Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Marcin Szczepanik reveals how to build human-centric security strategies that create lasting culture change, sharing insights from building high-performing teams and pragmatic programs balancing regulation, risk, and operations.
Dan Mosca, Simon Deeks and Steve Broadwell explore securing OT using third-party data and external perspectives, sharing defense-in-depth architectures and compliance strategies from the nuclear and critical infrastructure sectors.
Marta Majtenyi of Norsk Hydro provides a road map for cybersecurity policies in critical infrastructure.
Ben Jennings, Stuart Gordon, Daniel Rozday, Blake Gilson and Paul Holland share convergence success stories spanning energy, rail, manufacturing and postal sectors, exploring secure-by-design and zero-trust strategies for bridging domains.
Avi Mileguir of Check Point covers exposure management strategy from threat intelligence through remediation.
Graham Hawkey of Wallix Group demonstrates how automated credential management and access control drive efficiency and ROI while ensuring compliance with NIS and IEC 62443.
Ivan Zhekov of TXOne Networks addresses determining and communicating legacy OT cybersecurity value to stakeholders, offering practical methodologies for assessing alignment of security measures with overarching business objectives.
Alex Fold examines how adversaries are accelerating their capabilities and leveraging deep expertise in IEC 62443 standards and SCADA security to highlight emerging threats and data-driven solutions for critical infrastructure protection.
Claudio Sangaletti, Marcin Szczepanik, Sam Maesschalck and Blake Gilson debate IT versus OT security ownership, exploring organizational structures and regulatory compliance.
Andrew McPhee of Cisco explores NIS2 segmentation requirements, software-based segmentation options and how AI can automate asset grouping to inform policies.
Claudio Sangaletti of Medmix discusses challenges of integrating AI into legacy systems and best practices to mitigate AI-related vulnerabilities in OT environments, applying expertise from leading global ICS cybersecurity initiatives.
Andreas Klien presents findings from investigating over 100 substations and plants, sharing insights on power utility communications security, IEC 61850 innovation, and network security strategies for modernizing operational networks.
Massimo Nardone of SSH Communications Security explores protecting critical infrastructure through secure access, zero trust architectures and quantum-safe encryption.
Tom Mills shares National Gas's defense-by-design approach, drawing on 18 years of defense intelligence and enterprise cybersecurity experience to build resilient critical infrastructure.
Will Burnett of Xona reveals hidden risks of vendor-installed routers and legacy VPNs that create backdoors bypassing perimeter defenses, and explores practical approaches to delivering secure, policy-driven remote access controlled by OT teams.
Rick Kaun presents a multi-dimensional ecosystem approach built on OT regulatory experience, covering contextual risk calculation, think-global-act-local architectures, and transforming reactive security into proactive data-driven programs.
Sam Maesschalck reframes OT security through the lens of human factors, examining how cultural backgrounds shape risk perception, why IT-OT misunderstandings persist, and what building true resilience in industrial systems really means.
Emyr Thomas explores translating cyber risks into business language, implementing guardrails for emerging tech adoption, and building collaboration frameworks that scale security across operational levels in critical infrastructure.
Andres Prieto demonstrates integrating IEC 62443 standards into vulnerability management operations, focusing on aligning cybersecurity practices with organizational objectives in global industrial and manufacturing environments.
Margaux Tawil of Abnormal AI demonstrates how defensive AI combats generative AI threats by analyzing identity, behavior and content patterns across thousands of signals.
Pierre-François Guglielmi of Rubrik explores how unified identity protection reduces recovery time from days to hours while maintaining cyber resilience across hybrid environments.
Aurélien Svevi explains how application detection and response cuts through security noise by analyzing applications in production to connect attacks with exploitable vulnerabilities.
Gaspard Droz of Mantra shows how successful organizations build security awareness programs that reduce human factor risks through strategic content, consistent engagement and behavioral psychology.
Vincent Porte explains how organizations must evolve from periodic awareness training to comprehensive human risk management addressing AI-powered threats and sophisticated attacks.
Ramit Sharma and Madina Rashid explore how cybercriminals exploit AI capabilities through autonomous bots and deepfakes, while examining implementation challenges and ethical considerations for defense.
Gareth Dothie explores how criminal organizations systematically infiltrate financial institutions through insider targeting, examining governance failures and sophisticated intelligence gathering tactics.
Jennifer Huang and Chris Rankin share insights on balancing developer productivity with security in fintech environments, addressing AI-driven shadow IT and shifting security from gatekeeper to enabler role.
Trend Micro's senior threat researcher Nitesh Surana reveals critical vulnerabilities in Azure Machine Learning services, demonstrating how attackers can compromise ML workspaces.
Thomas Hassing Huge of Saxo Bank, Jonas Helweg-Mikkelsen of Nordic RCC, Søren Hansen of ECCO, Ilter Onder Aptula of Klarna and Tor Auster discuss transforming employees into active security defenders.
Mark Van Der Horst and Gagan Delouri share how identity replaced the network as primary attack perimeter, balancing friction and experience through risk-based authentication to reduce fraud and customer churn.
Xandra Uth of SoSafe examines how motivation and ability drive behavior change, proving data importance through targeted phishing simulations and compelling narratives.
Salvatore Buccoliero explores how to define minimum viable company requirements for rapid recovery, how identity-based attacks bypass traditional defenses including MFA, and how data protection platforms instantly detect encryption.
Andreas Bergqvist shares integrating security from code review through production using independent verification and crisis communication strategies.
Patrick Van Eecke discusses assessing whether AI systems fall within the EU AI Act's scope and risk categories, what cybersecurity requirements mean for security professionals, and the AI practices that are prohibited.
Marvin Ngoma of Elastic explores how NIS2's technical requirements reshape risk-informed detection strategies and how AI-powered security platforms strengthen compliance and operational resilience.
Hitesh Pathak explores how AI has transformed cybersecurity landscapes, sharing strategies for implementing cloud-native security frameworks and threat intelligence.
Pravin Savant, Nishant Pradhan, Girish Hadkar, Dishika Tandon and Prasanna Lohar address the disconnect between boardroom strategy and execution realities.
Rakesh Bhardwaj discusses building data-first strategies, transitioning from project to product management, and democratizing data capabilities across organizations.
Bhavit Bhatt maps organizations across the AI maturity spectrum and shares strategies for building simplified, high-performance AI foundations with cloud-agnostic platforms.
Damian Stephenson examines the dramatic shift from AI skepticism to adoption, exploring strategic transformation approaches across the AI capability spectrum.
Atul Jayawant shares three fundamental principles for CIO success: ownership mindset, comprehensive competency and simplicity in business communication.
Aparna Kumar explores how CIOs can transform technology from cost center to valuation multiplier through strategic boardroom storytelling and cybersecurity resilience.
Mohit Agarwal and Pankaj Bhargava explore supplier risk assessment platforms, demand sensing capabilities and traceability systems for volatile supply chains.
Nim Nadarajah and Sandra Pesic examine AI-driven cyberthreats, resilience strategies, automation benefits and post-quantum security preparations for modern organizations.
Dr. Amiruddin Abdul Wahab of Cybersecurity Malaysia explores strategic human-AI interaction in cybersecurity operations and real-world threat detection applications.
Kenneth Townsend of Ingredion explores how AI-driven leadership balances business innovation with data governance, operational efficiency and responsible security practices.
Sateesh Kumar Challa examines how synthetic identity fraud leverages cutting-edge AI to bypass traditional detection systems.
Taka Ariga and Brennan Lodge discuss how Retrieval Augmented Generation transforms threat detection and compliance operations by grounding AI responses in trusted organizational data rather than public sources.
Varun Shrivastava of UBS, Armani Ibrahim of DeepAI and Darren Grayson Chng of Electrolux discuss leveraging agentic AI for threat simulation, managing AI bias risks and balancing automation with human intuition.
Sudhir Tiku of KEENFINITY Group shares governance frameworks for multi-agent AI ecosystems, regulatory expectations and building interdisciplinary teams for responsible AI development.
1 2 3 4 Next