One of the biggest problems in ICS/OT is one nobody is talking about. It’s institutional memory. Analysts and engineers rotate out. Contractors come and go. Tribal knowledge evaporates. Every new team member starts from zero, relearning the same lessons about your network that the last person spent two years accumulating. What if you had AI…
Cybersecurity discussions often focus on selecting the right technologies, deploying controls, and automating risk management. While important, these represent only part of the equation. In real operational environments, cybersecurity posture is shaped by decisions made far beyond the security team. Operational leaders prioritize uptime and safety. Supply chain teams select vendors and components. Commercial teams…
This panel brings together cybersecurity leadership from critical infrastructure and energy sectors to discuss the evolving relationship between corporate cyber teams and the broader business. Experts will explore strategies for effective cross-functional collaboration, focusing on how security can move beyond a siloed function to become a true partner in operational success.
This session explores the CS2AI-KPMG Control System Cybersecurity Annual Report, highlighting key trends from the last three years of survey data. Drawing on insights from over 500 global professionals, the presentation covers the most pressing challenges and priorities in OT security, while comparing these findings to recent public market analysis to identify where industry perspectives…
Hacking factories with AI, leveraging AI to execute pentestsfollowed by using Mesh to communicate offgrid (and no one cantrace you) Hands-on Fun
Participate in a high-level discussion on the strategic challenges facing the modern energy landscape. Together, they will share personal insights on navigating market volatility, driving operational efficiency, and the long-term future of traditional energy in an increasingly digital world.
OT security succeeds when engineering, operations, and security share a destination—and a realistic path to get there. This interactive session helps attendees move from reactive work to a strategy that respects uptime, safety, and legacy constraints while still improving security outcomes. We’ll begin with a rapid overview of why OT programs slip into firefighting (misaligned…
Background:Cybersecurity risk has evolved from merely an IT issue to a core strategic and operational challenge, especially due to the convergence of IT and vulnerable, legacy Operational Technology (OT) systems. Recent, high-impact attacks (Colonial Pipeline, MWAA, Volt Typhoon) on critical infrastructure demonstrate that disruptions are inevitable and lead to severe financial, operational, and reputational costs,…