Agenda Day 2
8:30 am - 9:00 am REGISTRATION & COFFEE
9:00 am - 9:10 am CHAIRMAN’S OPENING REMARKS
9:10 am - 9:40 am PANEL DISCUSSION: THE CYBER THREAT TO INDUSTRIAL CONTROL SYSTEMS IN THE ERA OF INDUSTRIE 4.0Helge Janicke, Director of the Cyber Technology Institute ,De Montfort University Professor Chris Hankin, Director of the Institute for Security Science and Technology,Imperial College London John Easton, Lecturer, School of Electronic, Electrical and Systems Engineering,University of Birmingham
•How has the cyber attack threat evolved in response to advanced cyber defences?
•Demonstrating how cyber attacks can exploit and attack Industrial Control Systems weaknesses
•Understanding why ICS is increasingly targeted by Cyber Attack
•How can you develop an integrated response to the growing cyber threat?
Helge JanickeDirector of the Cyber Technology Institute
De Montfort University
Professor Chris HankinDirector of the Institute for Security Science and Technology
Imperial College London
John EastonLecturer, School of Electronic, Electrical and Systems Engineering
University of Birmingham
9:40 am - 10:10 am Session reserved for: CYBER X
10:10 am - 10:50 am CASE-STUDY HENKEL: IT AND OT JOINING FORCES TO IMPROVE CYBER SECURITY
· Project report from Henkel, a German chemical and FMCG company with global footprint
· How the project was scoped, goals were identified and the project was launched
· How IT and OT improved their partnership
· How Henkel’s lessons learned can be applied to your organisation, and what are their next steps?
10:40 am - 11:00 am MORNING COFFEE AND NETWORKING
11:00 am - 11:40 am IT EMPEROR’S NEW CLOTHES AND OTHER STORIES; CYBER SECURITY IN INDUSTRYJonni Talsi, Lead Security Consultant,Wartsila
· Cyber Security in Industry - How did we get here?
· ICS Cyber Security – a field of multiple players and complex requirements
· Does OT Cyber Security need a strong IT department?
· Where and how does it all fail - experiences from industrial projects
Jonni TalsiLead Security Consultant
11:30 am - 12:00 pm THE INDUSTRIAL IMMUNE SYSTEM: USING MACHINE LEARNING & AI FOR OT CYBER DEFENCEAndrew Tsonchev, Director of Technology,Darktrace Industrial
• How new machine learning and mathematics are automating advanced threat detection
• Why 100% network visibility allows you to preempt emerging situations, in real time, across both IT and OT environments
• How smart prioritization and visualization of threats allows for better resource allocation and lower risk
• Real-world examples of detected OT threats, from non-malicious insiders to sophisticated cyber-attackers
Andrew TsonchevDirector of Technology
12:00 pm - 12:30 pm HOW TO BUILD A FLEXIBLE CYBER NETWORK IN YOUR INDUSTRYMark Finch, General Manager Information Security & IT Risk Management EMEA,Opel Vauxhall
· How Opel Vauxhall have built a flexible control model for cyber security in the operating environment
· Why this model works to ensure cyber security in an operating environment
· What lessons have been learnt from this process?
· How can this model be applied to your organisation?
Mark FinchGeneral Manager Information Security & IT Risk Management EMEA
12:30 pm - 1:30 pm NETWORKING LUNCH
1:30 pm - 2:00 pm HOW REMOTE MANAGEMENT SOLUTIONS CAN ADDRESS CYBER SECURITYSamuel Korpi, Information Security Specialist,Neste
•Understanding why organisations would look to remotely manage cyber security
•Why budget restraints and a lack of IT professionals mean cyber security is often outsourced off-site
•Establishing how remote management options provide cyber secure alternatives to in-house teams
•How do you integrate remote risk management with on-site requirements?
Samuel KorpiInformation Security Specialist
2:00 pm - 2:30 pm HOW BOARDS ARE PREPARING AGAINST CYBER THREAT
· Understanding how boards are preparing against cyber security threats
· How do boards prioritise cyber security risk against cost
· How understanding the board level view of cyber risk will help your cyber defence strategy
· What actions can boards take to consolidate their cyber security risk
2:30 pm - 3:00 pm AFTERNOON TEA AND NETWORKING
3:00 pm - 3:30 pm DEMONSTRATING CYBER SECURITY AS A SAFETY CONCERNHeinz Janiec, Sen. Consultant/ Sen Project Manager,Speciality Engineering
•Understanding the safety aspects of a cyber attack is a major barrier to incorporating the operational teams in cyber security
•How associating cyber risk with safety in operational areas can engage both OT and IT operatives
•Examining how you can demonstrate cyber risk as a safety concern
•Determining how cyber security can be considered on a day-to day basis amongst operations teams
Heinz JaniecSen. Consultant/ Sen Project Manager
3:30 pm - 4:00 pm RESPONDING TO THE CRASH OVERRIDE / INDUSTROYER CYBER ATTACKWilliam Horner, Process Automation Consultant,Horner Technologies
•Industroyer, also known as CrashOverride, was a highly targeted attack that hit a single, 200-megawatt Ukrainian transmission substation in late December 2016, however the attack vector remains unknown
•Why this attack is a major turning point for cyber security in ICS systems
•Determining the implications of this attack for your organisation
•How you can defend against similar attacks with unknown vectors?
William HornerProcess Automation Consultant