ismg summit logo

December 5th, 2024

Virtual IoT and OT Security Summit

8:30 AM ET - 5:00 PM ET

Event Overview

The Virtual Summit: IoT & OT Security Summit will delve into the complexities of securing IoT and OT environments. Featuring industry luminaries, this summit offers keynotes, case-based learning and roundtable discussions tailored to address the latest threats and best practices in cyber risk management, zero trust networks, and critical infrastructure protection. Attendees will gain actionable insights on topics such as IT and OT convergence, manufacturing cybersecurity frameworks, and supply chain security, fostering a comprehensive understanding of the evolving cyber landscape.​

View our ISMG Event Experience video to see what your peers are saying about their participation. 

Highlight Topics

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Nim Nadarajah

CISO, HOVR

Vaughn Hazen

CISO, John Deere

David Ortiz

CISO, Church 7 Dwight

James Johnson

CISO, John Deere

Anne Coulombe

CISO, Werfen

Camilo Gomez

Global Cybersecurity Strategist, Yokogawa

Sawan Joshi

CISO, Mitiga Solutions

Marlon Sorongon

CISO, Maybank

Upendra Mardikar

EVP, CISO, TIAA

Jeremy Daily

Associate Professor, Colorado State University

Peeyush Patel

Global CISO, XPO

Tiuana Ross

Senior Director of Digital and ERP Cybersecurity, Fortune 500 MedTech Company

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage and knowledge sharing discussions. Hear what is on the minds of leading security experts as they share insights and challenges of the ever-evolving threat landscape.

Agenda

You can now view or download a PDF version of the attendee guide.

Opening Comments

Anne Coulombe

CISO, Werfen

James Johnson

CISO, John Deere

Amit Chaudhary

VP, Head of Cyber Security North America & Defense, Rolls-Royce

Fortifying Operations: Crafting a Resilient OT Cybersecurity Framework Across Industries

The stakes are higher than ever, and the need for a resilient OT cybersecurity strategy has never been more critical. This session will go beyond traditional security measures to explore how a proactive and comprehensive OT cybersecurity framework is essential for building operational resilience in the modern manufacturing landscape. By implementing a robust OT security strategy, manufacturers can transform today’s cyber risks into a strategic advantage, ensuring continuous operations and securing their place in the competitive market.

Key Takeaways:

  • Establishing Comprehensive Control: Develop and implement policies that provide deep visibility into your OT environment, enabling you to identify, prioritize, and mitigate risks effectively, thereby minimizing your attack surface.
  • Strengthening Operational Resilience: Explore real-world case studies that demonstrate how leading manufacturers are developing and executing OT cybersecurity strategies to protect their critical infrastructure from evolving threats.
  • Enhancing Competitive Edge: Learn how a resilient OT security strategy not only safeguards your operations but also enhances connectivity, efficiency, and overall business performance in the digital age.
  • Future-Proofing Manufacturing: Understand the key elements of a forward-looking OT cybersecurity framework that adapts to new challenges, ensuring your manufacturing operations remain secure and resilient against future cyber threats.

Anne Coulombe, CISO, Werfen

James Johnson, CISO, John Deere

Amit Chaudhary, VP, Head of Cyber Security North America & Defense, Rolls-Royce

Nim Nadarajah

CISO, HOVR

Rethinking Risk: Identity's Critical Role in IT and OT Convergence

Yet, amidst this well-worn narrative, one vital component often remains too-often overlooked: Identity. As IT and OT systems become increasingly intertwined, the role of Identity in bridging these two domains is not just important—it’s transformative.

This session will move beyond the standard discussions of IT/OT convergence and focus on the pivotal role that Identity plays in this integration. We will explore how Identity management acts as the crucial link between IT and OT, reshaping traditional approaches to risk management and security. By placing Identity at the center of this convergence, organizations can better protect their critical infrastructure, enhance their security posture, and respond more effectively to emerging threats.

Key Takeaways:

  • The Evolution of Convergence: Understanding how the integration of IT and OT has progressed and why the traditional convergence narrative is no longer sufficient.
  • Identity as the Bridge: Examining how Identity management is the critical factor that connects IT and OT systems, enabling more cohesive and secure operations.
  • Transforming Risk Management: How an Identity-centric approach fundamentally changes risk management strategies, providing greater visibility and control over both IT and OT environments.
  • Real-World Applications: Insights and case studies on how leading organizations are leveraging Identity to secure their converged IT/OT infrastructures.

Nim Nadarajah, CISO, HOVR

Virtual IT/OT Summit

Securing the Unseen: Addressing IoT Vulnerabilities in Industrial Environments

However, these benefits come with significant security challenges, as many IoT devices operate with minimal security measures, making them prime targets for cyberattacks. This session will explore the hidden vulnerabilities within IoT networks in industrial settings, the potential risks they pose to operational technology (OT) systems, and the strategies that organizations can implement to secure their IoT ecosystems.

Key Takeaways:

  • Understanding IoT Threats: Identify the specific vulnerabilities and threats associated with IoT devices in industrial environments, and how they differ from traditional IT and OT security concerns.
  • Securing the IoT Ecosystem: Learn best practices for implementing robust security protocols across IoT devices, from device-level security to network monitoring and incident response.
  • Integrating IoT and OT Security: Explore strategies for integrating IoT and OT security measures, ensuring seamless protection across connected industrial systems.
  • Case Studies in IoT Security: Review real-world examples of how leading organizations have successfully addressed IoT security challenges in their industrial operations.

Milos Pesic, CISO, ABB Accelleron

Adam Wedgbury, Head of Enterprise Security Architecture, Airbus

Ash Hunt, Global CISO, APEX Group

Marlon Sorongon

CISO, Maybank

Upendra Mardikar

EVP, Chief Information Security Officer, TIAA

Tiauna Ross

Senior Director of Digital and ERP Cybersecurity, Fortune 500 MedTech Company

Securing the Modern Supply Chain: Advanced Strategies for CISOs

With the increasing integration of digital and operational technology (OT) environments, cybersecurity leaders face new challenges that require advanced strategies and innovative approaches. This session will explore how seasoned CISOs can fortify their supply chains against evolving cyber threats, ensuring the resilience and security of their organizations. Through real-world examples and expert insights, participants will gain actionable knowledge to address vulnerabilities across global supply chains.

Key Takeaways:

  • Advanced Risk Assessment Techniques: Learn how to identify and mitigate complex vulnerabilities in both digital and physical supply chain components.
  • Vendor and Partner Security Best Practices: Explore rigorous due diligence processes and contractual strategies to ensure the security of third-party relationships.
  • Integrating Security by Design: Discover how to embed security throughout the product development lifecycle, from inception to deployment.
  • End-to-End Encryption Implementation: Understand the critical importance of encryption across all stages of data transmission and storage within the supply chain.
  • Incident Response and Recovery Planning: Develop robust incident response plans tailored to the unique challenges of supply chain disruptions.

 

Marlon Sorongon, CISO, Maybank 

 

Upendra Mardikar, EVP, Chief Information Security Officer, TIAA

 

Tiauna Ross, Senior Director of Digital and ERP Cybersecurity, Fortune 500 MedTech

Company

David Ortiz

CISO, Church & Dwight

Achieving Comprehensive Visibility in OT Systems

Attendees will learn how to enhance their security posture by leveraging advanced threat detection and response techniques that apply to multiple industries.

In this session, we will focus on:

  • Overcoming visibility challenges in OT environments
  • Implementing advanced monitoring and threat detection
  • Cross-industry strategies for improved cybersecurity posture

David Ortiz, CISO, Church & Dwight

Jeremy Daily

Associate Professor, Colorado State University

Peeyush Patel

Global CISO, XPO

Securing the Road: Why Vulnerabilities in Electronic Logging Devices are Everyone's Problem

This session, tailored for CISOs and cybersecurity leaders across various industries, provides crucial insights into these vulnerabilities.

 While the primary focus is on transportation, the session’s insights into IoT vulnerabilities, wireless network security, and firmware integrity are applicable to many sectors, including manufacturing, healthcare, finance, and critical infrastructure.

Learn how ELDs, mandated to track driving hours and log critical vehicle data, can be exploited via Bluetooth or Wi-Fi connections, leading to unauthorized control, data manipulation, and malware propagation. These insights are not just crucial for the transportation sector but resonate across all industries reliant on interconnected and IoT systems.

 The final vulnerability, and perhaps the most concerning, is the potential for a self-propagating truck-to-truck worm, which takes advantage of the inherent networked nature of these devices. Such an attack could lead to widespread disruptions in commercial fleets, with severe safety and operational implications.

 Key Takeaways:

  • Understanding the parallels between ELD vulnerabilities and broader IoT security challenges affecting various industries.
  • Practical measures to safeguard interconnected systems and prevent widespread operational disruptions.
  • The importance of cross-industry collaboration in tackling emerging cybersecurity threats

Jeremy Daily, Associate Professor, Colorado State University

 

Peeyush Patel, Global CISO, XPO

Camilo Gomez

Global Cybersecurity Strategist, Yokogawa

Patricia RoweSeale

CISO, CIBC Caribbean

OT Security: A Critical Priority for Every Industry

As IT and OT systems become increasingly interconnected, the security of physical processes—ranging from automated manufacturing lines to smart building systems and critical healthcare devices—has become essential to maintaining operational integrity. This session will underscore that OT security is a fundamental aspect of cybersecurity that every industry must prioritize to protect their critical operations

This session will delve into why OT security is vital across various sectors:

  • Critical Infrastructure Protection: Safeguarding systems from cyber threats to prevent widespread disruptions and ensure continuous operation of essential services.
  • Safety and Continuity: Ensuring the security of vital equipment and systems to maintain safety and uninterrupted operations across key environments.
  • Infrastructure Security: Protecting critical networks and control systems to avoid disruptions, ensure reliability, and prevent operational failures.
  • Operational Resilience: Securing automated processes and transaction systems to maintain smooth operations and protect sensitive information.

Camilo Gomez, Global Cybersecurity Strategist, Yokogawa

 

Patricia RoweSeale, CISO, CIBC Caribbean

Closing Comments

Don’t miss your chance to attend this dynamic impactful event

#ISMGSummit

@ISMG_News

Our Partners

CyberTech logo
Women in Cybersecurity logo
Water ISAC logo
Information Systems Security Association International logo
Swiss Cyber Institute logo

Register

RSVP here to attend our events. You can select for multiple or individual tickets. 

NOTE:  All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.

The Summit Experience

CPE Credits

Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

:

Upcoming ISMG Events

September 17, 2024

Cybersecurity Summit: London

September 24, 2024

The Elastic and Google Cloud GenAI Roadshow San Francisco: Explore the Next Generation of AI-Driven Search and Insight

September 26, 2024

Cybersecurity Summit: Canada East

October 1, 2024

Proactive Cyber Third-Party Risk Management: Gaining Control

October 17, 2024

Government Cybersecurity Summit: DC Hosted by GovInfoSecurity

Upcoming ISMG Events

September 17, 2024

Cybersecurity Summit: London

September 24, 2024

The Elastic and Google Cloud GenAI Roadshow San Francisco: Explore the Next Generation of AI-Driven Search and Insight

September 26, 2024

Cybersecurity Summit: Canada East

Andrew Robson

CISO, Bentley