Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Critical Infrastructure
Protecting essential systems like power and water from cyber threats.
Grant Schneider talks about new cybersecurity strategy outlines five pillars that urge more mandates on the private sector, which controls most of the nation's digital infrastructure, and an increased government role to disrupt and dismantle threat actors. The strategy has been widely praised and has garnered conversations; however, it raises several questions - who is going to pay for it and who is going to execute it?
Join Dr. Chase Cunningham in an explanation of why companies should move away from VPNs and toward zero-trust network access (ZTNA) solutions.
Join Matanda Doss, Ty Howard, Steve King, and Mike Manrod, in an exploration of the convergence of conventional, cyber, and information warfare. Learn about evolving Russian tactics, the role of perception warfare, and the need for integrated defense strategies in modern conflict.
The concept of zero trust has received unprecedented attention. After languishing for over 10 years following John Kindervag's invention of the concept, suddenly every security product and services vendor on the planet was offering a pathway to the zero trust promised land.
Enbridge's Prashant Prashant introduces innovative approaches to integrating engineering precision with cybersecurity for critical infrastructure protection.
John Ballentine, ICS Security Program Manager at Port Authority of New York and New Jersey shares, strategies for managing OT assets in large infrastructure, including monitoring air-gapped systems.
MITRE Labs' Mark Bristow discusses current threat landscape and strategies for efficiently reducing risks to critical infrastructure.
SecurityGate's Ted Gutierrez presents three actionable tactics for enhancing cyber programs across OT, IT and IoT convergence.
Panel featuring leaders Bemi Anjous, Jon Taylor, Ken Dohan and Nikolai Zlatarev discuss balancing security measures with operational efficiency.
Industry leaders Erwin Eimers, Keon McEwen and Lorena Nunes explore the intersection of cybersecurity and operational safety in industrial systems.
Palo Alto Networks' Robert Albach explores recent regulatory shifts in petrochemical security, including CFATS changes and TSA amendments.
Dr. Yoginder Talwar of NICSI explores cybersecurity challenges and opportunities in Digital India's evolving landscape.
Zero trust, supply chain security and DevSecOps.
Mihirr P Thaker, Yogesh Kulkarni, and Aditya Sarangapani explore threat intelligence for OT security. Learn strategies for asset visibility, cybersecurity resilience, and mitigating risks in legacy systems.
SSH Communications' Eduardo Giancristofaro discusses secure access control solutions enabling digital transformation in OT environments.
Kaspersky's Georgy Kucherin explores APT41's evolution in 2024, examining their shift from supply chain attacks to targeted operations, new persistence mechanisms and enhanced detection evasion techniques.
Maurice Snoeren examines distinct approaches for protecting OT systems and interfaces, demonstrating effective security strategies for critical control and safety systems.
Chris Johnson, senior director at WSP, presents a structured approach to OT cybersecurity road maps, covering strategic planning, life cycle integration and practical frameworks drawn from real-world infrastructure projects.
WSP's Christopher Johnson examines the evolution of OT-focused security operations centers, highlighting critical differences from traditional IT SOCs.
Antoine d'Haussy, OT security practice head for EMEA, Fortinet, shares insights on implementing SASE and SecOps technologies to protect OT CPS environments, focusing on network security enhancement and real-time monitoring for industrial assets.
In this insightful session, Kirsten Turnbull, principal solution architect at Dragos, will delve into the basics of securing critical infrastructure.
Jerry Cochran presents cutting-edge research on adaptive resilience capabilities for critical energy infrastructure under cyberattack conditions.
Brian Foster of Southern California Edison covers shifting from attack prevention to survival strategies for maintaining operations during incidents.
Emyr Thomas explores translating cyber risks into business language, implementing guardrails for emerging tech adoption, and building collaboration frameworks that scale security across operational levels in critical infrastructure.
Sam Maesschalck reframes OT security through the lens of human factors, examining how cultural backgrounds shape risk perception, why IT-OT misunderstandings persist, and what building true resilience in industrial systems really means.
Rick Kaun presents a multi-dimensional ecosystem approach built on OT regulatory experience, covering contextual risk calculation, think-global-act-local architectures, and transforming reactive security into proactive data-driven programs.
Will Burnett of Xona reveals hidden risks of vendor-installed routers and legacy VPNs that create backdoors bypassing perimeter defenses, and explores practical approaches to delivering secure, policy-driven remote access controlled by OT teams.
Tom Mills shares National Gas's defense-by-design approach, drawing on 18 years of defense intelligence and enterprise cybersecurity experience to build resilient critical infrastructure.
Massimo Nardone of SSH Communications Security explores protecting critical infrastructure through secure access, zero trust architectures and quantum-safe encryption.
Andreas Klien presents findings from investigating over 100 substations and plants, sharing insights on power utility communications security, IEC 61850 innovation, and network security strategies for modernizing operational networks.
Claudio Sangaletti of Medmix discusses challenges of integrating AI into legacy systems and best practices to mitigate AI-related vulnerabilities in OT environments, applying expertise from leading global ICS cybersecurity initiatives.
Ivan Zhekov of TXOne Networks addresses determining and communicating legacy OT cybersecurity value to stakeholders, offering practical methodologies for assessing alignment of security measures with overarching business objectives.
Alex Fold examines how adversaries are accelerating their capabilities and leveraging deep expertise in IEC 62443 standards and SCADA security to highlight emerging threats and data-driven solutions for critical infrastructure protection.
Claudio Sangaletti, Marcin Szczepanik, Sam Maesschalck and Blake Gilson debate IT versus OT security ownership, exploring organizational structures and regulatory compliance.
Andrew McPhee of Cisco explores NIS2 segmentation requirements, software-based segmentation options and how AI can automate asset grouping to inform policies.
Graham Hawkey of Wallix Group demonstrates how automated credential management and access control drive efficiency and ROI while ensuring compliance with NIS and IEC 62443.
Avi Mileguir of Check Point covers exposure management strategy from threat intelligence through remediation.
Ben Jennings, Stuart Gordon, Daniel Rozday, Blake Gilson and Paul Holland share convergence success stories spanning energy, rail, manufacturing and postal sectors, exploring secure-by-design and zero-trust strategies for bridging domains.
Marta Majtenyi of Norsk Hydro provides a road map for cybersecurity policies in critical infrastructure.
Dan Mosca, Simon Deeks and Steve Broadwell explore securing OT using third-party data and external perspectives, sharing defense-in-depth architectures and compliance strategies from the nuclear and critical infrastructure sectors.
Marcin Szczepanik reveals how to build human-centric security strategies that create lasting culture change, sharing insights from building high-performing teams and pragmatic programs balancing regulation, risk, and operations.
Andres Prieto demonstrates integrating IEC 62443 standards into vulnerability management operations, focusing on aligning cybersecurity practices with organizational objectives in global industrial and manufacturing environments.
Margaux Tawil of Abnormal AI demonstrates how defensive AI combats generative AI threats by analyzing identity, behavior and content patterns across thousands of signals.
Pierre-François Guglielmi of Rubrik explores how unified identity protection reduces recovery time from days to hours while maintaining cyber resilience across hybrid environments.
Aurélien Svevi explains how application detection and response cuts through security noise by analyzing applications in production to connect attacks with exploitable vulnerabilities.
Gaspard Droz of Mantra shows how successful organizations build security awareness programs that reduce human factor risks through strategic content, consistent engagement and behavioral psychology.
Vincent Porte explains how organizations must evolve from periodic awareness training to comprehensive human risk management addressing AI-powered threats and sophisticated attacks.
Ramit Sharma and Madina Rashid explore how cybercriminals exploit AI capabilities through autonomous bots and deepfakes, while examining implementation challenges and ethical considerations for defense.
Gareth Dothie explores how criminal organizations systematically infiltrate financial institutions through insider targeting, examining governance failures and sophisticated intelligence gathering tactics.
Jennifer Huang and Chris Rankin share insights on balancing developer productivity with security in fintech environments, addressing AI-driven shadow IT and shifting security from gatekeeper to enabler role.
1 2 3 4 5 6 7 8 9 10 11 Next