Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Manufacturing
Securing industrial manufacturing systems, supply chains, and smart factories.
Yair Attar, CTO and co-founder of Otorio, demonstrates why reactive OT security approaches fall short in large industrial settings. Through an automotive case study, he shows how automated, context-aware strategies can replace manual processes, delivering better protection at lower costs.
Rick Kaun, VP solutions at Verve, shares practical strategies for building resilient OT security, offering insights on implementing effective security programs, proven strategies and efficiency gains in manufacturing environments.
Eduardo Giancristofaro, channel development director at SSH Communications Security, discusses how to overcome cybersecurity concerns in digital transformation, focusing on secure access control for production systems.
Mihirr P Thaker, Yogesh Kulkarni, and Aditya Sarangapani explore threat intelligence for OT security. Learn strategies for asset visibility, cybersecurity resilience, and mitigating risks in legacy systems.
John Ballentine, ICS Security Program Manager at Port Authority of New York and New Jersey shares, strategies for managing OT assets in large infrastructure, including monitoring air-gapped systems.
SSH Communications' Eduardo Giancristofaro discusses secure access control solutions enabling digital transformation in OT environments.
Kaspersky's Georgy Kucherin explores APT41's evolution in 2024, examining their shift from supply chain attacks to targeted operations, new persistence mechanisms and enhanced detection evasion techniques.
Maurice Snoeren examines distinct approaches for protecting OT systems and interfaces, demonstrating effective security strategies for critical control and safety systems.
Chris Johnson, senior director at WSP, presents a structured approach to OT cybersecurity road maps, covering strategic planning, life cycle integration and practical frameworks drawn from real-world infrastructure projects.
WSP's Christopher Johnson examines the evolution of OT-focused security operations centers, highlighting critical differences from traditional IT SOCs.
Venkatesh Vanjaku of CloudSEK discusses proactive measures for identifying and mitigating software supply chain risks in the modern digital ecosystem.
Antoine d'Haussy, OT security practice head for EMEA, Fortinet, shares insights on implementing SASE and SecOps technologies to protect OT CPS environments, focusing on network security enhancement and real-time monitoring for industrial assets.
Tony Hadzima of Palo Alto Networks explores how industrial organizations can navigate cybersecurity challenges in smart manufacturing and why security has become a strategic imperative at leadership levels.
Ryan Davis of Acronis examines the people, process and technology strategies manufacturing leaders can adopt to protect cyber-physical infrastructure for NIS 2 compliance with focus on recovery measures.
Ali Baccouche of Texas Instruments provides a holistic view of the EU AI Act implementation guidelines and compliance requirements, covering risk categories and explaining how it applies in practice with clear takeaways.
Massimo Nardone demonstrates how zero trust security principles can be applied to manufacturing environments to enable safer digital transformation with focus on access management challenges.
Shri Kulkarni, Kayode Alawonde, Goran Novkovic and Sandeep Lota will explore securing production plants amid IT-OT convergence, automation and legacy system integration.
In this session, Lina Dabit of the Royal Canadian Mounted Police will explore how to identify, assess and mitigate insider threats in today's volatile landscape, with a focus on disinformation, awareness gaps and risk reduction strategies.
In this insightful session, Gord Howells, VP IT, Sofina Foods, will discuss the rise in state-sponsored cyberthreats targeting Canadian manufacturers and how to protect OT assets and build a geostrategic defense amid growing geopolitical instability.
Ron Arden, executive vice president, CTO and COO, Fasoo, will explore how manufacturers can secure sensitive data, manage AI-driven risks, and build a modern data governance framework to protect IP and meet evolving regulations.
Amin Boroumand of Martinrea International will explore how AI enables real-time threat detection, the challenges of integrating AI into legacy systems, and best practices for securing OT environments against AI-related vulnerabilities.
Jeffrey De Sarno will explore Canada's Bill C-26 and its impact on manufacturing cybersecurity, the gaps in current regulation, and how global standards like NIST and CISA can guide future frameworks for critical infrastructure protection.
Phil Englert, Ashley Mancuso and Anatoly Podstrelov discuss harmonizing security strategies, proactive compliance measures and fostering collaboration between security, regulatory and executive teams.
Ben Jennings, Stuart Gordon, Daniel Rozday, Blake Gilson and Paul Holland share convergence success stories spanning energy, rail, manufacturing and postal sectors, exploring secure-by-design and zero-trust strategies for bridging domains.
Palo Alto Networks' Robert Albach explores recent regulatory shifts in petrochemical security, including CFATS changes and TSA amendments.
Margaux Tawil of Abnormal AI demonstrates how defensive AI combats generative AI threats by analyzing identity, behavior and content patterns across thousands of signals.
Pierre-François Guglielmi of Rubrik explores how unified identity protection reduces recovery time from days to hours while maintaining cyber resilience across hybrid environments.
Aurélien Svevi explains how application detection and response cuts through security noise by analyzing applications in production to connect attacks with exploitable vulnerabilities.
Gaspard Droz of Mantra shows how successful organizations build security awareness programs that reduce human factor risks through strategic content, consistent engagement and behavioral psychology.
Vincent Porte explains how organizations must evolve from periodic awareness training to comprehensive human risk management addressing AI-powered threats and sophisticated attacks.
Ramit Sharma and Madina Rashid explore how cybercriminals exploit AI capabilities through autonomous bots and deepfakes, while examining implementation challenges and ethical considerations for defense.
Gareth Dothie explores how criminal organizations systematically infiltrate financial institutions through insider targeting, examining governance failures and sophisticated intelligence gathering tactics.
Jennifer Huang and Chris Rankin share insights on balancing developer productivity with security in fintech environments, addressing AI-driven shadow IT and shifting security from gatekeeper to enabler role.
Petrut Jianu and Jonas Rendahl explore communicating consequences of OT system failures and quantifying potential benefits of OT security investments to demonstrate positive financial impact beyond cost centers.
Egon Van Dongen examines combining technology and practices to address modern cyberthreats, achieving unprecedented results with air-gapped recovery and analyzing a real-world polymorphic mirror ransomware attack.
Niels Søby Vesterager presents frameworks for structuring board presentations, applying CMMI maturity levels to measure NIS2 progress, and building trust through transparent communication.
Andreas Östrin examines establishing cross-functional steering groups with clear responsibilities, conducting business mapping and risk assessment across processes, and implementing compensating controls like network isolation.
Anders Björklund of Martin & Servera demonstrates converting penetration test findings into quantified business risk using NIST CSF 2.0 frameworks.
Malonie Guha of SKF Group explores building security teams capable of managing IT/OT convergence by respecting operational boundaries and balancing technical expertise.
Trend Micro's senior threat researcher Nitesh Surana reveals critical vulnerabilities in Azure Machine Learning services, demonstrating how attackers can compromise ML workspaces.
Daniel Norman of Information Security Forum moderates discussion with Sune Aggergaard Mortensen of DCAI and Rune Ören Skarphagen of Play'n GO on managing hyperscaler dependencies amid geopolitical fragmentation.
Vida Ahmadi of Electrolux Group shares lessons from transforming data governance from compliance overhead into business enabler through value-focused implementation.
Thomas Hassing Huge of Saxo Bank, Jonas Helweg-Mikkelsen of Nordic RCC, Søren Hansen of ECCO, Ilter Onder Aptula of Klarna and Tor Auster discuss transforming employees into active security defenders.
Tony Fergusson of Zscaler examines why zero trust must evolve to verify data authenticity in deepfake era and how adversaries exploit trusted platforms and use prompt injection to evade AI detection.
Mark Van Der Horst and Gagan Delouri share how identity replaced the network as primary attack perimeter, balancing friction and experience through risk-based authentication to reduce fraud and customer churn.
Xandra Uth of SoSafe examines how motivation and ability drive behavior change, proving data importance through targeted phishing simulations and compelling narratives.
Salvatore Buccoliero explores how to define minimum viable company requirements for rapid recovery, how identity-based attacks bypass traditional defenses including MFA, and how data protection platforms instantly detect encryption.
Andreas Bergqvist shares integrating security from code review through production using independent verification and crisis communication strategies.
Patrick Van Eecke discusses assessing whether AI systems fall within the EU AI Act's scope and risk categories, what cybersecurity requirements mean for security professionals, and the AI practices that are prohibited.
Marvin Ngoma of Elastic explores how NIS2's technical requirements reshape risk-informed detection strategies and how AI-powered security platforms strengthen compliance and operational resilience.
1 2 3 4 5 6 7 8 9 10 11 Next