Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Sergio Trindade of Águas do Tejo Atlântico shares water utility security program insights, focusing on internal strategies and management communication.
Rick Kaun presents strategies for managing new regulations like NIS2 while strengthening baseline cybersecurity practices through real-world case studies.
Malcolm Xavier explores converting human vulnerabilities into strengths through security awareness, digital literacy and staff motivation strategies.
Trish McGill, Gregory Blezard MBE and Marta Majtenyi explore strategies to promote human-centric cybersecurity while protecting against burnout. Session addresses communication, training, and building positive digital culture across organizations.
Cavus Batki and Melanie Garson explore protecting assets against state-sponsored threats, examining cyber-physical attacks and analyzing geopolitical impacts on cybersecurity strategies.
Andres Prieto Anton, Sergio Trindade, Trish McGill and Emyr Thomas discuss strategies for embedding cybersecurity awareness in organizational culture and daily operations.
Maurice Snoeren examines distinct approaches for protecting OT systems and interfaces, demonstrating effective security strategies for critical control and safety systems.
Gregory Blezard, head of BISO at ScottishPower Renewables, explores how systems thinking revolutionizes cybersecurity risk management.
Andres Prieto Anton of DSM-Firmenich shares insights on designing secure OT systems using zero trust principles and in-depth protection strategies.
Jay Moloo of DB Schenker discusses implementing zero trust architecture in OT environments through network segmentation and modern standards.
Claudio Sangaletti, OT security leader at Medmix, discusses managing increased convergence risks through robust security strategies, addressing future threats and leveraging new standards for enhanced cyber resilience.
Thomas Mortsell examines strategies for NIS2 implementation and adapting to new European regulations while ensuring comprehensive organizational security.
Ron Yosefi shares strategies for managing OT data explosion, prioritizing threats, and maximizing SecOps resources to improve security posture while addressing skill.
Ivan Zhekov of TXOne Networks demonstrates how operations-friendly cyber defense solutions provide real-time protection for mission-critical devices and OT networks while ensuring regulatory compliance.
Michel Harthoorn, Maurice Snoeren, Anton Shipulin, and Dave White discuss collaborative response strategies to supply chain attacks, focusing on risk management and regulatory compliance.
Thomas Mortsell, Adam Paturej, Philipp Amann and Antoine d'Haussy discuss pragmatic strategies for implementing multiple EU regulations while maintaining security and operational efficiency.
Steve Broadwell of OPSWAT examines strategies for protecting OT networks from APT threats through advanced file and removable media security.
Matan Dobrushin explores the transition from passive to active OT asset discovery, sharing real-world applications in protocols like Modbus and DeltaV while addressing NIS2 compliance challenges.
Dominic Storey from Tenable explores practical solutions for managing cyber risk in CPS environments, addressing architecture complexities and real-time performance requirements.
Victor Lough of Schneider Electric outlines life cycle approach for protecting OT assets while maintaining operational availability, focusing on foundational requirements to reduce corporate failure risks.
Ian Bramson, VP of global industrial cybersecurity at Black & Veatch, reveals how self-learning AI is reshaping cloud security defense.
Adam Paturej of ICCSS explores transforming cybersecurity investments into business value while maintaining critical infrastructure protection.
Antoine d'Haussy, OT security practice head for EMEA, Fortinet, shares insights on implementing SASE and SecOps technologies to protect OT CPS environments, focusing on network security enhancement and real-time monitoring for industrial assets.
Billy Moore explores centralized secure access solutions for maritime OT systems, addressing IACS requirements and critical infrastructure protection.
Melanie Garson, Steven Rumbold, Philipp Amann and Michel Harthoorn explore public-private partnerships and information sharing initiatives for enhanced threat detection and incident response.