Archives

“Accelerate” for OT: What Actually Translates?

Overview This 50-minute Birds-of-a-Feather session explores a focused question: which practices and metrics from the DevOps “Accelerate” research (Forsgren, Humble, Kim) actually translate to OT environments, and which ones don’t? Rather than a traditional presentation, this is a structured, facilitator-led collaborative session where participants do the thinking together, using an “Adopt, Adapt, or Avoid” framework…

Keynote Address

Why Isn’t AI Transforming Critical Infrastructure (Yet)?

This session will be structured as a facilitated Birds-of-a-Feather (BoF) discussion focused on identifying and characterizing barriers to AI adoption within critical infrastructure sectors. While AI capabilities have matured rapidly, adoption in operational environments (particularly those involving safety-critical OT systems) remains uneven. The purpose of this session is not to showcase a product or a…

Incident Response Table Top Exercise Using FEMS’s NIMS Incident Command System

UTSI will be facilitating a specialized Tabletop Exercise (TTX) utilizing ThreatGen technology and featuring a custom scenario. The TTX will run across three morning sessions, concluding with a final summary and awards presentation during the Level Zero closeout. This TTX can be used as part of the items needed for Type 3 or Type 4…

OT Cyber Entrepreneurs Panel

We will dive into the realities of building a business in a sector where “move fast and break things” is a liability, and where the customer’s primary concern isn’t just data privacy—it’s uptime and human safety. What We’ll Explore

Securing the Skies: Cybersecurity Challenges and AI-Driven Threats in Drone Operations

As the role of drones in critical infrastructure expands, so does the attack surface, making them prime targets for cyber-attacks. Drawing from real-world incidents and cutting-edge research, we will explore adversarial tactics, nation-state attack strategies, and the cyber-physical implications of drone compromise. Leave with insights into innovative defense mechanisms, including AI-powered intrusion detection and resilient…

Building an OT Cybersecurity Organization: Bridging the Gap between your Board, Your Leaders and Your IT & OT Teams

View from the Boardroom: Cybersecurity, Artificial Intelligence, and Geopolitics Homeland Security

Cognitive Architectures for Critical Infrastructure: When Your AI Analyst Never Forgets

One of the biggest problems in ICS/OT is one nobody is talking about. It’s institutional memory. Analysts and engineers rotate out. Contractors come and go. Tribal knowledge evaporates. Every new team member starts from zero, relearning the same lessons about your network that the last person spent two years accumulating. What if you had AI…

Beyond Technology: Building Cyber Resilience beyond the Security Team

Cybersecurity discussions often focus on selecting the right technologies, deploying controls, and automating risk management. While important, these represent only part of the equation. In real operational environments, cybersecurity posture is shaped by decisions made far beyond the security team. Operational leaders prioritize uptime and safety. Supply chain teams select vendors and components. Commercial teams…