Incidents for Electrical Substations
Markus Lenzin, Head of Substation Automation Technology
Assessing Vulnerabilities & Risk in Manufacturing Plants
Head of IT Security at a Global Manufacturer
Auditing OT Using In-Depth Network Analytics
Matthias Bossardt, Partner & Head of Cyber Security Services
Machine Learning for Industrial Cybersecurity
Bernd Jaeger, Practice Lead for IoT/ICS Security
Deutsche Telekom, T-Systems Security
Update on IIOT & ICS Threat Intelligence Research
Nir Giller, CTO/Co-Founder
How to Present Cyber Risk to the Board
Reto Francioni, Chairman of the Board of Directors
Swiss International Airlines
Apéro Riche and Networking
The speakers will be onsite for conversations and Q&A
According to the Ponemon Institute survey, nearly 70% of organizations sampled suffered a security compromise resulting in the loss of confidential information or operational disruption in their Operational Technology (OT) environments, in the past 12 months. In addition, 59% of cybersecurity managers believe there is greater risk in OT than IT environments.
A range of diverse cyber-adversaries, including nation-states, cybercriminals, hacktivists, and malicious insiders, pose financial, reputational and regulatory risk to global industries.
The challenge is compounded as organizations adopt digitization initiatives such as Industry 4.0 and Smart Grid, further increasing risk by creating a larger attack surface from new IIoT devices and the convergence of IT and OT networks to support real-time intelligence.
The business impact can include costly production outages, safety failures, and environmental release of hazardous materials, as well as theft of corporate IP such as sensitive information about proprietary manufacturing processes and product designs.
This workshop will allow participants to network with their peers and share best practices for protecting their industrial networks from these types of risks.