ismg summit logo

December 5th, 2024

Virtual Summit: IoT & OT Security Summit

8:30 AM ET - 5:00 PM ET

Event Overview

ISMG Summits feature carefully curated agendas delivering keynotes from industry luminaries, case-based learning, solution room workshops, private roundtable discussions, one-to-one networking and more. Our geo-targeted, industry-specific, and topic-driven events provide actionable education for security leaders’ top priorities and challenges.

View our ISMG Event Experience video to see what your peers are saying about their participation. 

Highlight Topics

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Nim Nadarajah

CISO, HOVR

David Ortiz

CISO, Church & Dwight

Vaughn Hazen

CISO, CN

James Johnson

CISO, John Deere

Anne Coulombe

CISO, Werfen

Camilo Gomez

Global Cybersecurity Strategist, Yokogawa

Sawan Joshi

CISO, Mitiga Solutions

Marlon Sorongon

CISO, Maybank

Upendra Mardikar

EVP, CISO, TIAA

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage and knowledge sharing discussions. Hear what is on the minds of leading security experts as they share insights and challenges of the ever-evolving threat landscape.

Agenda

You can now view or download a PDF version of the attendee guide.

Registration & Breakfast

Nim Nadarajah

CISO, HOVR

Rethinking Risk: Identity's Critical Role in IT and OT Convergence

Yet, amidst this well-worn narrative, one vital component often remains too-often overlooked: Identity. As IT and OT systems become increasingly intertwined, the role of Identity in bridging these two domains is not just important—it’s transformative.

This session will move beyond the standard discussions of IT/OT convergence and focus on the pivotal role that Identity plays in this integration. We will explore how Identity management acts as the crucial link between IT and OT, reshaping traditional approaches to risk management and security. By placing Identity at the center of this convergence, organizations can better protect their critical infrastructure, enhance their security posture, and respond more effectively to emerging threats.

Key Takeaways:

  • The Evolution of Convergence: Understanding how the integration of IT and OT has progressed and why the traditional convergence narrative is no longer sufficient.
  • Identity as the Bridge: Examining how Identity management is the critical factor that connects IT and OT systems, enabling more cohesive and secure operations.
  • Transforming Risk Management: How an Identity-centric approach fundamentally changes risk management strategies, providing greater visibility and control over both IT and OT environments.
  • Real-World Applications: Insights and case studies on how leading organizations are leveraging Identity to secure their converged IT/OT infrastructures.

Nim Nadarajah, CISO, HOVR

Anne Coulombe

CISO, Werfen

Fortifying Manufacturing: Crafting a Robust OT Cybersecurity Framework

The stakes are higher than ever, and the need for a resilient OT cybersecurity strategy has never been more critical. This session will go beyond traditional security measures to explore how a proactive and comprehensive OT cybersecurity framework is essential for building operational resilience in the modern manufacturing landscape. By implementing a robust OT security strategy, manufacturers can transform today’s cyber risks into a strategic advantage, ensuring continuous operations and securing their place in the competitive market.

Key Takeaways:

  • Establishing Comprehensive Control: Develop and implement policies that provide deep visibility into your OT environment, enabling you to identify, prioritize, and mitigate risks effectively, thereby minimizing your attack surface.
  • Strengthening Operational Resilience: Explore real-world case studies that demonstrate how leading manufacturers are developing and executing OT cybersecurity strategies to protect their critical infrastructure from evolving threats.
  • Enhancing Competitive Edge: Learn how a resilient OT security strategy not only safeguards your operations but also enhances connectivity, efficiency, and overall business performance in the digital age.
  • Future-Proofing Manufacturing: Understand the key elements of a forward-looking OT cybersecurity framework that adapts to new challenges, ensuring your manufacturing operations remain secure and resilient against future cyber threats.

Anne Coulombe, CISO, Werfen

Virtual IT/OT Summit

Securing the Unseen: Addressing IoT Vulnerabilities in Industrial Environments

However, these benefits come with significant security challenges, as many IoT devices operate with minimal security measures, making them prime targets for cyberattacks. This session will explore the hidden vulnerabilities within IoT networks in industrial settings, the potential risks they pose to operational technology (OT) systems, and the strategies that organizations can implement to secure their IoT ecosystems.

Key Takeaways:

  • Understanding IoT Threats: Identify the specific vulnerabilities and threats associated with IoT devices in industrial environments, and how they differ from traditional IT and OT security concerns.
  • Securing the IoT Ecosystem: Learn best practices for implementing robust security protocols across IoT devices, from device-level security to network monitoring and incident response.
  • Integrating IoT and OT Security: Explore strategies for integrating IoT and OT security measures, ensuring seamless protection across connected industrial systems.
  • Case Studies in IoT Security: Review real-world examples of how leading organizations have successfully addressed IoT security challenges in their industrial operations.

Milos Pesic, CISO, ABB Accelleron

Adam Wedgbury, Head of Enterprise Security Architecture, Airbus

Ash Hunt, Global CISO, APEX Group

Networking & Exhibition Break

Marlon Sorongon

CISO, Werfen

Upendra Mardikar

EVP. Chief Information Security Officer

Securing the Modern Supply Chain: Advanced Strategies for CISOs

With the increasing integration of digital and operational technology (OT) environments, cybersecurity leaders face new challenges that require advanced strategies and innovative approaches. This session will explore how seasoned CISOs can fortify their supply chains against evolving cyber threats, ensuring the resilience and security of their organizations. Through real-world examples and expert insights, participants will gain actionable knowledge to address vulnerabilities across global supply chains.

Key Takeaways:

  • Advanced Risk Assessment Techniques: Learn how to identify and mitigate complex vulnerabilities in both digital and physical supply chain components.
  • Vendor and Partner Security Best Practices: Explore rigorous due diligence processes and contractual strategies to ensure the security of third-party relationships.
  • Integrating Security by Design: Discover how to embed security throughout the product development lifecycle, from inception to deployment.
  • End-to-End Encryption Implementation: Understand the critical importance of encryption across all stages of data transmission and storage within the supply chain.
  • Incident Response and Recovery Planning: Develop robust incident response plans tailored to the unique challenges of supply chain disruptions.

 

Marlon Sorongon, CISO, Maybank 

 

Upendra Mardikar, EVP, Chief Information Security Officer, TIAA

David Ortiz

CISO, Church & Dwight

Achieving Comprehensive Visibility in OT Systems

Attendees will learn how to enhance their security posture by leveraging advanced threat detection and response techniques that apply to multiple industries.

In this session, we will focus on:

  • Overcoming visibility challenges in OT environments
  • Implementing advanced monitoring and threat detection
  • Cross-industry strategies for improved cybersecurity posture

David Ortiz, CISO, Church & Dwight

Lunch & Exhibition Break

London Summit

Critical Infrastructure Protection: Improving Resilience

Marsha Quallo-Wright, an NCSC deputy director, is responsible for improving critical infrastructure resilience, and in this exclusive session she discusses:

  • The state of critical infrastructure security;
  • The heightened cyberthreat resulting from Russia’s invasion of Ukraine;
  • Public/private sector partnerships that can improve critical infrastructure security and resilience.

Virtual IT/OT Summit

Solution Room: CISO and Cybersecurity Leaders, Exercise on IT/OT

Participants are invited to join one of the ten tables for this collaborative session, co-moderated by a CyberEdBoard Member and a distinguished Security Leader.
During this interactive session, CISOs and cybersecurity professionals will engage in a dynamic and timely exercise centered on a global ransomware attack. The scenario revolves around a fictional shipping and Logistics Company and its semiconductor manufacturer supply chain partner. The exercise is structured into three phases, each presenting unique challenges and crucial decision points relevant to real-life incident response.
The session’s objective is to provide practical insights into managing a global ransomware attack, mitigating supply chain risks, effectively engaging with law enforcement, and fostering a cyber-resilient organizational culture. By actively participating in the exercise, participants will gain valuable experience in dealing with cyber threats and hone their incident response preparedness, ultimately strengthening their organization’s cybersecurity defenses in the face of evolving challenges.

Crawford Thomas, Global Head of Cyber Threat Intelligence, Credit Suisse

Angus Clarke, BSO, Mastercard

Matt Gordon-Smith, Former CISO, Gatwick Airport

Milos Pesic, CISO, ABB Accelleron

Don Gibson, CISO, Kinly

Deborah Haworth, Director of Information Security,

Penguin Random House UK

Dom Lucas, Head of Security, British International Investment

Ash Hunt, Global CISO, APEX Group

Adam Wedgbury, Head of Enterprise Security Architecture, Airbus

 

 

Networking & Exhibition Break

Camilo Gomez

Global Cybersecurity Strategist, Yokogawa

OT Security: A Critical Priority for Every Industry

As IT and OT systems become increasingly interconnected, the security of physical processes—ranging from automated manufacturing lines to smart building systems and critical healthcare devices—has become essential to maintaining operational integrity. This session will underscore that OT security is a fundamental aspect of cybersecurity that every industry must prioritize to protect their critical operations

This session will delve into why OT security is vital across various sectors:

  • Critical Infrastructure Protection: Safeguarding systems from cyber threats to prevent widespread disruptions and ensure continuous operation of essential services.
  • Safety and Continuity: Ensuring the security of vital equipment and systems to maintain safety and uninterrupted operations across key environments.
  • Infrastructure Security: Protecting critical networks and control systems to avoid disruptions, ensure reliability, and prevent operational failures.
  • Operational Resilience: Securing automated processes and transaction systems to maintain smooth operations and protect sensitive information.

Camilo Gomez, Global Cybersecurity Strategist, Yokogawa

Virtual IT/OT Summit

IoT Ecosystem Security: End-to-End Encryption and Authentication

Deborah Haworth, Director of Information Security, Penguin Random House UK

Closing Comments

Don’t miss your chance to attend this dynamic impactful event

#ISMGSummit

@ISMG_News

Our Partners

CyberTech logo
Women in Cybersecurity logo
Water ISAC logo
Information Systems Security Association International logo
Swiss Cyber Institute logo

Register

RSVP here to attend our events. You can select for multiple or individual tickets. 

NOTE:  All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.

The Summit Experience

CPE Credits

Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

:

Upcoming ISMG Events

September 17, 2024

Cybersecurity Summit: London

September 24, 2024

The Elastic and Google Cloud GenAI Roadshow San Francisco: Explore the Next Generation of AI-Driven Search and Insight

September 26, 2024

Cybersecurity Summit: Canada East

October 1, 2024

Proactive Cyber Third-Party Risk Management: Gaining Control

October 17, 2024

Government Cybersecurity Summit: DC Hosted by GovInfoSecurity

Upcoming ISMG Events

September 17, 2024

Cybersecurity Summit: London

September 24, 2024

The Elastic and Google Cloud GenAI Roadshow San Francisco: Explore the Next Generation of AI-Driven Search and Insight

September 26, 2024

Cybersecurity Summit: Canada East

Andrew Robson

CISO, Bentley