CS4CAUSA 2020 Sept. 15, 2020 to Sept. 15, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
What Does a Complete OT Security Program Look Like? What are We Missing? Rob Dyson Many organizations have started building out their OT security programs, but what does a good ...
Live Panel: Protecting Cybersecurity as a Business Investment, Not a Cost Jacob Kalavantis ● What methods/tools are being used by the CISO to evolve their skill set in ...
Enterprise Asset Visibility: Key Challenges & Best Practices Michael Piccalo By 2021, Gartner estimates 70% of OT Security will be managed directly by the CIO ...
Case Study: Secure by Design – Introducing Security to Your IoT Transformation Jacob Margolis How do you minimize the exposure while allowing machines to talk without human involvement?
A Data-Driven Analysis Hidden Vulnerabilities Observed in 1,800+ IoT/ICS Networks James Cabe A review of over 1800 IoT/OT networks analyzed in the past 12 months. In this ...
Platform: The Internet of Invisible Things: What You Can’t See Can Hurt You Bryan k. Fite ● Learn about the IT/OT convergence that has far-reaching implications to humans● Understand how outdated ...
Discovery and Analysis Vs Threat Prevention and Security in the ICS Environment Mati Epstein While OT discovery is essential in order to identify and build the baseline behaviour of ...
Case Study: Business Security Services: Merging IT & OT as an Organisation Dave Bang ● Take a holistic approach to problem solving by tackling the root rather than treating ...
Live Panel: How can we Reinvent / Adapt our Cyber Security Models to Build Trust in the Digital Era? Paul Brager Jr , Apurva Gage ● How can the public and private sectors ally to foster trust in digital?● How ...
The State of OT Cybersecurity: The Good, The Bad and The Ugly Mark Carrigan ● Understand the current state of OT cybersecurity● Explore strategies owner-operators and IT and OT ...
Live Panel: Key Steps for Security Road Mapping Jerich Beason , Sameer Koranne , Rob Mylrea • How much can cyber security insurance protect your assets?• How long-term and short-term is ...
Dr. Michael Mylrea None
Live Case Study: The Evolution of an OT Cybersecurity Risk Program – A Global Operator’s Case Study Ted Gutierrez , Dennis Esparza Enterprises are challenged more than ever to digitize and decentralize cyber risk management activities. Digital ...
How We Balance User Experience Through Customer Identity and IAM N/a To maintain and attract the talent we knew we needed to get the balance between ...
Collective Defense for Accelerating the Discovery of New Attacks Dr. Michael Ehrlich ● Discussing why the majority of current threat sharing efforts are insufficient to identify new ...
Case Study: NIST George Reeves N/A
Spotlight Thoughts: Identifying and Prioritising Risks for the Industry N/a ● Our challenges in distributing responsibilities so that cyber-risk becomes a board-level discussion● Our advice ...
Clash or Convergence: Is DevOps Making Systems More Insecure? Angelique Grado ● Refining the parts into easy processes● What are the principles of the DevOps mentality?● ...