James Livermore
Global Cybersecurity Architect/CSO
CDM Smith
Check out the incredible speaker line-up to see who will be joining James.
Download The Latest AgendaDay 1: Wednesday, September 27th
Wednesday, September 27th, 2017
1:10 PM Critical Infrastructure is Becoming More Critical Because of the Internet of Things Work Load
As technology continues to move away from the traditional perimeter, security teams need to access and protect all the touch point. This includes managing and controlling how the Internet of Things (IoT) works. The industry is in a period of rapid development. The Industrial IoT deploys a number of sensors, which expands what needs to be monitored and protected.
In this session:
•Optimizing critical infrastructure for the next-generation work load
•Creating purpose-built and high-performing network that is also well-connected
•Expanding on machine learning and big data
•Securing embedded systems
Day 2: Thursday, September 28th
Thursday, September 28th, 2017
8:10 AM Future Proofing Industrial Control Systems
Industrial control systems serve as an integral part of critical infrastructure, empowering vital sectors including electricity, oil and gas, water, transportation, manufacturing, and chemical manufacturing. Effectively addressing ICS cybersecurity necessitates a comprehensive understanding of current security challenges and available mitigation tools. Defense-in-depth allows a flexible framework to strengthen security posture and help to defend against cybersecurity threats and vulnerabilities. Legacy systems used protocols that were difficult to hack, but with the convergence of IT and ICS architectures, recent high profile breaches have shown the potential risk. Organization must get creative in their defense and apply layered approaches that make targets less attractive and attainable.
•Implementing strategies for securing control system environments
•Investigating how threat actors can carry out attacks and the potential impact on industrial controls
•Evolving control systems management and security practices