Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
James Brake, James Goosby, Chris Sistrunk and Amanda Bosco provide essential OT incident response guidance.
Syed Belal of Hexagon examines automated remediation in cybersecurity, separating hype from practical reality for critical infrastructure ecosystems.
Kevin Holcomb of Cisco discusses software-based segmentation options and virtual segmentation to overcome traditional network modification roadblocks.
John Ballentine, Sherry Hunyadi, Dave Bang, Todd Beebe, Tony Souza and Andy Krapf explore hybrid cybersecurity approaches for IT-OT integration.
Josh Martin explores flexible zero trust frameworks that adapt to unique industrial settings while providing centralized oversight and control.
Jerry Cochran presents cutting-edge research on adaptive resilience capabilities for critical energy infrastructure under cyberattack conditions.
Andy Krapf of Loudoun Water shares real-world experience implementing three-layer network segmentation across utility infrastructure operations.
Central Hudson Gas' Danielle Caruso and City Utilities of Springfield's Brad Wynes discuss adapting risk methodologies to evolving threat landscapes.
Matt Fryer of Fortinet addresses positioning cybersecurity as a business priority and avoiding financial damages from cyberattacks.
Brian Foster of Southern California Edison covers shifting from attack prevention to survival strategies for maintaining operations during incidents.
Ian Bramson of Black & Veatch explores building security into new industrial construction projects using Cyber Asset Lifecycle Management frameworks.
Chris Johnson of WSP explores dynamic program frameworks that replace static documentation with interactive cybersecurity road maps.
John Ballentine of Port Authority of New York and New Jersey shares practical deployment strategies for NIST Cybersecurity Framework in OT.
Anthony Perry, Joe Hughes, Bemi Anjous and Nikolai Zlatarev of share insights on building effective third-party risk programs.
Michael Bova and J.D. Perham of Acronis demonstrate how modern backup solutions enable security scanning and malware detection for legacy OT systems.
Brian Foster of Southern California Edison, Connie Devine of Excelerate Energy and Roger Caslow of HRSD share insights on vetting security solutions.
Jake Margolis, Dennis Hackney, Lorena Nunes, Tung Nguyen and Blake Gilson outline secure OT-to-cloud strategies.
Michelle Garcia, Anthony Perry and Logan Nye share proven strategies for securing executive approval and OT security funding.
Ralph Langner demonstrates how automation streamlines OT asset inventory management, moving beyond manual Excel processes to real-time tracking.
Tung Nguyen reveals critical findings from OT security assessments, covering methodology and vulnerability identification in water utility settings.
James Goosby of Auburn University shares documented cyber risk mitigation approaches and building resilient teams in converged environments.
Cheldon Brown of Rockwell Automation reveals how dynamic risk scoring systems enable real-time, contextual risk assessment in industrial environments.
Arshad Massomi shows how Zero Trust Network Access and privileged access management enhance security while maintaining operational efficiency.
Bill Moore of Xona covers integrating ICS IDS, firewalls, NAC and SIEM for unified infrastructure visibility while optimizing cost-effectiveness.