Tony Mannion, Industrial Cyber Security Business Development Manager, SolutionsPT
Keynote: Implementing an industrial cyber security framework to keep you ahead of the ever changing threat landscapes
Lee Carter, Industrial Cyber Security Product Manager, SolutionsPT
A planned, strategized approach with a sound framework in place is key to mitigate modern industrial cyber security risks. Do you have the right governance in place and how can the latest NIST framework help you on your journey?
Keynote: An industrial cyber security journey, a customer experience
Alex Fold, OT Cyber Security Specialist, Britvic
Challenges faced, successes and a personal journey of discovery implementing a cyber security strategy.
Plan B comes first – Disaster resilience and recovery
Chris Whitehead, Business Continuity Product Manager, SolutionsPT
Disaster resilience and recovery is often the last stage of implementing a cyber security strategy, but the OT environment is different as availability of systems like PLC’s and SCADA are key in any production environment. Find out why Plan B should be your first defence to make sure you can recover from incidents quickly.
Work smarter to detect threats and manage risks in your Industrial network
Grant Bailey, Solutions Engineer, Claroty
Using learnings from Claroty's State of XIoT bi annual report, this session will discuss the current threat landscape and what strategies can be used to mitigate today's security and operational risks and challenges. The session will leverage real world examples as published by Team 82.
Selecting the right end point protection (Anti Virus) for OT
Hugh Jones, Principal Channel Sales Engineer, BlackBerry
Discover how AI provides the right solution for end point protection in the OT environment. Be better prepared to handle cyber security incidents as they happen on the plant floor – enabling rapid response to minimise the risk of spreading to other parts of your network.
Seven steps to security – creating a modern security stack for industrial networks
Dom Storey, Principal Security Architect OT, Tenable
Threats in industrial networks are wide ranging – targeted threats from external and internal actors, collateral damage from actions between third parties, to mistakes by tired operators. Protecting your assets is the name of the game, but to do this effectively your security layers should be able to leverage the most important source of data – your asset database. This talk discusses seven key interlocked functions that deliver the best ‘bang for your buck’ in delivering comprehensive industrial security.
Lunch and Exhibition
Technical Lab 1
Choose an expert led tech session. Click HERE for details
Technical Lab 2
Your choice of workshop style breakout session. Click HERE for details