SIGS 15th OT Security Forum

Join us on May 29th, 2024 and earn 4.25 CPEs

(registration will be closed May 28th, 2024)
Official Event Sponsor
Meet with and be inspired by like-minded peers who face a similar set of challenges. Share strategies for mitigating the most current information security threats. A friendly, relaxed and professional atmosphere will ensure that you leave this event with a new wealth of trust-based contacts and tangible takeaways. Our goal: bring together what belongs together!


For further planned events please check at https://www.sig-switzerland.ch/upcoming-events/


Looking forward to see you there,
your SIGS team



As always: sales peoples (incl. CEO's and Founders), vendors and all peoples who just like to sell their products or services are not allowed to take part at SIGS events.
Location
Hilton Zürich Airport
Hohenbühlstrasse 10
8152 Opfikon-Glattbrugg

DATE & TIME
May 29th, 2024, 1:30 pm - open end incl. dinner
Airport Transfer & Parking
There's a shuttle bus from and to the airport, but only at specific times.
Parking lots at the hotel are available for free.

Participation Fee
EUR 60.--

1:30 pm
Registration
2:00 PM
Welcome & short introduction from SIGS
2:00 PM
Reto Käser on behalf of ISSS

The ISSS OT-Security Standard
With the OT Security Standard, the ISSS (a leading professional organization in the field of information security in Switzerland) recently released another important framework to actively address the challenges in the field of information security and to ensure the security of our national infrastructures.

In this presentation we would like to inform in short about the content of this framework and when it’s worth looking at.
2:15 PM
Bernhard Nocker, Sales Engineer at CrowdStrike

The X-files of Voodoo Bear: Penetrating OT-environments
The security posture of industrial enterprises and critical infrastructure organizations has changed with digital transformation. Now the complex attack surfaces allow for pathways across the once- air-gapped, impenetrable, or microsegmented (or totally flat) OT networks. Since the adversaries leveled up their attack sophistication for OT environments and regular IT security tools won't help anymore, security teams are faced with the crucial challenge to detect and stop cyber adversaries before they manage to move laterally into the OT-environment.

On the example of Voodoo Bear, a.k.a. Sandworm, a Russian based adversary who is responsible for several attacks targeting critical infrastructures in Ukraine, we will take a look at the tactics, techniques and procedures used and find out how production environments can be efficiently protected against these sophisticated kinds of attacks.

2:45 PM
Nicholas Miles, Staff Research Engineer at Tenable, Inc.

Fortifying Industrial Control Systems: A Deep Dive into Evaluating Cryptographic Implementations
Industrial control systems face persistent threats due to plaintext protocols and improper authentication mechanisms, leading to an over-reliance on network segmentation and the Purdue Model.

In this presentation, we delve into the fundamentals of cryptography and explore best practices for implementing robust cryptographic controls. We’ll talk about what infosec researchers look for, and provide valuable insights for asset owners seeking more secure ICS solutions. We’ll wrap up with a few case studies and examples seen in real products.
3:15 PM
Johny Gasser, Strategist & Advisor Cyber Security and Risk Management at Orange Business

The Business-driven network segmentation approach
The vast majority of network segmentation projects are failing, as highlighted by recent studies.
This presents unprecedented challenges in the era of the convergence of operational technology (OT), information technology (IT) and Internet of Things (IoT), the adoption of smart manufacturing, Industry 4.0, Digital transformation, smart buildings, connected vehicles, or autonomous robots.

In this session, we'll review the root causes behind the failure of network segmentation initiatives and explore a comprehensive approach to overcoming common pitfalls and unlocking the full potential of network segmentation to fortify your organization's defenses and embrace the principles of the Zero Trust. The methodology is technology and vendor-agnostic.
3:45 PM
Break 
4:15 PM
Roundtable 1: Alex Diekmann, Director Corporate Security at u-blox

Risks & Benefits of connecting OT with the Cloud
This roundtable discusses both risks and benefits of connecting Operative Technology (OT) to the Cloud. On one hand, critical infrastructure operators gain scalability, cost efficiency, and access to advanced services. On the other hand, business continuity concerns, security vulnerabilities, and compliance complexities emerge.

Striking a balance is crucial: robust business continuity planning, security measures, evaluation of cloud providers, and alignment with specific OT needs are essential. By navigating these challenges, organizations can harness cloud advantages while mitigating potential pitfalls.


Roundtable 2: Jorge Dejoz, Deputy Head Nuclear & Cyber Security at ENSI

Insider Threat Mitigation: finding the balance and protect critical systems from yourself.
When designing attack scenarios, or a so called a “design-basis-threat DBT”, to be used in Threat analysis models and threat assessments, the factor of involved own personnel with privileged rights is partially neglected. We all know that we may be strong in assuming attacks from outside of our own data perimeter, but when it comes to design prevention measures against your own staff, its hard to find the right balance between undoubtful trust and a mindset, which allows to see yourself as an attacker. What may be the right assumptions and to what extent could IT-Security-Culture take its lead?


Roundtable 3: Florian Buschor, Senior Information Security Officer at Georg Fischer AG

Identity management and targeted awareness training that are tailored to the needs of blue collars who are working with Operational Technology (OT)
The focus of this roundtable will be on how organizations can develop effective strategies to implement identity management and security awareness training in work environments where blue collar workers and OT systems play an essential role.

The discussion will highlight various aspects, including the challenges of integrating identity management solutions with OT systems, the importance of a holistic approach involving people, processes and technology, and best practices for increasing security awareness and strengthening cyber hygiene in blue collar and OT environments.


Roundtable 4: Pawel Pilecki, Senior IT Cyber Security Manager at Sonova Group

Network Segmentation for Operational Technology (OT)
An interactive roundtable designed to facilitate a deep dive into the collective experiences of industry professionals regarding network segmentation in OT environments. Participants will have the opportunity to share their firsthand experiences, challenges they've encountered, and the best practices they've adopted. This roundtable aims to foster a collaborative exchange of insights, strategies, and solutions that enhance the security and efficiency of OT networks.
5:05 PM
Change the table for the second round of discussions
6:00 PM
Apéro riche incl. networking and know how sharing till open end
Contributors & Speakers
Below you will find our contributors and speakers to whom we say a big thank you !
Florian Buschor
Senior Information Security Officer at Georg Fischer
Further information at Florian Buschor | LinkedIn
Jorge Dejoz
Deputy Head Nuclear & Cyber Security at ENSI
Alex Diekmann
Director Corporate Security at u-blox
Further information at Alexander Diekmann | LinkedIn
Johny Gasser
Strategist & Advisor – Cyber Security and Risk Management at Orange Business
Further information at Johny Gasser | LinkedIn
Nicholas Miles
Staff Research Engineer at Tenable, Inc.
Further information at Nicholas Miles | LinkedIn
Bernhard Nocker
Sales Engineer at CrowdStrike
Further information at Bernhard Nocker | LinkedIn
Pawel Pilecki
Senior IT Cyber Security Manager at Sonova Group
Further information at Pawel Pilecki | LinkedIn
 
Contact Us
If you have any questions or you like to get information about further events, please do not hesitate to contact us!
 Join us on May, 29th
We look forward to hosting you!

Processing Registration...