International Industrial security conference Copenhagen 2024

Page 1


PROGRAM WEDNESDAY 13 NOV 2024

08.00

WELCOME TO DAY 2- REGISTRATION, NETWORK AND BREAKFAST

09.00

OPENING OF INDUSTRIAL SECURITY CONFERENCE CPH

09.05

WELCOME TO THE CONFERENCE AND INTRODUCTION TO TODAY’S PROGRAM

Peter Frøkjær, Senior Security Architect, Vestas & President, ISACA Denmark

09.10

MANAGING COMPLEXITY BY ENGINEERING OT SECURITY

Technical level: Intermediate Vivek Ponnada, Technology Solutions Director, Nozomi Networks

09.55

ROUGH AROUND THE EDGES: THE STATE OF SOFTWARE SUPPLY CHAIN IN OT/IOT ROUTERS

Technical level: intermediate Daniel dos Santos, Head of Security Research, Forescout Technologies, Inc.

10.30 REFRESHMENTS AND NETWORKING

11.00

SECURING OT: LESSONS LEARNED FROM GLOBAL AUTOMOTIVE LEADER VOLVO AND ORANGE CYBERDEFENSE

Andreas Jacobsson, OT Security Consultant, Orange Cyberdefense

Martin Eenfeldt, Senior Network & Security Architect, Volvo Cars

11.35 SHORT BREAK

11.45

AVOIDING DECISION PARALYSIS – IN THE FACE OF UNCERTAINTY

Henrik Thiesen, Vice President, Cyber Strategy & Commercialization, Enterprise Cyber Security, Vestas

12.20 LUNCH AND NETWORKING

THE CONFERENCE CONTINUES IN TWO TRACKS: ”MAIN TRACK” AND ”SESSIONS”. YOU ARE FREE TO CHOOSE WHICH PRESENTATIONS YOU WOULD LIKE TO ATTEND ACROSS THE TRACKS.

MAIN TRACK

13.20

CREATE VISIBILITY ON YOUR PRODUK2ONS-NETWORK!

Kenneth B. Jørgensen, Owner, KCERT

STRENGTHENING ENERGY SUPPLY AND CYBER RESILIENCE IN EUROPE’S ENERGY SECTOr

Technical level: Intermediate Kenneth Titlestad, Director –Industrial IT/OT & Cybersecurity, Sopra Steria

14.40 REFRESHMENTS AND NETWORKING

15.10 WHY ISA/IEC 62443 RISK

ASSESSMENT SHOULD BE THE FIRST STEP IN YOUR OT SECURITY PROGRAM

Technical Level: Intermediate Tommy Evensen, Director, Omny AS

AND ICS/OT SYSTEMS

Ken Bonefeld Nielsen, Senior Cyber Security Advisor, Norlys

SESSIONS

13.20

PRACTICAL MANAGEMENT OF CYBER RISKS IN SUSTAINABLE ENERGY SYSTEMS

Jens Christian Vedersø Enterprise Cyber Security Strategist, Vestas

13.55 SHORT BREAK

14.05

WORKSHOP PART 1: APPLIED REVERSE ENGINEERING IN OT PROTOCOLS

Ali Rıza Sahinkaya, Researcher, ICSFusion

14.40 REFRESHMENTS AND NETWORKING

15.10

WORKSHOP PART 2: APPLIED REVERSE ENGINEERING IN OT PROTOCOLS Ali Rıza Sahinkaya, Researcher, ICSFusion

15.45 SHORT BREAK

15.55

REAL LESSONS AND CONSIDERATIONS WHEN DEPLOYING SECURITY TO OT

Craig Carolessen Senior Manager, BDO UK

16.30 SHORT BREAK

THE CONFERENCE CONTINUES IN THE SHARED TRACK

SECURING OFFSHORE WIND BY DESIGN

Technical level: Intermediate Tony Turner, CEO, Opswright

+ WALK AND TALK

&

(requires separate signup)

PROGRAM THURSDAY 14 NOV 2024

08.00 WELCOME TO DAY 3 AT ISC-CPH.

09.00 INTRODUCES TODAY’S PROGRAM.

Chairman Peter Frøkjær, Senior Security Architect, Vestas & President, ISACA Denmark

THE CONFERENCE CONTINUES IN TWO TRACKS: ”MAIN TRACK” AND ”SESSIONS”. YOU ARE FREE TO CHOOSE WHICH PRESENTATIONS YOU WOULD LIKE TO ATTEND ACROSS THE TRACKS.

MAIN TRACK

09.05

REAPING PROCESS IMPROVEMENTS FROM NETWORK LEAKS - BOOST YOUR OT SECURITY CONTROLS

Technical level: intermediate

Robert Valkama, Senior Manager, OT Cyber Security, Fortum

Mikko Kenttälä, Founder and CEO, SensorFu

09.40 SHORT BREAK

09.50

AUDIENCE PARTICIPATION ACTIVITY

Peter Frøkjær, Senior Security Architect, Vestas & President, ISACA Denmark

10.25 REFRESHMENTS AND NETWORKING

10.55

ARE WE GETTING TO ITGRATIONALIZED IN OT?

Technical level: Intermediate Søren Egede Knudsen, CEO & IT/OT Security expert, Egede

11.30 LUNCH AND NETWORKING

12.30

PRIORITIZATION & DECISION MAKING IN CRITICAL INFRASTRUCTURE DEFENSE

Technical level: Intermediate

Joe Slowik, Threat Intelligence & Critical Infrastructure Security Leader, MITRE

13.05 REFRESHMENTS AND NETWORKING

13.35

SECURING A WORLD OF LEGACY

Technical level: intermediate

Daniel Rosenring, Senior Specialist, Safety & Cyber Security Control SW, Grundfos

14.10 Short break

14.20

23ANDME AND 2TB – YOUR SUPPLY CHAIN’S DNA

Technical level: Slightly advanced

Ron Brash, VP of Technical Research & Integrations, aDolus Technology Inc.

THE CONFERENCE CONTINUES IN A SHARED TRACK

14.55

SESSIONS

09.05

TOWARD TO THE FINAL FRONTIER - PRINCIPLE TO SECURE NETWORK RESILIENCE OF YOUR CYBERPHYSICAL SYSTEM AGAINST APT WAR

Technical level: Beginner

Yenting Lee, Senior Threat Researcher, TXOne Networks Inc.

09.40 SHORT BREAK

09.50

AUDIENCE PARTICIPATION ACTIVITY

Peter Frøkjær, Senior Security Architect, Vestas & President, ISACA Denmark

10.25 REFRESHMENTS AND NETWORKING

10.55

NO VR REQUIRED: SIMULATING ATTACK PATHS FOR VULNERABILITY MANAGEMENT

Technical level: Intermediate Kylie McClanahan, CTO, Bastazo

11.30 LUNCH AND NETWORKING

12.30

DEEPFAKES, RELATING TO SOCIAL ENGINEERING ATTACKS

Technical level: Beginner James R. McQuiggan, Security Awareness Advocate, KnowBe4

13.05 REFRESHMENTS AND NETWORKING

13.35

DETECTING DESTRUCTIVE MALWARE IN OT PROTOCOLS

Technical level: Intermediate Odin Jenseg, Detection Engineer, mnemonic Rafael Lukas Maers, Reverse Engineering Team Lead, mnemonic

14.10 SHORT BREAK

14.20

UNCOVERING HIDDEN RISKS IN ICS/OT DEVICES: LEVERAGING FIRMWARE ANALYSIS AND SBOMS TO IDENTIFY DEVICE SECURITY THREATS

Technical level: Intermediate Zahra Khani, Principal Product Manager for IoT Security Assessment, Keysight Technologies

AN APPROACH TO DISASTER RECOVERY IN OT Saltanat Mashirova, Advanced Cyber Security Architect/Engineer, Honeywell

15.30

CLOSING REMARKS BY THE CHAIRMAN

Peter Frøkjær, Senior Security Architect, Vestas & President, ISACA Denmark talks about today’s learnings

15.40 THE CONFERENCE ENDS

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.