Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Critical Infrastructure
Protecting essential systems like power and water from cyber threats.
SecurityGate's Ted Gutierrez presents three actionable tactics for enhancing cyber programs across OT, IT and IoT convergence.
Mihirr P Thaker, Yogesh Kulkarni, and Aditya Sarangapani explore threat intelligence for OT security. Learn strategies for asset visibility, cybersecurity resilience, and mitigating risks in legacy systems.
Industry leaders Erwin Eimers, Keon McEwen and Lorena Nunes explore the intersection of cybersecurity and operational safety in industrial systems.
SSH Communications' Eduardo Giancristofaro discusses secure access control solutions enabling digital transformation in OT environments.
Enbridge's Prashant Prashant introduces innovative approaches to integrating engineering precision with cybersecurity for critical infrastructure protection.
Join Matanda Doss, Ty Howard, Steve King, and Mike Manrod, in an exploration of the convergence of conventional, cyber, and information warfare. Learn about evolving Russian tactics, the role of perception warfare, and the need for integrated defense strategies in modern conflict.
Dr. Yoginder Talwar of NICSI explores cybersecurity challenges and opportunities in Digital India's evolving landscape.
MITRE Labs' Mark Bristow discusses current threat landscape and strategies for efficiently reducing risks to critical infrastructure.
Kaspersky's Georgy Kucherin explores APT41's evolution in 2024, examining their shift from supply chain attacks to targeted operations, new persistence mechanisms and enhanced detection evasion techniques.
Maurice Snoeren examines distinct approaches for protecting OT systems and interfaces, demonstrating effective security strategies for critical control and safety systems.
Grant Schneider talks about new cybersecurity strategy outlines five pillars that urge more mandates on the private sector, which controls most of the nation's digital infrastructure, and an increased government role to disrupt and dismantle threat actors. The strategy has been widely praised and has garnered conversations; however, it raises several questions - who is going to pay for it and who is going to execute it?
Palo Alto Networks' Robert Albach explores recent regulatory shifts in petrochemical security, including CFATS changes and TSA amendments.
Chris Johnson, senior director at WSP, presents a structured approach to OT cybersecurity road maps, covering strategic planning, life cycle integration and practical frameworks drawn from real-world infrastructure projects.
John Ballentine, ICS Security Program Manager at Port Authority of New York and New Jersey shares, strategies for managing OT assets in large infrastructure, including monitoring air-gapped systems.
Panel featuring leaders Bemi Anjous, Jon Taylor, Ken Dohan and Nikolai Zlatarev discuss balancing security measures with operational efficiency.
Learn about taming ICS and OT cyber threats to implement more secure cybersecurity risk management strategies today!
WSP's Christopher Johnson examines the evolution of OT-focused security operations centers, highlighting critical differences from traditional IT SOCs.
Antoine d'Haussy, OT security practice head for EMEA, Fortinet, shares insights on implementing SASE and SecOps technologies to protect OT CPS environments, focusing on network security enhancement and real-time monitoring for industrial assets.
The concept of zero trust has received unprecedented attention. After languishing for over 10 years following John Kindervag's invention of the concept, suddenly every security product and services vendor on the planet was offering a pathway to the zero trust promised land.
Zero trust, supply chain security and DevSecOps.
Join Dr. Chase Cunningham in an explanation of why companies should move away from VPNs and toward zero-trust network access (ZTNA) solutions.