CS4CAUSA 2020 Sept. 15, 2020 to Sept. 15, 2020, Virtual, Virtual
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
What Does a Complete OT Security Program Look Like? What are We Missing? | Rob Dyson | Many organizations have started building out their OT security programs, but what does a good ... | |
Live Panel: Protecting Cybersecurity as a Business Investment, Not a Cost | Jacob Kalavantis | ● What methods/tools are being used by the CISO to evolve their skill set in ... | |
Enterprise Asset Visibility: Key Challenges & Best Practices | Michael Piccalo | By 2021, Gartner estimates 70% of OT Security will be managed directly by the CIO ... | |
Case Study: Secure by Design – Introducing Security to Your IoT Transformation | Jacob Margolis | How do you minimize the exposure while allowing machines to talk without human involvement? | |
A Data-Driven Analysis Hidden Vulnerabilities Observed in 1,800+ IoT/ICS Networks | James Cabe | A review of over 1800 IoT/OT networks analyzed in the past 12 months. In this ... | |
Platform: The Internet of Invisible Things: What You Can’t See Can Hurt You | Bryan k. Fite | ● Learn about the IT/OT convergence that has far-reaching implications to humans● Understand how outdated ... | |
Discovery and Analysis Vs Threat Prevention and Security in the ICS Environment | Mati Epstein | While OT discovery is essential in order to identify and build the baseline behaviour of ... | |
Case Study: Business Security Services: Merging IT & OT as an Organisation | Dave Bang | ● Take a holistic approach to problem solving by tackling the root rather than treating ... | |
Live Panel: How can we Reinvent / Adapt our Cyber Security Models to Build Trust in the Digital Era? | Paul Brager Jr , Apurva Gage | ● How can the public and private sectors ally to foster trust in digital?● How ... | |
The State of OT Cybersecurity: The Good, The Bad and The Ugly | Mark Carrigan | ● Understand the current state of OT cybersecurity● Explore strategies owner-operators and IT and OT ... | |
Live Panel: Key Steps for Security Road Mapping | Jerich Beason , Sameer Koranne , Rob Mylrea | • How much can cyber security insurance protect your assets?• How long-term and short-term is ... | |
Dr. Michael Mylrea | None | ||
Live Case Study: The Evolution of an OT Cybersecurity Risk Program – A Global Operator’s Case Study | Ted Gutierrez , Dennis Esparza | Enterprises are challenged more than ever to digitize and decentralize cyber risk management activities. Digital ... | |
How We Balance User Experience Through Customer Identity and IAM | N/a | To maintain and attract the talent we knew we needed to get the balance between ... | |
Collective Defense for Accelerating the Discovery of New Attacks | Dr. Michael Ehrlich | ● Discussing why the majority of current threat sharing efforts are insufficient to identify new ... | |
Case Study: NIST | George Reeves | N/A | |
Spotlight Thoughts: Identifying and Prioritising Risks for the Industry | N/a | ● Our challenges in distributing responsibilities so that cyber-risk becomes a board-level discussion● Our advice ... | |
Clash or Convergence: Is DevOps Making Systems More Insecure? | Angelique Grado | ● Refining the parts into easy processes● What are the principles of the DevOps mentality?● ... |