Agenda Day 2

8:30 AM - 9:00 AM REGISTRATION & COFFEE

9:00 AM - 9:10 AM CHAIRMAN’S OPENING REMARKS

•How has the cyber attack threat evolved in response to advanced cyber defences?
•Demonstrating how cyber attacks can exploit and attack Industrial Control Systems weaknesses
•Understanding why ICS is increasingly targeted by Cyber Attack
•How can you develop an integrated response to the growing cyber threat?

Helge Janicke

Director of the Cyber Technology Institute
De Montfort University

Chris Hankin

Director of the Institute for Security Science and Technology
Imperial College London

John Easton

Lecturer, School of Electronic, Electrical and Systems Engineering
University of Birmingham

9:50 AM - 10:30 AM CASE-STUDY HENKEL: IT AND OT JOINING FORCES TO IMPROVE CYBER SECURITY

· Project report from Henkel, a German chemical and FMCG company with global footprint
· How the project was scoped, goals were identified and the project was launched
· How IT and OT improved their partnership
· How Henkel’s lessons learned can be applied to your organisation, and what are their next steps?

10:30 AM - 11:00 AM MORNING COFFEE AND NETWORKING

11:00 AM - 11:40 AM IT EMPEROR’S NEW CLOTHES AND OTHER STORIES; CYBER SECURITY IN INDUSTRY

Jonni Talsi, Lead Security Consultant, Wartsila
· Cyber Security in Industry - How did we get here?
· ICS Cyber Security – a field of multiple players and complex requirements
· Does OT Cyber Security need a strong IT department?
· Where and how does it all fail - experiences from industrial projects

Jonni Talsi

Lead Security Consultant
Wartsila

11:40 AM - 12:20 PM HOW TO MAINTAIN SYSTEM INTEGRITY WHEN USING THIRD PARTY CONSULTANTS

Mark Finch, General Manager Information Security & IT Risk Management EMEA, Opel Vauxhall
•How third party consultants can introduce risk to your ICS network
•Demonstrating how third parties can be introduced to an organisations risk culture
•Determining how external systems can be monitored for risk
•How do you address cyber security to consultants without harming productivity?

Mark Finch

General Manager Information Security & IT Risk Management EMEA
Opel Vauxhall

12:20 PM - 1:20 PM NETWORKING LUNCH

1:20 PM - 2:00 PM HOW REMOTE MANAGEMENT SOLUTIONS CAN ADDRESS CYBER SECURITY

Samuel Korpi, Information Security Specialist, Neste
•Understanding why organisations would look to remotely manage cyber security
•Why budget restraints and a lack of IT professionals mean cyber security is often outsourced off-site
•Establishing how remote management options provide cyber secure alternatives to in-house teams
•How do you integrate remote risk management with on-site requirements?

Samuel Korpi

Information Security Specialist
Neste

11:00 AM - 11:40 AM HOW BOARDS ARE PREPARING AGAINST CYBER THREAT

Steven Trippier, Group Chief Information Security Officer, Anglian Water Services
· Understanding how boards are preparing against cyber security threats
· How do boards prioritise cyber security risk against cost
· How understanding the board level view of cyber risk will help your cyber defence strategy
· What actions can boards take to consolidate their cyber security risk


Steven Trippier

Group Chief Information Security Officer
Anglian Water Services

2:40 PM - 3:10 PM AFTERNOON TEA AND NETWORKING

3:10 PM - 3:50 PM DEMONSTRATING CYBER SECURITY AS A SAFETY CONCERN

Heinz Janiec, Sen. Consultant/ Sen Project Manager, Speciality Engineering

•Understanding the safety aspects of a cyber attack is a major barrier to incorporating the operational teams in cyber security
•How associating cyber risk with safety in operational areas can engage both OT and IT operatives
•Examining how you can demonstrate cyber risk as a safety concern
•Determining how cyber security can be considered on a day-to day basis amongst operations teams

Heinz Janiec

Sen. Consultant/ Sen Project Manager
Speciality Engineering

3:50 PM - 4:30 PM RESPONDING TO THE CRASH OVERRIDE / INDUSTROYER CYBER ATTACK

William Horner, Process Automation Consultant, Horner Technologies
•Industroyer, also known as CrashOverride, was a highly targeted attack that hit a single, 200-megawatt Ukrainian transmission substation in late December 2016, however the attack vector remains unknown
•Why this attack is a major turning point for cyber security in ICS systems
•Determining the implications of this attack for your organisation
•How you can defend against similar attacks with unknown vectors?


img

William Horner

Process Automation Consultant
Horner Technologies

4:30 PM - 4:40 PM CHAIRMAN’S CLOSING REMARKS AND END OF DAY TWO