\"

Conference Day 1

8:30 AM - 9:00 AM Coffee & Registration

9:00 AM - 9:10 AM Chairman’s Opening Remarks

9:10 AM - 9:40 AM The New Front: Securing the Industrial Internet of Things

Abeed Hossain, Global Director, IT Operations and Infrastructure Services, INEOS Styrolution Group GmbH
  • Assessing the security aspects of the increase in IP connected devices in industries using control systems
  • Understanding what exactly it is we are trying to secure: The evolution from industrial systems that did not speak IP to a landscape where every device is interconnected
  • Analysing and mitigating the risk posed by IoT devices: Starting by examining the risk from a network perspective
  • Factoring the special precautions that must be taken when introducing typical IT security solutions to ICS environments
  • Future proofing your network against the continual adoption of new technologies, and ensuring that industrial devices are built with security requirements in mind

Abeed Hossain

Global Director, IT Operations and Infrastructure Services
INEOS Styrolution Group GmbH

10:30 AM - 11:00 AM Managing OT Security Risk: Understand your estate, understand your risk

Paddy Francis, CTO, Airbus
  • Start with the business- Its crucial to make sure you protect the businesses critical assets
  • Understand the estate- Be threat aware and vulnerability focussed
  • Inventory and asset management tools can help but they are not an end in themselves
  • Understanding behaviours and a detailed analysis of risk is critical
  • Know what is in the estate and be better placed to protect the critical business assets

Paddy Francis

CTO
Airbus

Sponsored by: Airbus Defence and Space

10:10 AM - 10:40 AM The National Cyber Security Centre's Role in Industrial Cyber Security

Confirmed Speaker, Senior Representative, National Cyber Security Centre
Launched in 2016, the UK NCSC is helping to make the UK the safest place to live and do business online. This briefing will provide clarity on the NCSC mission and structure, a synopsis of evolving threat and vulnerability trends in industrial sectors as well as descriptions of the products and capabilities the NCSC is building to achieve national cyber-security objectives."

Confirmed Speaker

Senior Representative
National Cyber Security Centre

10:40 AM - NaN:NaN AM Coffee & Networking Break

11:10 AM - 11:40 AM Deep Culture: The Missing Link to Shaping an Organisational Culture Resistant to Cyber Attack

Chris Rivinus, Head of Business Systems, Tullow Oil
  • Building on and explaining the cultural change Tullow Oil have implemented in the past
  • Update on new findings and tested remediation steps
  • Opportunity to participate in ongoing research and benefit from insights tailored to your organisation

Chris Rivinus

Head of Business Systems
Tullow Oil

11:40 AM - 12:10 PM Industrial Internet of Things (IIOT) - Meeting the Challenges of Cyber Security

Marc Sheldon, Security Solutions Architect, Leidos Cyber
As industrial environments become more and more networked, many large corporations are faced with a network landscape with hundreds of thousands or millions of digital devices. How can corporations leverage information security best practices along with big-data automation and intelligence to protect their enterprise.

Marc Sheldon

Security Solutions Architect
Leidos Cyber

Sponsored by: Leidos

12:10 PM - 12:40 PM Enhancing the security of ICS SCADA in Europe Overview of ENISA: the EU cybersecurity agency Securing Europe's Information Society Protecting ICS SCADA from network attacks The road ahead: the Network and Information Security Directive

Rossella Mattioli, Security and Resilience of Communication Networks Officer, ENISA


Rossella Mattioli

Security and Resilience of Communication Networks Officer
ENISA

12:40 PM - 1:40 PM Networking Lunch

1:40 PM - NaN:NaN AM An Industrial Immune System: Using Machine Learning for Next Generation ICS Security

Simon Wilson, Cyber Security Account Manager , Darktrace
  • How new machine learning and mathematics are automating advanced threat detection
  • Why 100% network visibility allows you to preempt emerging situations, in real time, across both IT and OT environments
  • How smart prioritization and visualization of threats allows for better resource allocation and lower risk
  • Real-world examples of detected OT threats, from non-malicious insiders to sophisticated cyber-attackers

Simon Wilson

Cyber Security Account Manager
Darktrace

Sponsored by: Darktrace

2:10 PM - 2:50 PM A Vision for Security For the Industrial Internet of Things

Trevor Goldman, Industrial Systems Architect, Waterfall Security Solutions
  • IIoT makes everything easier for us and for our attackers.
  • What is the vision of the IIoT and what is wrong with it?
  • The IIC Security Framework and other modern security documents recognize the enormous importance of perimeter protection to control system security. Unidirectional Security Gateways are an important part of defense-in-depth architectures

Trevor Goldman

Industrial Systems Architect
Waterfall Security Solutions

Sponsored by: Waterfall Security Solutions

3:10 PM - 3:40 PM Coffee And Networking Break

3:40 PM - 4:10 PM Evaluating The Additional Considerations Made When Performing Risk Assessment For ICS Environments

Mike Mackintosh, IT Manager, Barhale
  • Ensuring those doing risk assessments for ICS environment understad the differences over a traditional IT system
  • Appreciating the Impact that ICS specific requirements have on safety and use of safety assessments
  • Understanding the real-time impact of a cyber incident on an ICS, including the larger physical environment; effect on the process controlled, and the effect on the ICS itself
  • The consequences for risk assessments of non-digital control components within an ICS

Mike Mackintosh

IT Manager
Barhale

4:10 PM - 4:40 PM Security for Process Control Systems

Tomas Lindstrom, Cyber Security Manager BU Control Technologies, ABB
  • Understanding the work that ABB do to integrate effectively and improve the safety for their customers
  • Secure by design: Security in the product development phase
  • Defence in depth for process control systems
  • Coordinating the use of multiple security measures, addressing people, technology and operations

Tomas Lindstrom

Cyber Security Manager BU Control Technologies
ABB

4:40 PM - 5:10 PM ENJOY THE UPSIDE OF IIOT AND INDUSTRY 4.0 - MINIMIZE THE COSTS AND RISKS WITH SECURE REMOTE ACCESS

Shmulik Aran, Chief Executive Officer, NextNine
  • Save costs by reducing onsite maintenance and support
  • Ensure compliance by automating inventory and compliance reporting
  • Assure operator and vendor accountability by enabling real-time AAA supervision, recording and termination of secure sessions

Shmulik Aran

Chief Executive Officer
NextNine

Sponsored by: NextNine

5:10 PM - 5:25 PM Chairman’s Close And End Of Day One