Agenda Day 2

7:30 am - 8:45 am Breakfast Briefing: Fortifying security and the convergence of cyber and physical infrastructure

This briefing will kick-off the summit in an information-packed breakfast briefing. This peer-to-peer conversation is designed to provide the security community with information about where the industry is headed next. Discuss:
·         What opportunities and challenges are brought to the fore by the convergence of cyber and physical infrastructure - what does this mean for our security priorities?
·         Examining where our peers are investing, where do we need to focus to enhance resiliency? And what critical solutions are available to streamline this process?
·         The problems nobody is talking about: what areas are we neglecting, which are overcompensated for? 

8:45 am - 9:00 am Chairperson’s Welcoming Remarks

9:00 am - 9:45 am Keynote: CISA’s Priorities for Advancing Critical Infrastructure Protection and Resiliency

·         Strategies in working with private partners to secure our infrastructure
·         Priorities for coordinating national cyber security and communications integration center
·         Coordinating security and resiliency efforts through public private partnerships

9:45 am - 10:45 am Building Bridges: Forging Relationships between Cyber and Physical Security Functions for Preparedness & Resiliency Efforts

Today’s threats to critical infrastructure security are more advanced than ever, often spanning across both physical and cybersecurity functions. What steps are being taken to improve collaboration between cyber and physical teams to enhance resiliency? In this experience-sharing exercise, led by Duke Energy’s Cyber and Physical functions, organizations will discuss how this has fundamentally changed their approach to security.
·         Understanding Asset Management: Understanding the criticality of assets that fall under both cyber and physical security domains, what does good look like in approaching asset management collaboratively?
·         Combatting Hybrid Attacks: Looking at the mechanics required to allow for effective communication across both security planes to stop potential hybrid attacks in their tracks.
·         Incident and Emergency Response: What are the pre-existing siloes between functions, and how can these be overcome to allow for faster, more strategic, emergency response efforts?

10:45 am - 11:30 am Power Talks & Refreshments

Much more than a refreshment break: use this hour to take pre-selected meetings with vendors in our capabilities center, a schedule will be provided for you upon your arrival. In your spare time, visit the exhibition hall to browse security solutions, and network with peers from across critical infrastructure sectors. 

11:30 am - 12:00 pm Case Study Surpassing the Standards and Securing your Facility with AI and ML Technologies

·         The benefits of these technological solutions, and how they provide your organization with the ultimate in physical security
·         Recognizing the gaps in operational technology and securing against them now
·         How AI and ML is fast-tracking the convergence of IT and physical security

12:00 pm - 12:30 pm How to Create a Trusted Information Sharing Model that provides Relevant, Actionable, and Secure Data

2019 is the 20th anniversary of the creation of the first Information Sharing & Analysis Center (ISAC).  The early years were marked by a frustrating lack of relevant and actionable information from the government sector and little information shared between ISAC members.  The Financial Services ISAC (FS-ISAC) broke down these barriers and developed an effective and trusted model that has been emulated by many other information sharing communities.  Bill Nelson, CEO of the Global Resilience Federation and former CEO of FS-ISAC, will describe the foundation for this model which includes:
·         Enhancing the trust model through adoption of the “Traffic Light Protocol” and secure anonymous submissions of shared information.
·         Improving industry-wide incident response through effective “All Hazards Playbook” procedures that are tested through periodic and regular Situational Awareness Exercises before a real event of significance occurs.
·         Working with the public sector to provide timely, accurate, relevant and actionable information sharing to/from government partners.
·         Understanding the Evolution of Cyber Attacks and making available new tools to ensure vital infrastructures can identify and defend against the latest threats and vulnerabilities.  

12:30 pm - 1:30 pm Networking Luncheon

Interactive Discussion Groups

1:30 pm - 2:00 pm Group A: Securing Emerging Automation Technologies to Protect Against Attacks on our Critical Infrastructure

2:00 pm - 2:30 pm Group B: The Evolving Role of Biometrics in Physical and Logical Access Controls

1:30 pm - 2:00 pm Group A: Driving Actionable Decisions for Critical Infrastructure through Data

2:00 pm - 2:30 pm Group B: Securing Operational Technology

2:30 pm - 2:45 pm Networking and Refreshments

2:45 pm - 3:10 pm Idaho National Laboratory Case Study

Deep-dive into INL’s ongoing efforts to form the first Resilience Optimization Center (IROC). Its message: we’re okay working in siloes, but we’re missing visibility by not learning from other infrastructure sectors. Its objective: to build these relationships and pilot regional resiliency approaches.   

3:10 pm - 4:00 pm Panel Discussion: Increasing Interoperability between Critical Infrastructure Sectors

·         Understanding where the critical infrastructure sectors are uniquely connected, so as to encourage ongoing improvements and collaboration.
·         Reviewing common post-emergency response assessment methodologies. How do Critical Infrastructure systems currently communicate, and how could this be improved?
·         What can be done to prepare for an emergency response situation that will contribute to fast response times and disaster recovery?              

4:00 pm - 4:45 pm Panel Discussion: Creating an Industry Standard for Preparedness during a Supply Chain Breach

·         What needs to be done to implement policy that would require vendors to disclose a hacking to their client? How this would improve relationships between operators and vendors, and national security generally.
·         Improving cybersecurity hygiene through hacking notification for both operators and vendors so as to increase security awareness
·         Examples from NERC and the energy sector 

4:45 pm - 5:00 pm Chairperson’s Closing Remarks