“Cyber Risks in Industrial Internet of Things”
CISO Advisor, Unisys
The business world is changing with Industrial Internet of Things. Modern devices are smarter and better connected than ever before, always on, always collecting, and passing data. Increased connectivity between Operational Technology (OT) and Information Technology (IT) is because of the public and private sectors need to collect and analyze big data. With this innovation and changing needs operational risks are increasing. We will explore “how” the public and private sector can reduce their organizations operational risks through strategy, process, and technical implementations.
“Critical Infrastructure Protection: Protecting Others By Protecting Yourself”
Critical infrastructure Protection consists of the components needed for the United States to operate and function. The prevention of terror attack is critical to the function of the country. There are a total of 16 critical infrastructure areas which are the chemical, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial food and agriculture, government facilities, health and public health, information technology, nuclear reactors, materials and waste, transportation and water and waste management sectors. Technology is the common component of these sectors. This presentation will discuss best practices that are neutral to all previously mentioned sectors by discussing technology, procedures and regulatory compliance.
Chief Architect Threat Protection, Principal Architect X-Force Exchange, IBM
Popular portrayals of cyber defense often conclude with our heroes returning to the suburbs after figuratively beheading the miscreants at the top of a kill chain. But on the other side of the Darknet, where the rest of us live, toil the servants of IT’s consumers: the siem operators, security administrators, threat hunters, and SOC members tasked with protecting our data and patching the leaks in our shared information aqueducts. Lacking police powers to apprehend cyber crime’s perpetrators, these dedicated security professionals use the tools at hand and their professional networks to battle a never ending onslaught of con-men, criminals, extortioners, corporate spies, and foreign powers.
We’re told that cyber security advantages the attacker, that the war rages on an asymmetric battleground, and that we’re defending a threat surface about which we know little enough. But is that true?
Emerging trends in practice and technology are levelling the field. In this session we’ll be looking at how we can practically disadvantage the attackers, and with new and existing technology, reduce the time required identify, classify, and mitigate new threats. We may be at the sharp end of the Kill chain, but sharp can cut both ways.