Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Industrial Control Systems
Securing critical industrial systems to prevent cyber-physical threats.
ICS SCADA and IIoT Vulnerabilities discusses the components of ICS, SCADA, and IIoT systems their vulnerabilities and threats.
Join Kevin Fu, Acting Director, Medical Device Cybersecurity, FDA Center for Devices and Radiological Health and Tom Field as they discuss the state of medical device security.
The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption.
Sumitomo Chemical's Erwin Eimers discusses implementing new cybersecurity road maps, focusing on IS/ICS security, and leveraging open XDR and purple teaming.
Tenable's Dwayne Edwards explores ICS vulnerabilities and provides four key steps to enhance security posture beyond traditional patching.
SecurityGate's Ted Gutierrez presents three actionable tactics for enhancing cyber programs across OT, IT and IoT convergence.
MITRE Labs' Mark Bristow discusses current threat landscape and strategies for efficiently reducing risks to critical infrastructure.
Mihirr P Thaker, Yogesh Kulkarni, and Aditya Sarangapani explore threat intelligence for OT security. Learn strategies for asset visibility, cybersecurity resilience, and mitigating risks in legacy systems.
John Ballentine, ICS Security Program Manager at Port Authority of New York and New Jersey shares, strategies for managing OT assets in large infrastructure, including monitoring air-gapped systems.
SSH Communications' Eduardo Giancristofaro discusses secure access control solutions enabling digital transformation in OT environments.
Maurice Snoeren examines distinct approaches for protecting OT systems and interfaces, demonstrating effective security strategies for critical control and safety systems.
Chris Johnson, senior director at WSP, presents a structured approach to OT cybersecurity road maps, covering strategic planning, life cycle integration and practical frameworks drawn from real-world infrastructure projects.
WSP's Christopher Johnson examines the evolution of OT-focused security operations centers, highlighting critical differences from traditional IT SOCs.
Eduardo Giancristofaro, channel development director at SSH Communications Security, discusses how to overcome cybersecurity concerns in digital transformation, focusing on secure access control for production systems.
Venkatesh Vanjaku of CloudSEK discusses proactive measures for identifying and mitigating software supply chain risks in the modern digital ecosystem.
Antoine d'Haussy, OT security practice head for EMEA, Fortinet, shares insights on implementing SASE and SecOps technologies to protect OT CPS environments, focusing on network security enhancement and real-time monitoring for industrial assets.
Abdulhakeem Al Alawi, Gopinath Kishorekumar, Dr. Ali Ismail Awad, Ahmed Al-Bahdoor and Keith Christie-Smith explore security-by-design approaches, vendor selection, zero trust architecture and easy wins to protect ICS systems.
Barbara Hauer of NTT Data and Daniel Buhmann of Fortinet demonstrate why deception technology is a powerful tool for protecting OT infrastructures without requiring AI or machine learning.
Brian Jones, Steven Martano, Ebenezer Arumai, Ellen Boehm and Albert Rooyakkers discuss using purchasing power to demand contractual security requirements and translating security initiatives into business language like uptime and revenue.
Joey Fontiveros, Acting Regiment Commander of the Philippines Army, shares insights on building cyber defense capabilities and countermeasures in an increasingly sophisticated threat landscape.