PROGRAM WEDNESDAY 13 NOV 2024
08.00
WELCOME TO DAY 2- REGISTRATION, NETWORK AND BREAKFAST
09.00
OPENING OF INDUSTRIAL SECURITY CONFERENCE CPH
09.05
WELCOME TO THE CONFERENCE AND INTRODUCTION TO TODAY’S PROGRAM
Peter Frøkjær, Senior Security Architect, Vestas & President, ISACA Denmark
09.10
MANAGING COMPLEXITY BY ENGINEERING OT SECURITY
Technical level: Intermediate Vivek Ponnada, Technology Solutions Director, Nozomi Networks
09.55
ROUGH AROUND THE EDGES: THE STATE OF SOFTWARE SUPPLY CHAIN IN OT/IOT ROUTERS
Technical level: intermediate Daniel dos Santos, Head of Security Research, Forescout Technologies, Inc.
10.30 REFRESHMENTS AND NETWORKING
11.00
SECURING OT: LESSONS LEARNED FROM GLOBAL AUTOMOTIVE LEADER VOLVO AND ORANGE CYBERDEFENSE
Andreas Jacobsson, OT Security Consultant, Orange Cyberdefense
Martin Eenfeldt, Senior Network & Security Architect, Volvo Cars
11.35 SHORT BREAK
11.45
AVOIDING DECISION PARALYSIS – IN THE FACE OF UNCERTAINTY
Henrik Thiesen, Vice President, Cyber Strategy & Commercialization, Enterprise Cyber Security, Vestas
12.20 LUNCH AND NETWORKING
THE CONFERENCE CONTINUES IN TWO TRACKS: ”MAIN TRACK” AND ”SESSIONS”. YOU ARE FREE TO CHOOSE WHICH PRESENTATIONS YOU WOULD LIKE TO ATTEND ACROSS THE TRACKS.
MAIN TRACK
13.20
CREATE VISIBILITY ON YOUR PRODUK2ONS-NETWORK!
Kenneth B. Jørgensen, Owner, KCERT
STRENGTHENING ENERGY SUPPLY AND CYBER RESILIENCE IN EUROPE’S ENERGY SECTOr
Technical level: Intermediate Kenneth Titlestad, Director –Industrial IT/OT & Cybersecurity, Sopra Steria
14.40 REFRESHMENTS AND NETWORKING
15.10 WHY ISA/IEC 62443 RISK
ASSESSMENT SHOULD BE THE FIRST STEP IN YOUR OT SECURITY PROGRAM
Technical Level: Intermediate Tommy Evensen, Director, Omny AS
AND ICS/OT SYSTEMS
Ken Bonefeld Nielsen, Senior Cyber Security Advisor, Norlys
SESSIONS
13.20
PRACTICAL MANAGEMENT OF CYBER RISKS IN SUSTAINABLE ENERGY SYSTEMS
Jens Christian Vedersø Enterprise Cyber Security Strategist, Vestas
13.55 SHORT BREAK
14.05
WORKSHOP PART 1: APPLIED REVERSE ENGINEERING IN OT PROTOCOLS
Ali Rıza Sahinkaya, Researcher, ICSFusion
14.40 REFRESHMENTS AND NETWORKING
15.10
WORKSHOP PART 2: APPLIED REVERSE ENGINEERING IN OT PROTOCOLS Ali Rıza Sahinkaya, Researcher, ICSFusion
15.45 SHORT BREAK
15.55
REAL LESSONS AND CONSIDERATIONS WHEN DEPLOYING SECURITY TO OT
Craig Carolessen Senior Manager, BDO UK
16.30 SHORT BREAK
THE CONFERENCE CONTINUES IN THE SHARED TRACK
SECURING OFFSHORE WIND BY DESIGN
Technical level: Intermediate Tony Turner, CEO, Opswright
+ WALK AND TALK
&
(requires separate signup)
PROGRAM THURSDAY 14 NOV 2024
08.00 WELCOME TO DAY 3 AT ISC-CPH.
09.00 INTRODUCES TODAY’S PROGRAM.
Chairman Peter Frøkjær, Senior Security Architect, Vestas & President, ISACA Denmark
THE CONFERENCE CONTINUES IN TWO TRACKS: ”MAIN TRACK” AND ”SESSIONS”. YOU ARE FREE TO CHOOSE WHICH PRESENTATIONS YOU WOULD LIKE TO ATTEND ACROSS THE TRACKS.
MAIN TRACK
09.05
REAPING PROCESS IMPROVEMENTS FROM NETWORK LEAKS - BOOST YOUR OT SECURITY CONTROLS
Technical level: intermediate
Robert Valkama, Senior Manager, OT Cyber Security, Fortum
Mikko Kenttälä, Founder and CEO, SensorFu
09.40 SHORT BREAK
09.50
AUDIENCE PARTICIPATION ACTIVITY
Peter Frøkjær, Senior Security Architect, Vestas & President, ISACA Denmark
10.25 REFRESHMENTS AND NETWORKING
10.55
ARE WE GETTING TO ITGRATIONALIZED IN OT?
Technical level: Intermediate Søren Egede Knudsen, CEO & IT/OT Security expert, Egede
11.30 LUNCH AND NETWORKING
12.30
PRIORITIZATION & DECISION MAKING IN CRITICAL INFRASTRUCTURE DEFENSE
Technical level: Intermediate
Joe Slowik, Threat Intelligence & Critical Infrastructure Security Leader, MITRE
13.05 REFRESHMENTS AND NETWORKING
13.35
SECURING A WORLD OF LEGACY
Technical level: intermediate
Daniel Rosenring, Senior Specialist, Safety & Cyber Security Control SW, Grundfos
14.10 Short break
14.20
23ANDME AND 2TB – YOUR SUPPLY CHAIN’S DNA
Technical level: Slightly advanced
Ron Brash, VP of Technical Research & Integrations, aDolus Technology Inc.
THE CONFERENCE CONTINUES IN A SHARED TRACK
14.55
SESSIONS
09.05
TOWARD TO THE FINAL FRONTIER - PRINCIPLE TO SECURE NETWORK RESILIENCE OF YOUR CYBERPHYSICAL SYSTEM AGAINST APT WAR
Technical level: Beginner
Yenting Lee, Senior Threat Researcher, TXOne Networks Inc.
09.40 SHORT BREAK
09.50
AUDIENCE PARTICIPATION ACTIVITY
Peter Frøkjær, Senior Security Architect, Vestas & President, ISACA Denmark
10.25 REFRESHMENTS AND NETWORKING
10.55
NO VR REQUIRED: SIMULATING ATTACK PATHS FOR VULNERABILITY MANAGEMENT
Technical level: Intermediate Kylie McClanahan, CTO, Bastazo
11.30 LUNCH AND NETWORKING
12.30
DEEPFAKES, RELATING TO SOCIAL ENGINEERING ATTACKS
Technical level: Beginner James R. McQuiggan, Security Awareness Advocate, KnowBe4
13.05 REFRESHMENTS AND NETWORKING
13.35
DETECTING DESTRUCTIVE MALWARE IN OT PROTOCOLS
Technical level: Intermediate Odin Jenseg, Detection Engineer, mnemonic Rafael Lukas Maers, Reverse Engineering Team Lead, mnemonic
14.10 SHORT BREAK
14.20
UNCOVERING HIDDEN RISKS IN ICS/OT DEVICES: LEVERAGING FIRMWARE ANALYSIS AND SBOMS TO IDENTIFY DEVICE SECURITY THREATS
Technical level: Intermediate Zahra Khani, Principal Product Manager for IoT Security Assessment, Keysight Technologies
AN APPROACH TO DISASTER RECOVERY IN OT Saltanat Mashirova, Advanced Cyber Security Architect/Engineer, Honeywell
15.30
CLOSING REMARKS BY THE CHAIRMAN
Peter Frøkjær, Senior Security Architect, Vestas & President, ISACA Denmark talks about today’s learnings
15.40 THE CONFERENCE ENDS