Event Overview

The Virtual Summit: IoT & OT Security Summit will delve into the complexities of securing IoT and OT environments. Featuring industry luminaries, this summit offers keynotes, case-based learning and roundtable discussions tailored to address the latest threats and best practices in cyber risk management, zero trust networks, and critical infrastructure protection. Attendees will gain actionable insights on topics such as IT and OT convergence, manufacturing cybersecurity frameworks, and supply chain security, fostering a comprehensive understanding of the evolving cyber landscape.

View our ISMG Event Experience video to see what your peers are saying about their participation.

Agenda Highlights

  • Enhancing Your Security Posture
  • Third Party Risk Management
  • Cyber Governance
  • 5G Network Security and Business Opportunities
  • Zero Trust
Speaker

Nim Nadarajah

CISO, HOVR

Speaker

Vaughn Hazen

CISO, John Deere

Speaker

David Ortiz

CISO, Church 7 Dwight

Speaker

James Johnson

CISO, John Deere

Speaker

Anne Coulombe

CISO, Werfen

Speaker

Camilo Gomez

Global Cybersecurity Strategist, Yokogawa

Speaker

Mario Rivas

CISO, Seguros Monterrey New York Life

Speaker

Marlon Sorongon

CISO, Maybank

Speaker

Upendra Mardikar

EVP, CISO, TIAA

Speakers

Thought Leaders on Stage Leading Deep-Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.

Agenda

Opening Comments

9:55 AM - 10:00 AM

10:00 AM - 10:45 AM

Anne Coulombe

CISO, Werfen

James Johnson

CISO, John Deere

Amit Chaudhary

VP, Head of Cyber Security North America & Defense, Rolls-Royce

Fortifying Operations: Crafting a Resilient OT Cybersecurity Framework Across Industries

Industries across the board face an unprecedented rise in cyber-attacks, with incidents surging at an alarming rate.

This session will go beyond traditional security measures to explore how a proactive and comprehensive OT cybersecurity framework is essential for building operational resilience across various sectors. By implementing a robust OT security strategy, organizations can transform today’s cyber risks into a strategic advantage, ensuring continuous operations and safeguarding their competitive edge.

Key Takeaways:

  • Establishing Comprehensive Control: Develop and implement policies that provide deep visibility into your OT environment, enabling you to identify, prioritize, and mitigate risks effectively, thereby minimizing your attack surface.
  • Strengthening Operational Resilience: Explore real-world case studies demonstrating how industry leaders are developing and executing OT cybersecurity strategies to protect their critical infrastructure from evolving threats.
  • Enhancing Competitive Edge: Learn how a resilient OT security strategy not only safeguards your operations but also enhances connectivity, efficiency, and overall business performance in the digital age.
  • Future-Proofing Operations: Understand the key elements of a forward-looking OT cybersecurity framework that adapts to new challenges, ensuring your operations remain secure and resilient against future cyber threats.

Anne Coulombe, CISO, Werfen

James Johnson, CISO, John Deere

Amit Chaudhary, VP, Head of Cyber Security North America & Defense, Rolls-Royce

10:45 am - 11:30 am

Nim Nadarajah

CISO, HOVR

Vaughn Hazen

CISO, CN

Rethinking Risk: Identity's Critical Role in IT and OT Convergence

The convergence of Information Technology and Operational Technology has been widely discussed and analyzed.

Yet, amidst this well-worn narrative, one vital component often remains too-often overlooked: Identity. As IT and OT systems become increasingly intertwined, the role of Identity in bridging these two domains is not just important—it’s transformative.

This session will move beyond the standard discussions of IT/OT convergence and focus on the pivotal role that Identity plays in this integration. We will explore how Identity management acts as the crucial link between IT and OT, reshaping traditional approaches to risk management and security. By placing Identity at the center of this convergence, organizations can better protect their critical infrastructure, enhance their security posture, and respond more effectively to emerging threats.

Key Takeaways:

  • The Evolution of Convergence: Understanding how the integration of IT and OT has progressed and why the traditional convergence narrative is no longer sufficient.
  • Identity as the Bridge: Examining how Identity management is the critical factor that connects IT and OT systems, enabling more cohesive and secure operations.
  • Transforming Risk Management: How an Identity-centric approach fundamentally changes risk management strategies, providing greater visibility and control over both IT and OT environments.
  • Real-World Applications: Insights and case studies on how leading organizations are leveraging Identity to secure their converged IT/OT infrastructures.

Nim Nadarajah, CISO, HOVR

Vaughn Hazen, CISO, CN

11:30 am - 12:15 pm

Patty Ryan

CISO, QuidelOrtho

Julio C Padilha

CISO, Volkswagen do Brasil

Securing the Unseen: Addressing IoT Vulnerabilities in Industrial Environments

As IoT devices proliferate in industrial environments, they bring unprecedented connectivity and efficiency.

However, these benefits come with significant security challenges, as many IoT devices operate with minimal security measures, making them prime targets for cyberattacks. This session will explore the hidden vulnerabilities within IoT networks in industrial settings, the potential risks they pose to operational technology (OT) systems, and the strategies that organizations can implement to secure their IoT ecosystems.

Key Takeaways:

  • Understanding IoT Threats: Identify the specific vulnerabilities and threats associated with IoT devices in industrial environments, and how they differ from traditional IT and OT security concerns.
  • Securing the IoT Ecosystem: Learn best practices for implementing robust security protocols across IoT devices, from device-level security to network monitoring and incident response.
  • Integrating IoT and OT Security: Explore strategies for integrating IoT and OT security measures, ensuring seamless protection across connected industrial systems.
  • Case Studies in IoT Security: Review real-world examples of how leading organizations have successfully addressed IoT security challenges in their industrial operations.

Patty Ryan, CISO, QuidelOrtho

Julio C Padilha, CISO, Volkswagen do Brasil

12:15 pm - 1:00 pm

Marlon Sorongon

CISO, Maybank

Upendra Mardikar

EVP, Chief Information Security Officer, TIAA

Tiauna Ross

Senior Director of Digital and ERP Cybersecurity, Fortune 500 MedTech Company

Securing the Modern Supply Chain: Advanced Strategies for CISOs

The security of supply chains has emerged as a top priority for CISOs in today’s interconnected landscape.

With the increasing integration of digital and operational technology (OT) environments, cybersecurity leaders face new challenges that require advanced strategies and innovative approaches. This session will explore how seasoned CISOs can fortify their supply chains against evolving cyber threats, ensuring the resilience and security of their organizations. Through real-world examples and expert insights, participants will gain actionable knowledge to address vulnerabilities across global supply chains.

Key Takeaways:

  • Advanced Risk Assessment Techniques: Learn how to identify and mitigate complex vulnerabilities in both digital and physical supply chain components.
  • Vendor and Partner Security Best Practices: Explore rigorous due diligence processes and contractual strategies to ensure the security of third-party relationships.
  • Integrating Security by Design: Discover how to embed security throughout the product development lifecycle, from inception to deployment.
  • End-to-End Encryption Implementation: Understand the critical importance of encryption across all stages of data transmission and storage within the supply chain.
  • Incident Response and Recovery Planning: Develop robust incident response plans tailored to the unique challenges of supply chain disruptions.

Marlon Sorongon, CISO, Maybank

Upendra Mardikar, EVP, Chief Information Security Officer, TIAA

Tiauna Ross, Senior Director of Digital and ERP Cybersecurity, Fortune 500 MedTech Company

1:00 pm - 1:45 pm

David Ortiz

CISO, Church & Dwight

Thomas Mortsell

CISO, Aneo

Achieving Comprehensive Visibility in OT Systems

Maintaining full visibility across diverse OT environments is crucial for detecting and mitigating cyber threats. This session will address the challenges of achieving comprehensive visibility and how to implement effective monitoring strategies.

Attendees will learn how to enhance their security posture by leveraging advanced threat detection and response techniques that apply to multiple industries.

In this session, we will focus on:

  • Overcoming visibility challenges in OT environments
  • Implementing advanced monitoring and threat detection
  • Cross-industry strategies for improved cybersecurity posture

David Ortiz, CISO, Church & Dwight

Thomas Mortsell, CISO, Aneo

1:45 PM - 2:30 PM

Peeyush Patel

Global CISO, XPO

Jeremy Daily

Associate Professor, Colorado State University

Securing the Road: Why Vulnerabilities in Electronic Logging Devices are Everyone's Problem

Maintaining full visibility across diverse OT environments is crucial for detecting and mitigating cyber threats. This session will address the challenges of achieving comprehensive visibility and how to implement effective monitoring strategies.

Attendees will learn how to enhance their security posture by leveraging advanced threat detection and response techniques that apply to multiple industries.

In this session, we will focus on:

  • Overcoming visibility challenges in OT environments
  • Implementing advanced monitoring and threat detection
  • Cross-industry strategies for improved cybersecurity posture

Peeyush Patel, Global CISO, XPO

Jeremy Daily, Associate Professor, Colorado State University

2:30 PM - 3:00 PM

Camilo Gomez

Global Cybersecurity Strategist, Yokogawa

Patricia RoweSeale

CISO, CIBC Caribbean

Mario Rivas

CISO, Seguros Monterrey New York Life

OT Security: A Critical Priority for Every Industry

Operational Technology (OT) security is no longer just a concern for traditional industrial sectors; it is now a critical priority for every industry.

As IT and OT systems become increasingly interconnected, the security of physical processes—ranging from automated manufacturing lines to smart building systems and critical healthcare devices—has become essential to maintaining operational integrity. This session will underscore that OT security is a fundamental aspect of cybersecurity that every industry must prioritize to protect their critical operations

This session will delve into why OT security is vital across various sectors:

  • Critical Infrastructure Protection: Safeguarding systems from cyber threats to prevent widespread disruptions and ensure continuous operation of essential services.
  • Safety and Continuity: Ensuring the security of vital equipment and systems to maintain safety and uninterrupted operations across key environments.
  • Infrastructure Security: Protecting critical networks and control systems to avoid disruptions, ensure reliability, and prevent operational failures.
  • Operational Resilience: Securing automated processes and transaction systems to maintain smooth operations and protect sensitive information.

Camilo Gomez, Global Cybersecurity Strategist, Yokogawa

Patricia RoweSeale, CISO, CIBC Caribbean

Mario Rivas, CISO, Seguros Monterrey New York Life