September 27-29, 2017
Houston, Texas
James Livermore, Global Cybersecurity Architect/CSO at CDM Smith

James Livermore

Global Cybersecurity Architect/CSO
CDM Smith

Check out the incredible speaker line-up to see who will be joining James.

Download The Latest Agenda

Day 1: Wednesday, September 27th

Wednesday, September 27th, 2017

1:10 PM Critical Infrastructure is Becoming More Critical Because of the Internet of Things Work Load

As technology continues to move away from the traditional perimeter, security teams need to access and protect all the touch point. This includes managing and controlling how the Internet of Things (IoT) works.  The industry is in a period of rapid development.  The Industrial IoT deploys a number of sensors, which expands what needs to be monitored and protected.

In this session:

•Optimizing critical infrastructure for the next-generation work load
•Creating purpose-built and high-performing network that is also well-connected
•Expanding on machine learning and big data
•Securing embedded systems

Day 2: Thursday, September 28th

Thursday, September 28th, 2017

8:10 AM Future Proofing Industrial Control Systems

Industrial control systems serve as an integral part of critical infrastructure, empowering vital sectors including electricity, oil and gas, water, transportation, manufacturing, and chemical manufacturing. Effectively addressing ICS cybersecurity necessitates a comprehensive understanding of current security challenges and available mitigation tools.  Defense-in-depth allows a flexible framework to  strengthen security posture and help to defend against cybersecurity threats and vulnerabilities. Legacy systems used  protocols that were difficult to hack, but with the convergence of IT and ICS architectures, recent high profile breaches have shown the potential risk. Organization must get creative in their defense and apply layered approaches that make targets less attractive and attainable. 

•Implementing strategies for securing control system environments
•Investigating how threat actors can carry out attacks and the potential impact on industrial controls
•Evolving control systems management and security practices