SIGS Special Event
OT Security Threats

Join us on May 11th, 2023 and earn 4.25 CPEs

(registration will be closed May 10th, 2023)
Official Event Sponsor
Meet with and be inspired by like-minded peers who face a similar set of challenges. Share strategies for mitigating the most current information security threats. A friendly, relaxed and professional atmosphere will ensure that you leave this event with a new wealth of trust-based contacts and tangible takeaways.
The unique strength of this event is that members can feel free to share concerns, successes, and feedback in a one-to-one environment.

This is a ‘must attend’ event for all security operation professionals! We are confident that the relationships you develop here will prove to be crucial to your continuing success. So do not wait and register!

Looking forward to see you there,
your SIGS team

As always: sales peoples (incl. CEO's and Founders), vendors, consulting companies like the big4 and all peoples who just like to sell their products or services are not allowed to take part at SIGS events.

Hilton Zürich Airport
Hohenbühlstrasse 10
8152 Opfikon-Glattbrugg


May 11th, 2023, 1:30 pm - open end incl. dinner

Airport Transfer & Parking

There's a shuttle bus from the airport available.
Parking lots at the hotel are available for free.

1:30 pm
2:00 PM
Welcome & short introduction from the background organization
2:o0 PM
Don Codling, Cyber Security Advisor
Exec Manager 23+ years with FBI-as Unit Chief Cyber division-extensive operational experience in Cyber Crime and Cyber National Security investigations focus on policy development and implementation operations. FBI lead for Cyber STORM 2 and 3 national Cyber exercises.

How are groups (Governments-Industries-Foundations) globally improving OT cyber security and resilience (and who is doing it really well)
Of course, practicing IT/OT separation, using best practices for Cyber Hygiene, having a Disaster Recovery-Business Continuity plan that is viable-tested AND practiced are fundamental to success (and in this day an age-survival) for any Critical Infrastructure provider....
BUT....all too often the attacker slips thru a crack, the 'human element" comes into play  or the 'entity' did not have awareness of an evolving threat--so they get punched.  Threat awareness and resilience are perhaps the MOST important aspects in modern OT security. Every critical infrastructure company or governmental entity can and eventually WILL get attacked, what few things separate the groups who get up off the floor fastest and resume 'normal' operations from those who struggle afterwards?
2:30 PM
Matan Hart, VP of Research at Tenable

Anatomy of an OT attack path 
Cyber attacks on OT infrastructure are complex, requiring numerous actions to gain initial access, escalate privileges, and reach their target. This talk will illustrate what the next generation of OT attack paths will look like and how defenses can be implemented to interrupt them
3:00 PM
Sponsor 2: xxx

Deep Dive into Cloud Security Threats from the Research Perspective 

Details will follow
3:30 PM
4:10 PM
Roundtable 1: Pawel Pilecki, Information Security Architect at Sonova

OT security risks and mitigation strategies in the context of the continuous increase of attack activity
OT Security is definitely an interesting area that needs a different mindset and approach compared to the regular IT. Let's discuss about various risks in OT, priorities and mitigation strategies considering budgetary restrictions, by focusing on some of the following challenges
- Limited or no visibility of OT assets
- Flat network without segmentation
- Insecure remote access
- Weak physical security
- Not managed vulnerabilities
- Lack of OT governance processes

I expect participants in this roundtable to share with their thoughts & experience and get some useful tips and knowledge among them.

Roundtable 2: Martin Scheu, OT Security Engineer at SWITCH

Detect Cyber Threats against Critical Infrastructure with Open Source Tools
The market for commercial detection software for OT network has grown exponentially in recent years. The operation of such software is costly
and the licensing costs are also high. Can open source software provide a remedy?

Roundtable 3: Rupesh Jaju, Head of Industrial Cybersecurity at Siemens 

Ransomware in OT Security
- Connected OT infrastructure and New Hyper Threat Landscape
- Weak links in OT infrastructure
- Ransomware – How does it work? (examples)
- How to prevent Ransomware attacks?

Roundtable 4: (details will follow)


5:00 PM
Change the table for the second round of discussions
6:00 PM
Panel discussion moderated by Don Codling
6:30 PM
Apéro riche incl. networking and know how sharing till open end
Contributors & Speakers
Below you will find our contributors and speakers to whom we say a big thank you !

Don Codling
Cyber Security Advisor (former FBI Exec Manager USA)
Further information at Don Codling | LinkedIn
Rupesh Jaju
Head of Industrial Cybersecurity at Siemens
Further information at Rupesh Jaju | LinkedIn
Pawel Pilecki
Information Security Architect OT at Sonova
Further information at Pawel Pilecki | LinkedIn
Martin Scheu
OT Security Engineer at SWITCH
Further information at Martin Scheu | LinkedIn
Further information at xxx | LinkedIn
Matan Hart
VP of Research at Tenable
Further information at Matan Hart | LinkedIn
Further information at xxx | LinkedIn
Further information at xxx | LinkedIn
Further information at xxx | LinkedIn
Contact Us
If you have any questions or you like to get information about further events, please do not hesitate to contact us!
 Join us on May, 11th
We look forward to hosting you!

Processing Registration...