Highlight Topics
- The Art and Science of Translating Cyber Risk and Loss Exposure Into Quantifiable Measures
- Future Threat Landscape
- Zero Trust Networks = Better Enterprise Security
- The Current Threat Landscape
- Critical Infrastructure Protection
The Virtual Summit: IoT & OT Security Summit will delve into the complexities of securing IoT and OT environments. Featuring industry luminaries, this summit offers keynotes, case-based learning and roundtable discussions tailored to address the latest threats and best practices in cyber risk management, zero trust networks, and critical infrastructure protection. Attendees will gain actionable insights on topics such as IT and OT convergence, manufacturing cybersecurity frameworks, and supply chain security, fostering a comprehensive understanding of the evolving cyber landscape.
View our ISMG Event Experience video to see what your peers are saying about their participation.
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage and knowledge sharing discussions. Hear what is on the minds of leading security experts as they share insights and challenges of the ever-evolving threat landscape.
The stakes are higher than ever, and the need for a resilient OT cybersecurity strategy has never been more critical. This session will go beyond traditional security measures to explore how a proactive and comprehensive OT cybersecurity framework is essential for building operational resilience in the modern manufacturing landscape. By implementing a robust OT security strategy, manufacturers can transform today’s cyber risks into a strategic advantage, ensuring continuous operations and securing their place in the competitive market.
Key Takeaways:
Anne Coulombe, CISO, Werfen
James Johnson, CISO, John Deere
Amit Chaudhary, VP, Head of Cyber Security North America & Defense, Rolls-Royce
Yet, amidst this well-worn narrative, one vital component often remains too-often overlooked: Identity. As IT and OT systems become increasingly intertwined, the role of Identity in bridging these two domains is not just important—it’s transformative.
This session will move beyond the standard discussions of IT/OT convergence and focus on the pivotal role that Identity plays in this integration. We will explore how Identity management acts as the crucial link between IT and OT, reshaping traditional approaches to risk management and security. By placing Identity at the center of this convergence, organizations can better protect their critical infrastructure, enhance their security posture, and respond more effectively to emerging threats.
Key Takeaways:
Nim Nadarajah, CISO, HOVR
However, these benefits come with significant security challenges, as many IoT devices operate with minimal security measures, making them prime targets for cyberattacks. This session will explore the hidden vulnerabilities within IoT networks in industrial settings, the potential risks they pose to operational technology (OT) systems, and the strategies that organizations can implement to secure their IoT ecosystems.
Key Takeaways:
Milos Pesic, CISO, ABB Accelleron
Adam Wedgbury, Head of Enterprise Security Architecture, Airbus
Ash Hunt, Global CISO, APEX Group
With the increasing integration of digital and operational technology (OT) environments, cybersecurity leaders face new challenges that require advanced strategies and innovative approaches. This session will explore how seasoned CISOs can fortify their supply chains against evolving cyber threats, ensuring the resilience and security of their organizations. Through real-world examples and expert insights, participants will gain actionable knowledge to address vulnerabilities across global supply chains.
Key Takeaways:
Marlon Sorongon, CISO, Maybank
Upendra Mardikar, EVP, Chief Information Security Officer, TIAA
Tiauna Ross, Senior Director of Digital and ERP Cybersecurity, Fortune 500 MedTech
Company
Attendees will learn how to enhance their security posture by leveraging advanced threat detection and response techniques that apply to multiple industries.
In this session, we will focus on:
David Ortiz, CISO, Church & Dwight
This session, tailored for CISOs and cybersecurity leaders across various industries, provides crucial insights into these vulnerabilities.
While the primary focus is on transportation, the session’s insights into IoT vulnerabilities, wireless network security, and firmware integrity are applicable to many sectors, including manufacturing, healthcare, finance, and critical infrastructure.
Learn how ELDs, mandated to track driving hours and log critical vehicle data, can be exploited via Bluetooth or Wi-Fi connections, leading to unauthorized control, data manipulation, and malware propagation. These insights are not just crucial for the transportation sector but resonate across all industries reliant on interconnected and IoT systems.
The final vulnerability, and perhaps the most concerning, is the potential for a self-propagating truck-to-truck worm, which takes advantage of the inherent networked nature of these devices. Such an attack could lead to widespread disruptions in commercial fleets, with severe safety and operational implications.
Key Takeaways:
Jeremy Daily, Associate Professor, Colorado State University
Peeyush Patel, Global CISO, XPO
As IT and OT systems become increasingly interconnected, the security of physical processes—ranging from automated manufacturing lines to smart building systems and critical healthcare devices—has become essential to maintaining operational integrity. This session will underscore that OT security is a fundamental aspect of cybersecurity that every industry must prioritize to protect their critical operations
This session will delve into why OT security is vital across various sectors:
Camilo Gomez, Global Cybersecurity Strategist, Yokogawa
Patricia RoweSeale, CISO, CIBC Caribbean
#ISMGSummit
@ISMG_News
RSVP here to attend our events. You can select for multiple or individual tickets.
NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.
Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
Upcoming ISMG Events