[vc_row full_width=”stretch_row” css=”.vc_custom_1597485916254{margin-top: -40px !important;background-image: url(https://iiot-world.com/wp-content/uploads/2020/08/banner23.jpg?id=18135) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_empty_space height=”164px”][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][vc_custom_heading text=”Understanding ICS cybersecurity reference architecture” font_container=”tag:h2|font_size:32px|text_align:left|color:%23ffffff|line_height:36px” google_fonts=”font_family:Ubuntu%20Condensed%3Aregular|font_style:400%20regular%3A400%3Anormal”][vc_custom_heading text=”Virtual Conference sponsored by ABB and Indegy” font_container=”tag:h2|font_size:18px|text_align:left|color:%23ffffff|line_height:18px” google_fonts=”font_family:Ubuntu%3A300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic|font_style:500%20bold%20italic%3A500%3Aitalic”][vc_custom_heading text=”October 8th, 2019″ font_container=”tag:h2|font_size:24px|text_align:left|color:%23ffffff|line_height:24px” google_fonts=”font_family:Ubuntu%3A300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic|font_style:500%20bold%20regular%3A500%3Anormal”][vc_custom_heading text=”11:00 AM until 12:30 PM ET” font_container=”tag:h2|font_size:18px|text_align:left|color:%23ffffff|line_height:18px” google_fonts=”font_family:Ubuntu%3A300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic|font_style:500%20bold%20regular%3A500%3Anormal”][/qodef_elements_holder_item][/qodef_elements_holder][vc_empty_space height=”64px”][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_button size=”large” text=”Watch on demand” target=”_self” icon_pack=”” font_weight=”” text_transform=”” link=”#registerForm”][/qodef_elements_holder_item][/qodef_elements_holder][vc_empty_space height=”200px”][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590503324813{margin-top: -40px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_empty_space height=”80px”][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][vc_custom_heading text=”What you’ll learn:” font_container=”tag:h2|font_size:32px|text_align:center|color:%233f3f3f|line_height:36px” google_fonts=”font_family:Ubuntu%20Condensed%3Aregular|font_style:400%20regular%3A400%3Anormal”][/qodef_elements_holder_item][/qodef_elements_holder][vc_column_text el_class=”landing-what”]
Industrial Control Systems have migrated From stand-alone isolated systems to interconnected systems. in a very standard environment, thousands of devices exist, operated by a more heterogeneous environment in more places than ever before. These interconnected systems leverage existing communication platforms and protocols to increase productivity, reduce operational costs, and further improve an organization’s support model. Industrial Control Systems are responsible for a vast amount of critical processes requiring organizations to secure their infrastructure adequately.
Understanding the ICS reference architecture and creating strong boundaries between business and process control networks can reduce the number of attack pathways and vulnerabilities that an intruder may exploit to gain unauthorized access into these critical systems. Check the agenda and join us on October 8th, 2019 for more insights.
[/vc_column_text][vc_empty_space height=”64px”][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=”center”][qodef_elements_holder_item horizontal_alignment=”center”][qodef_button size=”medium” text=”Watch on demand” target=”_self” icon_pack=”” font_weight=”” text_transform=”” link=”#registerForm”][/qodef_elements_holder_item][/qodef_elements_holder][vc_empty_space height=”120px”][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590503324813{margin-top: -40px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_empty_space height=”5px”][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][vc_custom_heading text=”Agenda:” font_container=”tag:h2|font_size:32px|text_align:center|color:%233f3f3f|line_height:36px” google_fonts=”font_family:Ubuntu%20Condensed%3Aregular|font_style:400%20regular%3A400%3Anormal”][/qodef_elements_holder_item][/qodef_elements_holder][vc_empty_space height=”64px”][vc_row_inner][vc_column_inner width=”1/4″][vc_single_image image=”12022″ alignment=”right” style=”vc_box_circle_2″][/vc_column_inner][vc_column_inner width=”3/4″][vc_column_text]11:00 – 11:05
Welcome Introduction
Speaker
Greg Orloff – CBDO, IIoT World[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space][vc_separator color=”black” border_width=”2″ el_width=”80″][vc_empty_space][vc_row_inner][vc_column_inner width=”1/4″][vc_single_image image=”12024″ alignment=”right” style=”vc_box_circle_2″][/vc_column_inner][vc_column_inner width=”3/4″][vc_column_text]
11:05 – 11:20
The Metrics Manifesto: Confronting Security with Data
Speaker
Richard Seiersen – CEO, Soluble.ai
Session Description:
This talks is focuses on key security metrics for “digitally transforming” businesses. It’s also a foreshadowing of the content for Richard’s upcoming book of the same title. Topics include “the metrics manifesto”, “the concept, object and methods of measurement” and “risk forecasting”. This session will bring new information to help technology security teams identify and rectify security weaknesses.
[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space][vc_separator color=”black” border_width=”2″ el_width=”80″][vc_empty_space][vc_row_inner][vc_column_inner width=”1/4″][vc_single_image image=”12023″ alignment=”right” style=”vc_box_circle_2″][/vc_column_inner][vc_column_inner width=”3/4″][vc_column_text]
11:20 – 11:45
The Changing Industrial Attack Surface – Architecting Your OT Security For The Threats Ahead
Speaker
Michael Rothschild – Senior Director of Marketing, Indegy
Session Description:
Modern-day industrial operations have significantly changed. The convergence of IT and OT, mass adoption of IIoT have eroded what was once an air-gapped and fully isolated environment. in a very standard environment, thousands of devices exist operated by a more heterogeneous environment in more places than ever before. This creates new attack vectors and challenges in securing industrial environments, specifically by making cyber-security threats even more difficult to detect, investigate, and remediate. In this session, we will address:
– Critical infrastructure Is so much more than you think
– New industrial attack methods and targets
– Current Actors and motivations and who/what else are the upcoming players
– What has and will change in the threat landscape
– Five key areas to address to ensure the security of your IT/OT infrastructure into the future
[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space][vc_separator color=”black” border_width=”2″ el_width=”80″][vc_empty_space][vc_row_inner][vc_column_inner width=”1/4″][vc_single_image image=”12021″ alignment=”right” style=”vc_box_circle_2″][/vc_column_inner][vc_column_inner width=”3/4″][vc_column_text]
11:45 – 12:10
Effective Collection of Asset Information is Foundational for Maintaining a Cybersecurity Reference Architecture
Speaker
Dee Kimata – Global Product Manager for Cybersecurity, ABB Energy Industry
Session Description:
This presentation will break down the key components of an OEM Cybersecurity Reference Architecture, which is the blueprint for implementing control system cybersecurity practices. Further, the audience will learn how to apply the reference architecture into greenfield vs. brownfield use cases. Finally, as part of this effort, it is critical to have an understanding of your cybersecurity, and specifically how it fits into the broader reference architecture strategy.
[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space][vc_separator color=”black” border_width=”2″ el_width=”80″][vc_empty_space][vc_row_inner][vc_column_inner width=”1/4″][vc_single_image image=”12022″ alignment=”right” style=”vc_box_circle_2″][/vc_column_inner][vc_column_inner width=”3/4″][vc_column_text]12:10 – 12:30
Panel Discussion/Q&A
Moderator
Greg Orloff – CBDO, IIoT World
Session Description:
– Open forum for virtual attendees to ask questions.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space][vc_empty_space height=”120px”][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590504339006{margin-top: -40px !important;background-color: #4d7ea7 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_empty_space height=”80px”][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][vc_custom_heading text=”Speakers” font_container=”tag:h2|font_size:32px|text_align:center|color:%23ffffff|line_height:36px” google_fonts=”font_family:Ubuntu%20Condensed%3Aregular|font_style:400%20regular%3A400%3Anormal”][/qodef_elements_holder_item][/qodef_elements_holder][vc_empty_space height=”64px”][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590504339006{margin-top: -40px !important;background-color: #4d7ea7 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column width=”1/2″][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_layout3 skin=”” posts_per_page=”1″ column_number=”1″ space_between_items=”large” image_size=”custom” display_excerpt=”yes” display_date=”no” display_author=”no” display_pagination=”” post_in=”15631″ offset=”” excerpt_length=”47″ custom_image_width=”240″ custom_image_height=”240″ extra_class_name=”landing-speakers”][/qodef_elements_holder_item][/qodef_elements_holder][vc_empty_space height=”120px”][/vc_column][vc_column width=”1/2″][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_layout3 skin=”” posts_per_page=”1″ column_number=”1″ space_between_items=”large” image_size=”custom” display_excerpt=”yes” display_date=”no” display_author=”no” display_pagination=”” offset=”” excerpt_length=”50″ custom_image_width=”240″ custom_image_height=”240″ extra_class_name=”landing-speakers” post_in=”15655″][/qodef_elements_holder_item][/qodef_elements_holder][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590504339006{margin-top: -40px !important;background-color: #4d7ea7 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column width=”1/2″][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_layout3 skin=”” posts_per_page=”1″ column_number=”1″ space_between_items=”large” image_size=”custom” display_excerpt=”yes” display_date=”no” display_author=”no” display_pagination=”” post_in=”15616″ offset=”” excerpt_length=”50″ custom_image_width=”240″ custom_image_height=”240″ extra_class_name=”landing-speakers”][/qodef_elements_holder_item][/qodef_elements_holder][/vc_column][vc_column width=”1/2″][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_layout3 skin=”” posts_per_page=”1″ column_number=”1″ space_between_items=”large” image_size=”custom” display_excerpt=”yes” display_date=”no” display_author=”no” display_pagination=”” post_in=”15657″ offset=”” excerpt_length=”55″ custom_image_width=”240″ custom_image_height=”240″ extra_class_name=”landing-speakers”][/qodef_elements_holder_item][/qodef_elements_holder][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590504339006{margin-top: -40px !important;background-color: #4d7ea7 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_empty_space height=”120px”][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590504871892{margin-top: -40px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_empty_space height=”80px”][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][vc_custom_heading text=”Participants” font_container=”tag:h2|font_size:32px|text_align:center|color:%233f3f3f|line_height:36px” google_fonts=”font_family:Ubuntu%20Condensed%3Aregular|font_style:400%20regular%3A400%3Anormal”][/qodef_elements_holder_item][/qodef_elements_holder][vc_empty_space height=”64px”][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590504871892{margin-top: -40px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column width=”1/4″][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_layout5 skin=”” posts_per_page=”1″ column_number=”1″ space_between_items=”huge” sort=”latest” image_size=”full” display_date=”no” display_author=”no” display_comments=”no” display_views=”no” display_share=”no” display_hot_trending_icons=”no” display_pagination=”” post_in=”18130″ offset=”” extra_class_name=”no_title center-image grayscale”][/qodef_elements_holder_item][/qodef_elements_holder][/vc_column][vc_column width=”1/4″][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_layout5 skin=”” posts_per_page=”1″ column_number=”1″ space_between_items=”huge” sort=”latest” image_size=”full” display_date=”no” display_author=”no” display_comments=”no” display_views=”no” display_share=”no” display_hot_trending_icons=”no” display_pagination=”” offset=”” extra_class_name=”no_title center-image grayscale” post_in=”6271″][/qodef_elements_holder_item][/qodef_elements_holder][/vc_column][vc_column width=”1/4″][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_layout5 skin=”” posts_per_page=”1″ column_number=”1″ space_between_items=”huge” sort=”latest” image_size=”full” display_date=”no” display_author=”no” display_comments=”no” display_views=”no” display_share=”no” display_hot_trending_icons=”no” display_pagination=”” post_in=”5015″ offset=”” extra_class_name=”no_title center-image grayscale”][/qodef_elements_holder_item][/qodef_elements_holder][/vc_column][vc_column width=”1/4″][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_layout5 skin=”” posts_per_page=”1″ column_number=”1″ space_between_items=”huge” sort=”latest” image_size=”full” display_date=”no” display_author=”no” display_comments=”no” display_views=”no” display_share=”no” display_hot_trending_icons=”no” display_pagination=”” post_in=”16950″ offset=”” extra_class_name=”no_title center-image grayscale”][/qodef_elements_holder_item][/qodef_elements_holder][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590504871892{margin-top: -40px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_empty_space height=”120px”][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590505537680{margin-top: -40px !important;background-color: #efefef !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_column_text][/vc_column_text][vc_empty_space height=”80px”][vc_column_text]
[/vc_column_text][vc_empty_space height=”120px”][/vc_column][/vc_row]