This event has ended. Visit the official site or create your own event on Sched.
Welcome to the interactive agenda for SecurityWeek’s ICS 2022 ICS Cyber Security Conference. Sessions are being finalized and the final program will include 4 FULL DAYS of content. (View the full conference website here) (You can Register for the IN-PERSON Conference and trainings here and register for virtual/online only access here)
Main Stage [clear filter]
Tuesday, October 25

10:45am EDT

[Panel] 72 Hours and Counting: Preparing for and Responding to Critical Infrastructure Cyber Incidents
The Cyber Incident Reporting Act for Critical Infrastructure Act, which was enacted in March 2022, will require critical infrastructure organizations to report cyber incidents to the Cybersecurity and Infrastructure Security Agency (CISA) within 72 hours.  This aggressive timeline will require companies to have enhanced identification, escalation, and investigation processes in place.
In this session, we will discuss the new Act, and the practical steps companies should take, both proactively and during an incident, to comply with this and other industry-specific regulations and expectations.  We will also discuss the unique cybersecurity threats for critical infrastructure organizations that make the industry particularly vulnerable to a cyberattack and the importance of heightened focus to help prevent and contain incidents.

avatar for Ben Miller

Ben Miller

Vice President Professional Services and R&D, Dragos
Ben Miller is Vice President of Professional Services and R&D with Dragos, Inc., where he leads a team of analysts in performing active defense inside of ICS/SCADA networks. In this capacity he is responsible for a range of services including threat hunting, incident response, penetration... Read More →
avatar for Matthew R. Baker

Matthew R. Baker

Partner - San Francisco, Baker Botts L.L.P.
Matthew's cross-disciplinary practice focuses on data privacy, cybersecurity, crisis management, and incident response for a broad range of industries. He is well-versed in multi-jurisdictional privacy compliance; cyber risk identification, mitigation, and response strategies; complex... Read More →
avatar for Rachel Ehlers

Rachel Ehlers

Special Counsel, Baker Botts L.L.P.
Rachel has served as breach counsel and led incident response for more than one hundred high-profile cyber incidents – with a particular focus on heavy manufacturing and distribution.  Her practice focuses on technology transactions, cybersecurity and data privacy, and regulatory... Read More →

Tuesday October 25, 2022 10:45am - 11:30am EDT
Windsor Ballroom
Wednesday, October 26

10:30am EDT

{Panel} The End Goal for SBOMs - Lessons Learned and Moving Forward
Many of today’s critical infrastructure systems consist of legacy equipment originally designed to be perimeter-protected or air-gapped from unsecure networks. However, while many of these have become connected over time resulting in a strong emphasis on IT and network based cyber security, device and control system cyber security has not received the same attention.

Join us for an exciting panel discussion that will discuss:
  • Executive Order EO 14028 which has brought the requirement of SBOMs to the forefront.
  • How SBOMs can play a major role in securing the supply chain, devices and control systems. 
  • Where the onus resides for monitoring for vulnerabilities within the supply chain.

avatar for David Leichner

David Leichner

CMO, Cybellum
David Leichner, CMO at Cybellum. David started his career in network security at one of the leading banks on Wall Street followed by a similar role at TRW Space and Defense. Since moving to the supplier side, David has 25 years of executive management and consulting experience garnered... Read More →

avatar for Mirel Sehic

Mirel Sehic

Head of Cybersecurity, Honeywell Building Technologies
Mirel is the VPGM / Head of Cybersecurity for Honeywell Building Technologies (HBT). Having spent over a decade embedded across varying domains Mirel has global experience leading from the front in engineering, operations, marketing and sales disciplines. Employing a strategic mindset... Read More →
avatar for Adam Hahn

Adam Hahn

Lead Critical Infrastructure Security Engineer, MITRE
Adam Hahn is a Principal Critical Infrastructure Security Engineer at The MITRE Corporation where he supports ATT&CK for ICS development, along with numerous research projects funded by DOE, EPRI, and DHS. Previously he was an assistant professor in the Department of Electrical Engineering... Read More →

Wednesday October 26, 2022 10:30am - 11:15am EDT
Windsor Ballroom

11:15am EDT

{Panel} Insights from CISOs on OT Security Journey
Join this session of industry veterans as they discuss the cybersecurity challenges faced in securing the critical operational infrastructure for companies on a digital journey.  Hear lessons learned and insights from their real-world experience on the front lines, building defenses against the evolving and escalating cyber threats to the production networks and industrial control systems they were tasked with protecting.  The discussion will also explore suggestions for moving from a reactive posture to a more proactive stance against the APT’s industry faces today.  And then conclude with Q&A from the audience.

avatar for Ilan Barda

Ilan Barda

CEO, Radiflow
Ilan Barda, founder of Radiflow is a Security and Telecom executive with 20 years of experience in the industry. Ilan has deep experience in developing secure communication equipment from his service in the Information Security division of the IDF.

avatar for Nurettin Erginoz

Nurettin Erginoz

Head of Cybersecurity & Security Consultant, Sabancı DX / EnerjiSA
Nurettin Erginoz, Head of Cyber Security at Sabancı DX & Security Consultant for EnerjiSA - the largest power utility company in Turkey. Nurettin has a Master's degree in Computer Engineering and has been continuing his professional career in the field of Cyber Security for more... Read More →
avatar for John Allen

John Allen

Consultant, Former VP OT Cybersecurity at GSK
John Allen, a strategic consultant in Manufacturing IT bringing leadership in technology, process and culture across OT Cyber Security, Digital Transformation, M&A and Applications Systems. John started his career in IT Operations within the Aerospace industry and then moved into... Read More →
avatar for Emmett Moore III

Emmett Moore III

CEO, Red Trident Inc.
Emmett Moore is the Chief Executive Officer for Red Trident, Inc. providing expertise in ICS/OT Cybersecurity for public and private organizations. Prior to Red Trident, Inc. Emmett was the Cybersecurity Program lead for Cimation, LLC. While at Cimation, Emmett managed teams focused... Read More →

Wednesday October 26, 2022 11:15am - 12:00pm EDT
Windsor Ballroom
Thursday, October 27

11:15am EDT

{Panel} Tackling What’s Next for ICS Cybersecurity
We are often asked how relevant Zero Trust is for critical infrastructure/operational technology (CI/OT). The answer is not only is it highly relevant but, when done properly, will safeguard against what would otherwise be catastrophic attacks. The principles of Zero Trust are ideal in large part because CI/OT's purpose-built nature and correspondingly predictable network traffic (as well as being unpatched for long periods of time and therefore creating vulnerability).  Join Rob Rachwald, Director of Zero Trust Strategy at Palo Alto Networks, for a panel discussion on how others are leveraging the principles of Zero Trust to tackle cyber security's toughest challenge: what's next.  We'll ask panelists to share insights on how Zero Trust is helping them achieve higher levels of security and operational resilience in CI/OT technologies.

avatar for Rob Rachwald

Rob Rachwald

Director of Zero Trust Strategy, Palo Alto Networks

avatar for Jack D. Oden

Jack D. Oden

Program Director, ICS Cybersecurity SME, and Consultant, Parsons
Jack D. Oden, Principal Project Manager and ICS Cybersecurity Subject Matter Expert (SME), is a self-motivated, energetic, and accomplished team player and speaker with twenty years’ experience in negotiating system improvements between users and engineers; developing projects... Read More →
avatar for Del Rodillas

Del Rodillas

Client Partner, Americas Industrials and Critical Infrastructure, ISTARI

Thursday October 27, 2022 11:15am - 12:00pm EDT
Windsor DE

2:00pm EDT

Closing Panel: Takeaways and Insights from 2022 ICS Cybersecurity Conference
Join this session as we discuss takeaways from the week and share insights and thoughts based both on stage presentations and from the great networking discussions throughout the week.

avatar for Andrew Ginter

Andrew Ginter

VP Industrial Security, Waterfall Security Solutions
At Waterfall, Andrew leads a team of experts who work with the world's most secure industrial enterprises. Before Waterfall, Andrew led the development of high-end industrial control system products at Hewlett-Packard, of IT/OT middleware products at Agilent Technologies, and of the... Read More →

avatar for Kenny Mesker

Kenny Mesker

Enterprise OT Cybersecurity Architect, Chevron
avatar for Gonda Lamberink

Gonda Lamberink

VP, Critical Manufacturing Security Solutions, Fortress Information Security
avatar for Brian Schleifer

Brian Schleifer

Senior System Security/Cybersecurity Engineer, Modern Technology Solutions (MTSI)

Thursday October 27, 2022 2:00pm - 2:45pm EDT
Windsor Ballroom
Filter sessions
Apply filters to sessions.