Download PDF Version Of The Schedule

Monday, February 24:
Welcome & Keynote: Your Value As An OT Security Professional
Dale Peterson

Wednesday, February 26:
Burning Down Cities
Brian Foster

Monday, March 03:
Integrating Cybersecurity AI Technologies Into OT
Ofir Arkin

Wednesday, March 05:
OnRamp: Supply Chain
Cassie Crossley

Monday, March 10:
Fireside Chat: Who Needs To Step Up?
Paul Griswold & Dale Peterson

Wednesday, March 12:
It’s Not As Simple As “Use A Memory Safe Language”
– Colin Breck

Monday, March 17:
Operating With Adversary Supplied Components
– Emma Stewart

Wednesday, March 19:
OnRamp: AI In OT & ICS Security
Jeffrey Macre

Monday, March 24:
NIS2 As A Multi-Country Cyber Regulation Experiment
Dennis-Kenji Kipker

Wednesday, March 26:
What We Learned From ICS Pwn2Own
Vera Mens

Monday, March 31:
Cloud As A Governance Plane
Mark Kikta

Wednesday, April 02:
OnRamp: Cyber Informed Engineering
Andrew Ohrt

Monday, April 07:
Non-Security Metrics To Identify & Quantify Security Related Risk
JC Herz

Wednesday, April 09:
Evaluating Vendor AI Claims
Clint Bodungen

Monday, April 14:
Strategies And Lessons Learned From Internal Network Security Monitoring At Scale
Wes Futrell

Wednesday, April 16:
OnRamp: IT’s Impact On OT
Justin Pascale

Monday, April 21:
Financial Analysis Of The OT Security Market
Richard Stiennon

Wednesday, April 23:
Calculating The Payoff For Attack And Defensive Strategies
Adam Robbie

Monday, April 28:
Fireside Chat: Chris Anthony On Singapore’s OT Security Actions & Lessons Learned
Christopher Anthony & Dale Peterson

Wednesday, April 30:
OnRamp: Vulnerability Management – What To Patch When
Logan Carpenter

Monday, May 05:
Trust, Reputation, Data Security, And You
– David Chamberlin

Wednesday, May 07:
Your IDS Rules For ICS Stink (And How To Fix Them)
Reid Wightman

Monday, May 12:
Fireside Chat: Where OPC UA Makes Sense, Standards Adoption, & More
Tom Burke & Dale Peterson

Wednesday, May 14:
What Secure By Design Aspects Should You Prioritize?
Matthew Rogers

Monday, May 19:
Hot New Gameshow: My Favorite Metric!
Dale Peterson

Wednesday, May 21:
Decision Points: OT Fit-For-Purpose Or IT
Eric Forner

Tuesday, May 27:
Our Interruptible Future
Andy Bochman

Wednesday, May 28:
Deep Dive On Low Skilled Threat Actors
Ron Fabela

Monday, June 02:
Assessing The Cyber Readiness Of A State (Florida)
Ollie Gagnon

Wednesday, June 04:
AIBOM: Powering Transparency And Security In AI And Software Supply Chains
Helen Oakley

Monday, June 09:
Make The Big Decisions With Cyber Decision Diagrams
Sarah Fluchs

Wednesday, June 11:
A Severity Rating Scale For OT Security Incidents
Munish Walther-Puri

Monday, June 16:
Replacing Likelihood With Credibility In The Risk Equation
Andrew Ginter

Wednesday, June 18:
Translating Cyber Threat Intelligence Into Actionable Guidance For OT
Scott Bowman

Monday, June 23:
Alternate Factors For MFA Deep In The Manufacturing Environment
Bryan Owen

Wednesday, June 25:
SAST Tools For Secure PLC Programming
Sam Bryce

Monday, June 30:
Rating Deployed OT Firewalls’ Effectiveness
Jim Miller

Wednesday, July 02:
New Detection Models: Testing & Results
Ezz Tahoun

Monday, July 07:
OT Security Score For Manufacturers
Ulrich Lang

Wednesday, July 09:
Identifying Malware In Factory Program Files
Mars Cheng

Monday, July 14:
Testing (And Results) Of Level 1 Device Protocol Stacks
Edward Lopez

Wednesday, July 16:
How We Used Dynamic Edge Segmentation To Secure Our Hyperconnected Factory
Mark Finch

Monday, July 21:
Long Conversation: OT And IT – Convergence, Integration, And Separation?
Marty Edwards

Wednesday, July 23:
A PLC Integrated Security Module
Tamiki Kobayashi

Monday, July 28:
Getting An Installed Base Off The Internet
Anna Damon

Wednesday, July 30:
Securing Vehicle To Everything (V2X) And Accelerating Its Adoption
Kam Chumley-Soltani

Monday, August 04:
The Case For Vertical Specific (Rail) OT Security Training Materials
Jesus Molina

Wednesday, August 06:
Quantifying Risk For Devices Without Published Vulns
Yair Attar

Monday, August 11:
Micolearning Techniques To Improve Cybersecurity Awareness Training
Lindsey Mote

Wednesday, August 13:
Modified ROP Chain Generators To Identify Potential Code Execution Exploits
Ulf Kargén

Monday, August 18:
Supply Chain Chipping Attacks: When Should I Worry?
Monta Elkins

Wednesday, August 20:
Effectively Using Attribution
Mike Worley

Monday, August 25:
Converting A C++ Codebase To Rust
Mitch Souders

Wednesday, August 27:
Zones & Conduits In The Cloud
Dennis Hackney

Tuesday, September 02:
ControlLogix PLC Endpoint Hardening
Ahmik Hindman

Wednesday, September 03:
Using Microsoft Detours For Deep System Inspection
– Asher Davila

Monday, September 08:
Water: The (Potentially) Most Cyber-Resilient CI Sector
– Andrew Hildick-Smith

Wednesday, September 10:
Unsolicited Response
– Dale Peterson

Monday, September 15:
The Power Of Collaboration To Secure Critical Infrastructure
– Syed M. Belal