CyberX cordially invites you to a seminar about
Emerging ICS/SCADA Threats and How to Maximize Operational Resilience
Thursday, May 3 at 13:00
Churchill War Rooms, Clive Steps, King Charles Street, London, SW1A 2AQ
Register now, seating is limited and all attendees must be pre-approved
A new class of targeted ICS malware such as TRITON and Industroyer/CrashOverride, as well as WannaCry and NotPetya, have shown that the cyber risk to production uptime is real.
Boards of directors now understand that sophisticated malware can indeed be used to hijack industrial devices, lock down production facilities, and impact -financial results. Other potential impacts of a successful ICS cyberattack include catastrophic safety failures, environmental release of hazardous materials, and theft of corporate trade secrets.
But what can be done to mitigate ICS risks? OT environments are quite different than IT environments, with longer patch cycles, legacy devices, weak authentication, undocumented network topologies, and specialized non-IT protocols.
During the seminar, we will hear case studies, discuss the new ICS/SCADA threat landscape, understand why perimeter security tools are not sufficient and talk about why and how to fuse OT security into the corporate SOC.
This event is an opportunity to network with your peers and share best practices for protecting ICS/SCADA networks from new and emerging ICS threats.
|13:00 – 13:30||Welcome and Coffee|
|13:30 – 13:45||Introduction
Omer Schneider, CEO & Co-Founder, CyberX
|13:45 – 14:30||Keynote Session: A New Strategic Approach to Protecting Global Manufacturing Sites from ICS Cyber Threats
Ilan Abadi, Vice President, Global CISO, Teva Pharmaceuticals Industries Ltd.
|14:30 – 15:00||How to Converge IT and OT Security and Live to Tell
Mo Ahddoud, CISO, Scotia Gas Networks
|15:00 – 15:30||Break|
|15:30 – 16:00||Who Owns ICS Security? Fusing IT, OT and IIoT Security in the Corporate SOC
Phil Neray, VP Industrial Cybersecurity, CyberX
|16:00 – 16:45||A New Era of Nation-State Threats to Critical Infrastructure
Craig Jarvis, Head of Threat Intelligence Advisory, DXC Technology
|16:45 – 17:30||Technical Demo: ICS Security — 3 Key Use Cases
Nir Giller, CTO & Co-Founder, CyberX
Joe DiPietro, VP Customer Success, CyberX
|17:30 –||Drinks, Appetisers & Peer Networking – the speakers will be on premises for conversations and Q&A|
Founded by military cyber experts with nation-state expertise defending critical infrastructure, CyberX provides the most widely-deployed industrial cybersecurity platform for continuously reducing ICS risk. The CyberX platform combines an embedded understanding of industrial devices, protocols, and applications with ICS-specific continuous monitoring and anomaly detection, asset and network topology discovery, risk and vulnerability management, automated threat modeling, and threat intelligence.
To see CyberX’s OT security platform in action, request a demo here.
|13:00-13:30||Registration & Coffee|
Omer Schneider, CEO/Co-Founder
Case Study: Continuous Monitoring of Cyber and Operational Incidents for Electrical Substations
Markus Lenzin, Head of Substation Automation Technology
Assessing Vulnerabilities & Risk in Manufacturing Plants
Head of IT Security at a Global Manufacturer
Auditing OT Using In-Depth Network Analytics
Matthias Bossardt, Partner & Head of Cyber Security Services
Machine Learning for Industrial Cybersecurity
Bernd Jaeger, Practice Lead for IoT/ICS Security
Deutsche Telekom, T-Systems Security
Update on IIOT & ICS Threat Intelligence Research
Nir Giller, CTO/Co-Founder
How to Present Cyber Risk to the Board
Reto Francioni, Chairman of the Board of Directors
Swiss International Airlines
Apéro Riche and Networking
The speakers will be onsite for conversations and Q&A
According to the Ponemon Institute survey, nearly 70% of organizations sampled suffered a security compromise resulting in the loss of confidential information or operational disruption in their Operational Technology (OT) environments, in the past 12 months. In addition, 59% of cybersecurity managers believe there is greater risk in OT than IT environments.
A range of diverse cyber-adversaries, including nation-states, cybercriminals, hacktivists, and malicious insiders, pose financial, reputational and regulatory risk to global industries.
The challenge is compounded as organizations adopt digitization initiatives such as Industry 4.0 and Smart Grid, further increasing risk by creating a larger attack surface from new IIoT devices and the convergence of IT and OT networks to support real-time intelligence.
The business impact can include costly production outages, safety failures, and environmental release of hazardous materials, as well as theft of corporate IP such as sensitive information about proprietary manufacturing processes and product designs.
This workshop will allow participants to network with their peers and share best practices for protecting their industrial networks from these types of risks.