Meet with and be inspired by like-minded peers who face a similar set of challenges. Share strategies for mitigating the most current information security threats. A friendly, relaxed and professional atmosphere will ensure that you leave this event with a new wealth of trust-based contacts and tangible takeaways. The unique strength of this event is that members can feel free to share concerns, successes, and feedback in a one-to-one environment.
This is a ‘must attend’ event for all security operation professionals! We are confident that the relationships you develop here will prove to be crucial to your continuing success. So do not wait and register!
Looking forward to see you there, your SIGS team
As always: sales peoples (incl. CEO's and Founders), vendors, consulting companies like the big4 and all peoples who just like to sell their products or services are not allowed to take part at SIGS events.
There's a shuttle bus from the airport available. Parking lots at the hotel are available for free.
Welcome & short introduction from the background organization
Don Codling, Cyber Security Advisor Exec Manager 23+ years with FBI-as Unit Chief Cyber division-extensive operational experience in Cyber Crime and Cyber National Security investigations focus on policy development and implementation operations. FBI lead for Cyber STORM 2 and 3 national Cyber exercises.
How are groups (Governments-Industries-Foundations) globally improving OT cyber security and resilience (and who is doing it really well) Of course, practicing IT/OT separation, using best practices for Cyber Hygiene, having a Disaster Recovery-Business Continuity plan that is viable-tested AND practiced are fundamental to success (and in this day an age-survival) for any Critical Infrastructure provider....
BUT....all too often the attacker slips thru a crack, the 'human element" comes into play or the 'entity' did not have awareness of an evolving threat--so they get punched. Threat awareness and resilience are perhaps the MOST important aspects in modern OT security. Every critical infrastructure company or governmental entity can and eventually WILL get attacked, what few things separate the groups who get up off the floor fastest and resume 'normal' operations from those who struggle afterwards?
Matan Hart, VP of Research at Tenable
Anatomy of an OT attack path Cyber attacks on OT infrastructure are complex, requiring numerous actions to gain initial access, escalate privileges, and reach their target. This talk will illustrate what the next generation of OT attack paths will look like and how defenses can be implemented to interrupt them
Sponsor 2: xxx
Deep Dive into Cloud Security Threats from the Research Perspective
Details will follow
Roundtable 1: Pawel Pilecki, Information Security Architect at Sonova
OT security risks and mitigation strategies in the context of the continuous increase of attack activity OT Security is definitely an interesting area that needs a different mindset and approach compared to the regular IT. Let's discuss about various risks in OT, priorities and mitigation strategies considering budgetary restrictions, by focusing on some of the following challenges - Limited or no visibility of OT assets - Flat network without segmentation - Insecure remote access - Weak physical security - Not managed vulnerabilities - Lack of OT governance processes
I expect participants in this roundtable to share with their thoughts & experience and get some useful tips and knowledge among them.
Roundtable 2: Martin Scheu, OT Security Engineer at SWITCH
Detect Cyber Threats against Critical Infrastructure with Open Source Tools The market for commercial detection software for OT network has grown exponentially in recent years. The operation of such software is costly and the licensing costs are also high. Can open source software provide a remedy?
Roundtable 3: Rupesh Jaju, Head of Industrial Cybersecurity at Siemens
Ransomware in OT Security - Connected OT infrastructure and New Hyper Threat Landscape - Weak links in OT infrastructure - Ransomware – How does it work? (examples) - How to prevent Ransomware attacks?
Roundtable 4: (details will follow)
Change the table for the second round of discussions
Panel discussion moderated by Don Codling
Apéro riche incl. networking and know how sharing till open end
Contributors & Speakers
Below you will find our contributors and speakers to whom we say a big thank you !
Cyber Security Advisor (former FBI Exec Manager USA)