ismg summit logo

December 5-6, 2024

Virtual IoT and OT Security Summit

9:55 AM ET - 1:35 PM ET | On-Demand December 6

Event Overview

The Virtual Summit: IoT & OT Security Summit will delve into the complexities of securing IoT and OT environments. Featuring industry luminaries, this summit offers keynotes, case-based learning and roundtable discussions tailored to address the latest threats and best practices in cyber risk management, zero trust networks, and critical infrastructure protection. Attendees will gain actionable insights on topics such as IT and OT convergence, manufacturing cybersecurity frameworks, and supply chain security, fostering a comprehensive understanding of the evolving cyber landscape.​

View our ISMG Event Experience video to see what your peers are saying about their participation. 

Highlight Topics

Nim Nadarajah

CISO, HOVR

Vaughn Hazen

CISO, John Deere

David Ortiz

CISO, Church 7 Dwight

James Johnson

CISO, John Deere

Anne Coulombe

CISO, Werfen

Camilo Gomez

Global Cybersecurity Strategist, Yokogawa

Mario Rivas

CISO, Seguros Monterrey New York Life

Tiauna Ross

Senior Director of Digital and ERP Cybersecurity, Fortune 500 MedTech Company

Upendra Mardikar

EVP, CISO, TIAA

Melanie Garson

Cyber Policy & Tech Geopolitics Lead, Tony Blair Institute for Global Change

Julio C Padilha

CISO, Volkswagen do Brazil

Tiuana Ross

Senior Director of Digital and ERP Cybersecurity, Fortune 500 MedTech Company

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage and knowledge sharing discussions. Hear what is on the minds of leading security experts as they share insights and challenges of the ever-evolving threat landscape.

Agenda

Opening Comments

Anne Coulombe

CISO, Werfen

James Johnson

CISO, John Deere

Amit Chaudhary

VP, Head of Cyber Security North America & Defense, Rolls-Royce

Fortifying Operations: Crafting a Resilient OT Cybersecurity Framework Across Industries

This session will go beyond traditional security measures to explore how a proactive and comprehensive OT cybersecurity framework is essential for building operational resilience across various sectors. By implementing a robust OT security strategy, organizations can transform today’s cyber risks into a strategic advantage, ensuring continuous operations and safeguarding their competitive edge.

Key Takeaways:

  • Establishing Comprehensive Control: Develop and implement policies that provide deep visibility into your OT environment, enabling you to identify, prioritize, and mitigate risks effectively, thereby minimizing your attack surface.
  • Strengthening Operational Resilience: Explore real-world case studies demonstrating how industry leaders are developing and executing OT cybersecurity strategies to protect their critical infrastructure from evolving threats.
  • Enhancing Competitive Edge: Learn how a resilient OT security strategy not only safeguards your operations but also enhances connectivity, efficiency, and overall business performance in the digital age.
  • Future-Proofing Operations: Understand the key elements of a forward-looking OT cybersecurity framework that adapts to new challenges, ensuring your operations remain secure and resilient against future cyber threats.

Anne Coulombe, CISO, Werfen

James Johnson, CISO, John Deere

Amit Chaudhary, VP, Head of Cyber Security North America & Defense, Rolls-Royce

Nim Nadarajah

CISO, HOVR

Vaughn Hazen

CISO, CN

Rethinking Risk: Identity's Critical Role in IT and OT Convergence

Yet, amidst this well-worn narrative, one vital component often remains too-often overlooked: Identity. As IT and OT systems become increasingly intertwined, the role of Identity in bridging these two domains is not just important—it’s transformative.

This session will move beyond the standard discussions of IT/OT convergence and focus on the pivotal role that Identity plays in this integration. We will explore how Identity management acts as the crucial link between IT and OT, reshaping traditional approaches to risk management and security. By placing Identity at the center of this convergence, organizations can better protect their critical infrastructure, enhance their security posture, and respond more effectively to emerging threats.

Key Takeaways:

  • The Evolution of Convergence: Understanding how the integration of IT and OT has progressed and why the traditional convergence narrative is no longer sufficient.
  • Identity as the Bridge: Examining how Identity management is the critical factor that connects IT and OT systems, enabling more cohesive and secure operations.
  • Transforming Risk Management: How an Identity-centric approach fundamentally changes risk management strategies, providing greater visibility and control over both IT and OT environments.
  • Real-World Applications: Insights and case studies on how leading organizations are leveraging Identity to secure their converged IT/OT infrastructures.

Nim Nadarajah, CISO, HOVR

Vaughn Hazen, CISO, CN

Patty Ryan

CISO, QuidelOrtho

Julio C Padilha

CISO, Volkswagen do Brasil

Securing the Unseen: Addressing IoT Vulnerabilities in Industrial Environments

However, these benefits come with significant security challenges, as many IoT devices operate with minimal security measures, making them prime targets for cyberattacks. This session will explore the hidden vulnerabilities within IoT networks in industrial settings, the potential risks they pose to operational technology (OT) systems, and the strategies that organizations can implement to secure their IoT ecosystems.

Key Takeaways:

  • Understanding IoT Threats: Identify the specific vulnerabilities and threats associated with IoT devices in industrial environments, and how they differ from traditional IT and OT security concerns.
  • Securing the IoT Ecosystem: Learn best practices for implementing robust security protocols across IoT devices, from device-level security to network monitoring and incident response.
  • Integrating IoT and OT Security: Explore strategies for integrating IoT and OT security measures, ensuring seamless protection across connected industrial systems.
  • Case Studies in IoT Security: Review real-world examples of how leading organizations have successfully addressed IoT security challenges in their industrial operations.

Patty Ryan, CISO, QuidelOrtho

Julio C Padilha, CISO, Volkswagen do Brasil

Upendra Mardikar

EVP, Chief Information Security Officer, TIAA

Tiauna Ross

Senior Director of Digital and ERP Cybersecurity, Fortune 500 MedTech Company

Securing the Modern Supply Chain: Advanced Strategies for CISOs

With the increasing integration of digital and operational technology (OT) environments, cybersecurity leaders face new challenges that require advanced strategies and innovative approaches. This session will explore how seasoned CISOs can fortify their supply chains against evolving cyber threats, ensuring the resilience and security of their organizations. Through real-world examples and expert insights, participants will gain actionable knowledge to address vulnerabilities across global supply chains.

Key Takeaways:

  • Advanced Risk Assessment Techniques: Learn how to identify and mitigate complex vulnerabilities in both digital and physical supply chain components.
  • Vendor and Partner Security Best Practices: Explore rigorous due diligence processes and contractual strategies to ensure the security of third-party relationships.
  • Integrating Security by Design: Discover how to embed security throughout the product development lifecycle, from inception to deployment.
  • End-to-End Encryption Implementation: Understand the critical importance of encryption across all stages of data transmission and storage within the supply chain.
  • Incident Response and Recovery Planning: Develop robust incident response plans tailored to the unique challenges of supply chain disruptions.

 

Upendra Mardikar, EVP, Chief Information Security Officer, TIAA

Tiauna Ross, Senior Director of Digital and ERP Cybersecurity, Fortune 500 MedTech

Company

Camilo Gomez

Global Cybersecurity Strategist, Yokogawa

Mario Rivas

CISO, Seguros Monterrey New York Life

OT Security: A Critical Priority for Every Industry

As IT and OT systems become increasingly interconnected, the security of physical processes—ranging from automated manufacturing lines to smart building systems and critical healthcare devices—has become essential to maintaining operational integrity. This session will underscore that OT security is a fundamental aspect of cybersecurity that every industry must prioritize to protect their critical operations

This session will delve into why OT security is vital across various sectors:

  • Critical Infrastructure Protection: Safeguarding systems from cyber threats to prevent widespread disruptions and ensure continuous operation of essential services.
  • Safety and Continuity: Ensuring the security of vital equipment and systems to maintain safety and uninterrupted operations across key environments.
  • Infrastructure Security: Protecting critical networks and control systems to avoid disruptions, ensure reliability, and prevent operational failures.
  • Operational Resilience: Securing automated processes and transaction systems to maintain smooth operations and protect sensitive information.

Camilo Gomez, Global Cybersecurity Strategist, Yokogawa

Mario Rivas, CISO, Seguros Monterrey New York Life 

Closing Comments

Don’t miss your chance to attend this dynamic impactful event

#ISMGSummit

@ISMG_News

Our Partners

CyberTech logo
Women in Cybersecurity logo
Water ISAC logo
Information Systems Security Association International logo
Swiss Cyber Institute logo
:

The Summit Experience

CPE Credits

Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025

January 30, 2025

The Anatomy of Cyber Resilience: What It Is, What It Isn't, Why It Matters, and How to Achieve It

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025

Andrew Robson

CISO, Bentley