events.secureworld.io Open in urlscan Pro
104.197.227.188  Public Scan

URL: https://events.secureworld.io/agenda/manufacturing-2023/
Submission: On July 27 via api from GB — Scanned from GB

Form analysis 2 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false" placeholder="Search"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url(&quot;https://www.google.com/cse/static/images/1x/en/branding.png&quot;) left center no-repeat rgb(255, 255, 255); outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2221756/de00eec1-d1e4-4ed7-92a5-513850f7168f

<form id="hsForm_de00eec1-d1e4-4ed7-92a5-513850f7168f" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2221756/de00eec1-d1e4-4ed7-92a5-513850f7168f"
  class="hs-form-private hsForm_de00eec1-d1e4-4ed7-92a5-513850f7168f hs-form-de00eec1-d1e4-4ed7-92a5-513850f7168f hs-form-de00eec1-d1e4-4ed7-92a5-513850f7168f_4af02bcd-7e35-43cf-9127-8ba8b973b52c hs-form stacked"
  target="target_iframe_de00eec1-d1e4-4ed7-92a5-513850f7168f" data-instance-id="4af02bcd-7e35-43cf-9127-8ba8b973b52c" data-form-id="de00eec1-d1e4-4ed7-92a5-513850f7168f" data-portal-id="2221756">
  <div class="hs_firstname hs-firstname hs-fieldtype-text field hs-form-field"><label id="label-firstname-de00eec1-d1e4-4ed7-92a5-513850f7168f" class="" placeholder="Enter your "
      for="firstname-de00eec1-d1e4-4ed7-92a5-513850f7168f"><span></span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="firstname-de00eec1-d1e4-4ed7-92a5-513850f7168f" name="firstname" required="" placeholder="First name*" type="text" class="hs-input" inputmode="text" autocomplete="given-name" value=""></div>
  </div>
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-de00eec1-d1e4-4ed7-92a5-513850f7168f" class="" placeholder="Enter your " for="email-de00eec1-d1e4-4ed7-92a5-513850f7168f"><span></span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-de00eec1-d1e4-4ed7-92a5-513850f7168f" name="email" required="" placeholder="Email address*" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="hs_blog_secureworld_post_subscription hs-blog_secureworld_post_subscription hs-fieldtype-radio field hs-form-field" style="display: none;"><label id="label-blog_secureworld_post_subscription-de00eec1-d1e4-4ed7-92a5-513850f7168f"
      class="" placeholder="Enter your Notification Frequency" for="blog_secureworld_post_subscription-de00eec1-d1e4-4ed7-92a5-513850f7168f"><span>Notification Frequency</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="blog_secureworld_post_subscription" class="hs-input" type="hidden" value="instant"></div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="Subscribe"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1690441773338&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1661960596593&quot;,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5790.110 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;Manufacturing | SecureWorld&quot;,&quot;pageUrl&quot;:&quot;https://events.secureworld.io/agenda/manufacturing-2023/&quot;,&quot;isHubSpotCmsGeneratedPage&quot;:false,&quot;hutk&quot;:&quot;a50d573ef2c0dc648b17e0fcad8a3602&quot;,&quot;__hsfp&quot;:600004306,&quot;__hssc&quot;:&quot;137277295.1.1690441775222&quot;,&quot;__hstc&quot;:&quot;137277295.a50d573ef2c0dc648b17e0fcad8a3602.1690441775221.1690441775221.1690441775221.1&quot;,&quot;formTarget&quot;:&quot;#hbspt-form-4af02bcd-7e35-43cf-9127-8ba8b973b52c&quot;,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1690441775235,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;2221756&quot;,&quot;formId&quot;:&quot;de00eec1-d1e4-4ed7-92a5-513850f7168f&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hbspt-form-4af02bcd-7e35-43cf-9127-8ba8b973b52c&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;css&quot;:&quot;&quot;,&quot;isMobileResponsive&quot;:true},&quot;correlationId&quot;:&quot;4af02bcd-7e35-43cf-9127-8ba8b973b52c&quot;,&quot;renderedFieldsIds&quot;:[&quot;firstname&quot;,&quot;email&quot;,&quot;blog_secureworld_post_subscription&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.3479&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.3479&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;3479&quot;,&quot;_debug_allPageIds&quot;:{},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1690441773405,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;Manufacturing | SecureWorld\&quot;,\&quot;pageUrl\&quot;:\&quot;https://events.secureworld.io/agenda/manufacturing-2023/\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5790.110 Safari/537.36\&quot;,\&quot;isHubSpotCmsGeneratedPage\&quot;:false}&quot;},{&quot;clientTimestamp&quot;:1690441773407,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;GB\&quot;&quot;},{&quot;clientTimestamp&quot;:1690441775229,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;a50d573ef2c0dc648b17e0fcad8a3602\&quot;}&quot;}]}"><iframe
    name="target_iframe_de00eec1-d1e4-4ed7-92a5-513850f7168f" style="display: none;"></iframe>
</form>

Text Content

This website stores cookies on your computer. These cookies are used to improve
your website and provide more personalized services to you, both on this website
and through other media. To find out more about the cookies we use, see our
Privacy Policy.
Accept Decline
Skip to content
×

search
 


 
Menu
 * Eventsexpand child menu
   * Become a Sponsor
   * Become a Speaker
   * FAQ
 * News
 * Webcastsexpand child menu
   * Remote Sessions
   * eSummits
   * PLUS Training
 * Podcast
 * About Usexpand child menu
   * Contact Us
   * Testimonials
   * Themes
   * Press Room
   * Privacy Policy
 * Subscribe

July 27, 2023
Thank you for your interest.
This event has already passed. Please see the Events page for a listing of
upcoming conferences.
Visit Events Page View this Event

1st Annual


SECUREWORLD MANUFACTURING VIRTUAL CONFERENCE

August 23, 2023 | 10:30 AM to 5 PM Eastern Time | #SecureWorldVirtual
August 23, 2023
Register Now
EVENT DETAILS
Advisory Council Venue & Hotel Info Exhibitors Become a Sponsor Become a Speaker
FAQs
Top 10 Reasons to Attend SecureWorld
Download Now
Conference Agenda
 * Day 1

Filter by registration level:
 * Open Sessions
 * Conference Pass
 * SecureWorld Plus
 * VIP / Exclusive

 * Wednesday, August 23, 2023
   10:30 am
   
   Exhibitor Hall open
    * 
   
   
   Registration Level:
    * Open Sessions
   
   10:30 am - 4:00 pm
   Location / Room: Exhibitor Floor
   
   Your opportunity to visit our solution vendor partners, whose sponsorship
   makes SecureWorld possible! Booths have staff ready to answer your questions.
   Look for participating Dash For Prizes sponsors to be entered to win prizes.
   
   11:00 am
   
   [Keynote] That Moment When You Realize There Is Nowhere Left to Hide
    * 
   
   Chris Roberts
   CISO and Senior Director, Boom Supersonic
   Registration Level:
    * Open Sessions
   
   11:00 am - 11:45 am
   
   We’ve connected everything, everywhere, all the time, so how DO we more
   efficiently interact with a digital realm that continually measures our pulse
   in the real world? Let’s talk about some attack vectors that I’ve spent the
   last few years researching and helping others work on. And then let’s talk
   about what we CAN do about things. You’ll never look at your lights the same
   way again.
   
   11:45 am
   
   Networking Break
    * 
   
   
   Registration Level:
    * Open Sessions
   
   11:45 am - 12:00 pm
   Location / Room: Exhibitor Floor
   
   Visit the Exhibitor Hall for vendor displays or connect with attendees in the
   Networking Lounge.
   
   12:00 pm
   
   Building a Sustainable Cybersecurity Program
    * 
   
   Changiz Sadr
   Director, Cyber Security Global Alliance
   Registration Level:
    * Open Sessions
   
   12:00 pm - 12:45 pm
   
   Join us for a dynamic session on “Building a Sustainable Cybersecurity
   Program” where we explore the significance of sustainable cybersecurity and
   its benefits. Discover real-life examples and best practices from various
   industries, showcasing successful integration of sustainable cybersecurity
   practices. Gain insights into the challenges of implementation and strategies
   to overcome them. Explore the policies and regulations that promote
   sustainable cybersecurity and understand their impact. Walk away with a
   comprehensive summary and actionable steps to create a resilient
   cybersecurity program for long-term success. Don’t miss this opportunity to
   safeguard your organization’s critical assets in an ever-evolving digital
   landscape.
   
   12:00 pm
   
   Managing Smart Buildings Service Provider Fragmentation
    * 
   
   Fred Gordy
   Director, Operational Technology Risk Assessment, Michael Baker International
   Registration Level:
    * Open Sessions
   
   12:00 pm - 12:45 pm
   
   Building control systems have been around since the late 1970s. These systems
   were digitally controlled and proprietary. The building staff could run the
   building, but the logic/programming required the system service provider’s
   knowledge to maintain. Over time, the building staff’s reliance on the
   service provider grew to the point that the service provider not only has
   unrestricted local access but also unrestricted remote access. And in most
   cases, the service provider provides and controls remote access. When you
   take this into account and multiply it by the number of building control
   systems per building, the number of service provider technicians that
   currently have access, and former employees that possibly have access, and
   then multiply this by the number of buildings owned, this number can be huge.
   Now take into consideration that most of the service providers are not bound
   to cybersecurity service provider agreements. These buildings are a high
   degree of risk exposure for building owners.
   
   Learning Objectives:
   
    * Participants will be exposed to the current state of the building control
      system cybersecurity.
    * Participants will be walked through some real-world examples of results
      when service provider management does not exist and/or breaks down.
    * Participants will learn the basic concepts of managing service providers
      using ISA 62443.
   
   12:00 pm
   
   Secure by Default: Evolving Security Expectations
    * 
   
   Jason Kikta
   CISO, Automox
   Registration Level:
    * Open Sessions
   
   12:00 pm - 12:45 pm
   
   CISA recently released their paper on “Secure by Design, Secure by Default”
   software that has support from seven major governments. It is meant to make
   significant, achievable improvements in software security. We will discuss
   the Secure by Default concept, why it is important, and what customers and
   vendors can do about it today.
   
   12:45 pm
   
   Networking Break
    * 
   
   
   Registration Level:
    * Open Sessions
   
   12:45 pm - 1:00 pm
   
   Visit the Exhibitor Hall for vendor displays or connect with attendees in the
   Networking Lounge.
   
   1:00 pm
   
   Cyber Resilience: Why It Is More Critical in a Post-Pandemic World and What
   Organizations Should Do About It
    * 
   
   Amit Basu
   VP, CIO & CISO, International Seaways
   Registration Level:
    * Open Sessions
   
   1:00 pm - 1:45 pm
   
   Session description coming soon.
   
   1:00 pm
   
   I Can See Clearly Now, the Threats Are Gone
    * 
   
   Tom Brennan
   Executive Director, Americas Region, CREST
   Registration Level:
    * Open Sessions
   
   1:00 pm - 1:45 pm
   
   Zero Trust is considered by many to be a marketing buzzword, but what it
   really alludes to is having good, basic cybersecurity hygiene. It’s what any
   cybersecurity professional worth their salt has been doing, and does, daily.
   Ransomware, phishing, and BEC grab the headlines, but your run-of-the-mill
   cyberattacks can’t be ignored because of the shiny new thing garnering all
   the attention.
   
   The CISO is like a musical conductor that must pay attention to all the
   resources at his or her disposal—be it people, tools, technologies, systems,
   and more. How is the organization handling security awareness training? What
   about staffing shortages affecting the organization, or even the vendors with
   which CISOs and their teams work?
   
   Join this session to hear insights and takeaways on the state of the
   information security profession today, including tips for seeing clearly and
   staying ahead of threats.
   
   1:00 pm
   
   A Proactive Approach to Incident Response for OT
    * 
   
   Chris Sistrunk
   Technical Leader on the ICS/OT Security Consulting team, Mandiant (now part
   of Google Cloud)
   Registration Level:
    * Open Sessions
   
   1:00 pm - 1:45 pm
   
   With a marked increase RaaS, APT, and nation-state sponsored attacks in the
   industrial cybersecurity sector over the last 18 months it is more critical
   than ever for organizations to build effective incident response capabilities
   for their Operational Technology (OT) and Industrial Control Systems (ICS)
   environments.
   
   Often when the OT process is down, so is the revenue stream. The pressure to
   get back operational is high – having a solid practiced plan, the right tools
   in place, and an effective decision-making process are critical to restoring
   production.
   
   1:45 pm
   
   Networking Break
    * 
   
   
   Registration Level:
    * Open Sessions
   
   1:45 pm - 2:00 pm
   
   Visit the Exhibitor Hall for vendor displays or connect with attendees in the
   Networking Lounge.
   
   2:00 pm
   
   Protecting High-Value AI Assets: A Comprehensive Security Framework for
   In-Use Protection, Ownership, and Data Privacy Across Diverse Domains
    * 
   
   
   Registration Level:
    * Open Sessions
   
   2:00 pm - 2:45 pm
   
   High value AI/ML models are being increasingly used in various use cases
   (surveillance, industrial, retail, medical, financial, etc.). The cost of
   training these AI models is very high due to the high-quality training data
   sets and time required to train and optimize these models. Once deployed,
   these assets are subject to various attacks including tampering and theft.
   Additionally, the data used for performance inference is sensitive not only
   to business value (industrial, retail) but also subject to regulations such
   as GDPR and HIPPA (surveillance, medical, financial).
   
   AI/ML models must be protected from tampering and theft while at rest, while
   in use (run time), and while in transit. Additionally, functionality to
   provide control to the Model Developer over the use of the model, along
   similar lines to traditional SW licensing is an added bonus and could deliver
   critical functionality such as Model Revocation if required.
   
   This AI/ML Security Framework is designed to be used by AI/ML domain
   specialists (data scientists, etc.), who have limited security expertise. The
   framework ensures model protection at rest, during transit, and run time. It
   also introduces the concept of model ‘ownership’ and thereby, licensing of
   the model. Controls are in place to allow the model developer to track model
   deployment and potentially revoke the use of a model that is found to be
   misbehaving or has some other critical flaw. A license to an improved version
   of the model can then be issued to the customer.
   
   Cryptographic techniques are used to ensure the integrity and confidentiality
   of the model, which protects it while in transit and at rest. Intel Trusted
   Execution Environments (TEEs) of varying strengths (VT-x, SGX, Containers)
   are used to protect the model at run time. Attestation is used to report the
   run time environment via a Licensing Protocol that determines if the model
   can be used in that environment or not. This forms the basis of providing the
   model developer with a level of control over the usage of the model.
   
   From a Data Protection standpoint, the cryptographic and run-time protections
   are extended to data streams that are used as input to various AI/ML based
   analytics use cases. The output analytics results are also protected using
   the same scheme. Data is processed by a model within one of the
   aforementioned TEEs. Like AI/ML models, data is protected at rest, while in
   transit, and when used for inference operations.
   
   Intel TEE attestation during licensing relies on a combination of Secure Boot
   and Intel Platform Trust Technology (firmware TPM) or SGX based DCAP. The
   framework also provides a transparent key-store mechanism for securely
   generating and using cryptographic keys for identity, confidentiality, and
   integrity. The key store mechanism is also bound to hardware via TPM/PTT
   based sealing or SGX sealing.
   
   All the above-mentioned functionality is wrapped in a set of easy-to-use
   tools for asset protection, a reference license server implementation, and a
   TEE based run-time inference environment currently based on, but not limited
   to Intel’s OpenVINO framework. The entire suite of tools and components is
   currently open-sourced and available for the Linux KVM (VT-x), Intel SGX
   (with Gramine), and Kubernetes Containers.
   
   2:00 pm
   
   Social Engineering: Training the Human Firewall
    * 
   
   Reanna Schultz
   Team Leader of Information Security, Garmin
   Registration Level:
    * Open Sessions
   
   2:00 pm - 2:45 pm
   Phishing is one of the leading cyberattacks worldwide, resulting in numerous
   social engineering training exercises to train average users to defend
   against these attacks. This discussion focuses on research that took a pool
   of users with three different phishing campaigns. Each campaign progressively
   has a phish that should be more advanced to spot than the previous phish
   presented. The research shows the psychological reasoning behind why a user
   will interact with a phish, regardless of educational awareness. Results
   include why a 0% or 100% report rate is unrealistic and how to use phishing
   metrics to quantify risk in a business.
   2:00 pm
   
   Mitigating Data Privacy and Cybersecurity Risk Throughout the Supply Chain
    * 
   
   Dafina Buçaj
   Data Privacy & Cybersecurity Attorney, Constangy, Brooks, Smith & Prophete,
   LLP
   Registration Level:
    * Open Sessions
   
   2:00 pm - 2:45 pm
   
   Attendees will walk away with a practical understanding of how to involve key
   stakeholders at various points in the compliance program development process
   and the importance of third-party risk management concerning the overall data
   security and compliance culture within an organization.
   
   Businesses are increasingly built on a complex spiderweb of third-party
   providers that access a business’s systems, data, and other critical
   operations. This includes all manufacturing companies that rely on third
   parties—such as service providers, SAAS vendors, or contractors—to manage
   data and sensitive operations. Organizations typically have limited control
   over third parties, limited transparency into their security practices, and
   limited availability or resources to track third-party security upgrades. As
   owners and managers of portions of critical infrastructure, it is important
   for these companies to evaluate the current threat landscape and shift
   perspective on cyber threats from “if” to “when” as they examine
   preparedness, protocols, and employee education throughout upstream,
   midstream, and downstream operations.
   
   Mitigating data privacy, cybersecurity, and technology risk throughout the
   supply chain should be a priority for organizations, and our presentation
   will touch on key considerations for third-party management, including due
   diligence, contractual terms, and ongoing compliance.
   
   2:45 pm
   
   Networking Break
    * 
   
   
   Registration Level:
    * Open Sessions
   
   2:45 pm - 3:00 pm
   
   Visit the Exhibitor Hall for vendor displays or connect with attendees in the
   Networking Lounge.
   
   3:00 pm
   
   Why Third-Party Cyber Risk Should Be Manufacturing's Top Priority
    * 
   
   Melissa Ventrone
   Partner, Data Privacy & Cybersecurity, Clark Hill PLC
   Registration Level:
    * Open Sessions
   
   3:00 pm - 3:45 pm
   
   Third-party cyber risk is a pressing concern for manufacturers. 70% have
   experienced breaches stemming from overprivileged vendor access, making them
   ripe targets for ransomware. This session will explore the brand,
   operational, and legal dangers of poor vendor management. It will provide
   best practices for securing third parties, including thorough vetting, access
   controls, and monitoring of privileged sessions. With third-party reliance
   increasing, manufacturers must make securing vendor access a top priority to
   minimize cyber risk.
   
   3:00 pm
   
   Cybersecurity Jobs Data: What Jobs Are Steady, and Which Are Volatile?
    * 
   
   Deidre Diamond
   Founder and CEO, CyberSN and Secure Diversity
   Registration Level:
    * Open Sessions
   
   3:00 pm - 3:45 pm
   
   Are you interested in the state of cybersecurity jobs in our current economy?
   In this discussion, we will dive into the latest data on cybersecurity job
   trends in the U.S over the past 6 months. With an average of 190,000
   cybersecurity jobs posted each month, this comprehensive data set will
   provide valuable insights into the ever-evolving world of cybersecurity.
   
   3:00 pm
   
   Tackling the Unique, Cybersecurity Challenges of the OT World
    * 
   
   David Mau
   Cybersecurity Consultant, WPS USA
   Registration Level:
    * Open Sessions
   
   3:00 pm - 3:45 pm
   
   An overview of the Cybersecurity vulnerabilities commonly seen within OT or
   Industrial Control System (ICS) networks, as well as the techniques that can
   be used to mitigate risk. The vulnerability focused topics include the common
   infiltration/disruption methods (attack vectors) and the common targets
   within OT environments (attack surfaces). Remediation topics include
   discussions on RMF processes, cyber threat modeling, and secure network
   design from an OT perspective. This presentation prioritizes explaining the
   common attack vectors and surfaces that WSP USA sees in industry, as well as
   the typical recommendations to harder OT networks against intrusion.
   
   3:45 pm
   
   Networking Break
    * 
   
   
   Registration Level:
    * Open Sessions
   
   3:45 pm - 4:00 pm
   
   Visit the Exhibitor Hall for vendor displays or connect with attendees in the
   Networking Lounge.
   
   4:00 pm
   
   Cyber-Enabled Fraud and Business Email Compromise in 2023
    * 
   
   Stephen Dougherty
   Financial Fraud Investigator, Global Investigative Operations Center, U.S.
   Secret Service
   Registration Level:
    * Open Sessions
   
   4:00 pm - 4:45 pm
   This presentation will focus on the BEC fraud playbook and show how technical
   advancements and applications have reduced the red flags and defenses against
   cyber fraud, allowing threat actors to increase the efficacy of their
   attacks.
   4:00 pm
   
   A Whole Lotta BS (Behavioral Science) About Cybersecurity
    * 
   
   Lisa Plaggemier
   Executive Director, National Cybersecurity Alliance
   Registration Level:
    * Open Sessions
   
   4:00 pm - 4:45 pm
   
   Let’s be honest: people can frustrate us. They don’t always do the things
   we’d like, and they often do some things we’d rather they didn’t. New
   research from the National Cybersecurity Alliance reveals insights about the
   public’s attitudes and beliefs about security.  We’ll explore the 2022 “Oh
   Behave! Cybersecurity Attitudes and Behaviors Report,” and some of the
   findings may surprise you! We’ll also give you practical, actionable advice
   on how you can better communicate to influence the behavior change you want
   to see.
   
    

Keynote & Speaker Information
SecureWorld Manufacturing 2023
August 23, 2023
Exhibitors
 * Automox
   Booth:
   
   Automox tackles one of today’s biggest cybersecurity challenges:
   misconfigured and out-of-date systems that can easily be exploited. Legacy
   tools simply cannot remediate known vulnerabilities as efficiently as modern
   IT demands. Automox is rewriting those rules with a cloud-native endpoint
   hardening platform that delivers unprecedented speed, simplicity, and
   automation—whether it is on-prem, in the cloud, or on the move.

 * CyberFOX
   Booth:
   
   CyberFOX is a global cybersecurity solutions provider focused on privileged
   access management (PAM) and password management for managed service providers
   (MSPs) and IT Pros. Its flagship products—Password Boss for password
   management and AutoElevate for PAM—supply critical elements of a
   comprehensive security strategy. The ability to mitigate risks by controlling
   user access to critical information strengthens MSPs and IT department’s
   security defenses. Prioritizing cybersecurity best practices as a company
   allows CyberFOX to make complex security simple while providing affordable
   and efficient solutions.

 * Mandiant, now part of Google Cloud
   Booth:
   
   Since 2004, Mandiant has been a trusted partner to security-conscious
   organizations. Effective security is based on the right combination of
   expertise, intelligence, and adaptive technology, and the Mandiant Advantage
   SaaS platform scales decades of frontline experience and industry-leading
   threat intelligence to deliver a range of dynamic cyber defense solutions.
   Mandiant’s approach helps organizations develop more effective and efficient
   cyber security programs and instills confidence in their readiness to defend
   against and respond to cyber threats. Mandiant is now part of Google Cloud.

Return to Agenda
Keynote Speakers
 * Chris Roberts
   CISO and Senior Director, Boom Supersonic
   https://boomsupersonic.com/
   
   Chris is the CISO for Boom Supersonic and works as an advisor for several
   entities and organizations around the globe. His most recent projects are
   focused within the aerospace, deception, identity, cryptography, Artificial
   Intelligence, and services sectors. Over the years, he's founded or worked
   with several folks specializing in OSINT/SIGINT/HUMINT research, intelligence
   gathering, cryptography, and deception technologies. These days he’s working
   on spreading the risk, maturity, collaboration, and communication word across
   the industry. (Likely while coding his EEG driven digital clone that’s
   monitoring his tea and biscuit consumption!)
   
   Since the late 90’s Chris has been deeply involved with security R&D,
   consulting, and advisory services in his quest to protect and defend
   businesses and individuals against various types of attack. Prior to that he
   jumped out of planes for a living, visiting all sorts of interesting
   countries and cultures while doing his best to avoid getting shot at too
   often. (Before that, he managed to get various computers confiscated by
   several European entities.)
   
   He’s considered one of the world’s foremost experts on counter threat
   intelligence and vulnerability research within the Information Security
   industry. He’s also gotten a name for himself in the transportation arena,
   basically anything with wings, wheels, tracks, tyres, fins, props or paddles
   has been the target for research for the last 15 years. (To interesting
   effect.)
   
   Chris has led or been involved in information security assessments and
   engagements for the better part of 25 years and has a wealth of experience
   with regulations such as GLBA, GDPR, HIPAA, HITECH, FISMA, and NERC/FERC. He
   has also worked with government, state, and federal authorities on standards
   such as CMS, ISO, CMMC, and NIST.
   
   Chris has been credentialed in many of the top IT and information security
   disciplines and as a CyberSecurity advocate and passionate industry voice, he
   is regularly featured in national newspapers, television news, industry
   publications and several documentaries. He can typically be found waving arms
   on a stage somewhere on this planet…or hacking into whatever’s taken his
   fancy… (Cows and camels being two of the more bizarre things, we’ll ignore
   things in space for now.)
   
   As one of the well-known hackers and researchers, Chris is routinely invited
   to speak at industry conferences. CNN, The Washington Post, WIRED, Business
   Insider, USA Today, Forbes, Newsweek, BBC News, Wall Street Journal, and
   numerous others have covered him in the media.
   
   And worst case, to jog the memory, Chris was the researcher who gained global
   attention in 2015 for demonstrating the linkage between various aviation
   systems, both on the ground and while in the air that allowed the
   exploitation of attacks against flight control system.

Speakers
 * Changiz Sadr
   Director, Cyber Security Global Alliance
   https://www.csga-global.org/
   
   Sadr is a highly motivated and results-oriented professional, leader, and
   engineer dedicated to getting things done. With a passion for finding
   innovative solutions, he thrives on challenges that push the boundaries and
   encourage others to think outside of the box. His ultimate goal is to
   collaborate with like-minded individuals to create a better and safer world.

 * Fred Gordy
   Director, Operational Technology Risk Assessment, Michael Baker International
   https://mbakerintl.com/
   
   Fred Gordy is a nationally recognized thought leader, speaker, and expert in
   building systems cybersecurity specializing in organizational and technical
   vulnerabilities. He has over 20 years of industry experience including
   information technology and building controls systems. Fred has been the
   Chairperson of the Cyber Security Committee for the InsideIQ 55 international
   member companies, Security Steering Committee Member for S.E.A.T. (Sports &
   Entertainment Alliance in Technology), founding member of Cyber Security for
   Control Systems Association International (CS2AI), past president and current
   president emeritus the Atlanta CS2AI Chapter.

 * Jason Kikta
   CISO, Automox
   https://www.automox.com/
   
   Jason Kikta is the Chief Information Security Officer at Automox. He
   previously served for over 20 years in the United States Marine Corps, which
   included seven years at U.S. Cyber Command designing and managing the
   national counter-APT and counter-ransomware missions.

 * Amit Basu
   VP, CIO & CISO, International Seaways
   https://intlseas.com/
   
 * Tom Brennan
   Executive Director, Americas Region, CREST
   https://www.crest-approved.org/
   
   Tom Brennan is the CIO of the national law firm Mandelbaum Barrett PC and
   leads the U.S. arm of CREST International. In this role, he works with
   government and commercial organizations to optimize the value of CREST as a
   cybersecurity accreditation body and industry standards advocate,
   particularly for companies in the Cybersecurity & Infrastructure Security
   Agency’s 16 critical infrastructure sectors which are vital to U.S. security,
   national economy, and public health and safety. As CREST USA Chairman,
   Brennan spearheads strategic plans for CREST USA’s organizational growth
   while also serving as an industry evangelist and educator on the value of
   using accredited cybersecurity products and professionals to improve consumer
   privacy, security, and protection worldwide.
   
   As a proud U.S. Marine veteran, Brennan became involved with CREST
   International in 2016 while serving the Global Board of Directors for the
   Open Web Application Security Project (OWASP). Seeing similar goals, he
   became more active in the CREST organization and was nominated to lead the
   organization’s U.S. Advisory in 2019. Over his career, Brennan has amassed
   security expertise across the cybersecurity spectrum, including penetration
   testing, vulnerability assessment, application security, threat intelligence,
   and more. In addition to being CREST USA Chairman, he is the Chief
   Information Officer of the national law firm Mandelbaum Barrett, overseeing
   critical infrastructure, privacy, and security operations. He is also an
   Advisory Board Member of the information services advisory Gerson Lehrman
   Group, a Cyber Fellows Advisory Council Member, a Member of the Information
   Technology Advisory Committee of the County College of Morris, a Senior
   Advisor and Industry Advisory Board Member of the New Jersey Institute of
   Technology, and a Cyber Fellows Advisory Council Member of the NYU Tandon
   School of Engineering.

 * Chris Sistrunk
   Technical Leader on the ICS/OT Security Consulting team, Mandiant (now part
   of Google Cloud)
   https://www.mandiant.com/
   
   Chris Sistrunk is Technical Leader on the Mandiant ICS/OT Security Consulting
   team at Mandiant (now part of Google Cloud) focusing on helping protect and
   secure critical infrastructure around the world for over 9 years. Before
   Mandiant, Sistrunk was a Senior Engineer at Entergy for over 11 years where
   he was a subject matter expert for Transmission and Distribution SCADA
   systems. Sistrunk was awarded Energy Sector Security Professional of the Year
   in 2014. He is a Senior Member of the IEEE and is a registered Professional
   Engineer in Louisiana. He founded BSidesJackson, co-founded the BEER-ISAC,
   and helped organize the ICS Village at DEF CON 22. He holds BS electrical
   engineering and MS engineering and technology management degrees from
   Louisiana Tech University.

 * Reanna Schultz
   Team Leader of Information Security, Garmin
   
   Reanna Schultz is from Kansas City, MO, and attended the University of
   Central Missouri (UCM). She graduated in 2018 with her Bachelor of Science in
   Cybersecurity: Secure Software Development and in 2020 for Master of Science
   in Cybersecurity: Information Assurance. While being in the industry, Reanna
   has been exposed to numerous SANS hosted classes. Reanna volunteers as a
   National Cyber League coach and provides her industry expertise by doing
   guest speaker talks for numerous colleges and high schools across the Midwest
   to STEM students. Reanna currently works as a Team Lead at Garmin and
   directly reports out of their SOC.

 * Dafina Buçaj
   Data Privacy & Cybersecurity Attorney, Constangy, Brooks, Smith & Prophete,
   LLP
   https://www.constangy.com/
   
   Dafina Buçaj counsels and advises Octillo clients on the development and
   implementation of enterprise-wide data security and privacy programs and
   regulatory compliance under federal, state, and international privacy
   regulations. Her practice includes helping organizations build out data
   privacy and security regulatory assessments, information privacy and security
   protocols and policies, external policies, data collection, vendor risk
   assessments, contract development and review, and threat mitigation plans.
   With a global perspective, Dafina also helps organizations address compliance
   with number global regulations, including the GDPR, PIPIEDA, CASL, POPIA,
   LGDP, PIPL, and other emerging privacy and security laws.

 * Melissa Ventrone
   Partner, Data Privacy & Cybersecurity, Clark Hill PLC
   
   Melissa Ventrone focuses her practice on class action privacy litigation,
   privacy breach response (pre- and post-event), payment card industry (PCI)
   standards and investigation, and advising clients in identifying, evaluating
   and managing first- and third-party data privacy and security risks. Melissa
   has represented numerous clients in litigation and arbitration, including in
   disputes related to privacy, invasion of privacy, contracts, consumer fraud,
   statutory claims and other matters, using her strong organizational and
   advocacy skills to obtain the best results for her clients.
   
   Melissa frequently advises clients on compliance with regulations and state,
   federal and international law. She serves as the leader of Thompson Coburn's
   breach response team, quickly bringing lawyers, clients, and forensic and
   breach response vendors together to enhance response time and effectiveness.
   Melissa has handled numerous breaches for small and large corporations,
   including merchants, financial institutions, medical providers and
   educational institutions, successfully reducing public and regulatory
   scrutiny and protecting her clients’ reputations.
   
   Melissa was featured in the March 1, 2013, Chicago Lawyers Inspiring
   Innovators series, and was recently quoted in Dark Reading, How to Cushion
   the Impact of a Security Breach. She is a frequent speaker on data privacy
   and security, cyber liability and breach response.

 * Deidre Diamond
   Founder and CEO, CyberSN and Secure Diversity
   https://www.cybersn.com/
   
   Deidre Diamond is the founder and CEO of CyberSN, the largest cybersecurity
   talent acquisition technology and services firm in the U.S., transforming job
   searching and hiring for the cybersecurity industry. Standardizing all
   cybersecurity job functions into a common taxonomy of 45 roles, the CyberSN
   platform allows professionals to make anonymous, public profiles that match
   with employer-posted job descriptions using the same taxonomy. This
   innovation is disruptive and solves a serious national security issue.
   Deidre’s leadership style combines 25 years of experience working in
   technology and staffing, her love of the cybersecurity community, and a
   genuine enthusiasm for people. She has led large-scale sales and operations
   and built high-performance teams at Rapid7 and Motion Recruitment prior to
   founding her own organizations. She believes a company-culture established on
   ‘anything is possible’ attitudes and open communication frameworks, along
   with positive energy, career advancement, and kindness, enables her teams to
   have fun at work and reach beyond peak performance. She also encourages the
   use of EQ (Emotional Intelligence) skills: self-awareness, self-regulation,
   motivation, social skills, and empathy. Deidre has also founded
   SecureDiversity.org, a non-profit organization working to raise awareness
   for, and increase the hiring of, women and underrepresented humans in the
   cybersecurity workforce. She has also spoken at some of the biggest tech
   summits, conferences, and podcasts in the world including ISC2 Congress, RSA,
   ISSA International, and Hacker Halted.

 * David Mau
   Cybersecurity Consultant, WPS USA
   
 * Stephen Dougherty
   Financial Fraud Investigator, Global Investigative Operations Center, U.S.
   Secret Service
   https://www.secretservice.gov/investigation/cyber
   
   Stephen Dougherty has over a decade of investigative experience. His career
   as a Financial Fraud Investigator in support of the federal government has
   played a pivotal role in criminal investigations, surrounding cyber-enabled
   financial crime, money laundering, human trafficking, identity theft,
   healthcare fraud, embezzlement, tax/government program fraud, dark web
   crimes, among others. Stephen’s main area of expertise is combatting money
   laundering in all its forms. Aside from this, Stephen has been proactive in
   identifying new and future trends in the world of financial crime. Such
   trends include the cyber security nexus of financial crimes and its
   ever-growing relationship in major financial crimes such as Business Email
   Compromise and the rise of the dark web and the use of virtual currency as a
   vehicle for facilitation of financial crimes. Stephen has been a leader and a
   mentor to other investigators teaching them how to uncover fraud internally
   and externally. Stephen is currently an investigator contracted to the U.S.
   Secret Service’s Global Investigative Operations Center (GIOC) in Washington
   D.C.

 * Lisa Plaggemier
   Executive Director, National Cybersecurity Alliance
   https://staysafeonline.org/
   
   Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance.
   She is a recognized thought leader in security awareness and education with a
   track record of engaging and empowering people to protect themselves, their
   families, and their organizations. Lisa is a University of Michigan graduate
   (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast
   as she could.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your
phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Learn and connect virtually

Join your InfoSec peers for high-quality training and collaboration. Sign up
today!

Register Now
 * Privacy Policy
 * Contact Us
 * Press Room
 * Advertise
 * Exhibit

Notification Frequency


 * 
 * 
 * 
 * 
 * 

Copyright © 2021 Seguro Group Inc. All rights reserved.