Agenda Day 1
8:00 am - 9:00 am Registration and Coffee
9:00 am - 9:10 am CHAIRMAN’S OPENING REMARKS
9:10 am - 9:50 am THE OPERATIONAL AND MANAGEMENT ASPECTS OF PLANNING AND IMPLEMENTING CYBER SECURITY PROGRAMMES IN GLOBAL ENTERPRISES
- How can cyber security programmes be executed with multiple stakeholders?
- How can the progress be monitored in a clear and lean approach?
- What processes and procedures need implementation?
- Can we simultaneously implement cyber security programmes during the design phase to be more efficient in tackling the threat?
9:50 am - 10:30 am ICS CYBERSECURITY IN THE BOARDROOM: NEEDED NEXT STEPSMr Lhoussain Lhassani - CISS, Sr. Specialist Asset management, Stedin
- Understanding the high risks posed by unsecure Industrial Systems and their impact on economy and society
- Highlighting the board’s role in managing cyber security as part of assessing business risk
- Evaluating the growing impact of regulation on the industrial sector and how to be prepared
- How can cyber security be used as an enabler of new businesses?
Mr Lhoussain LhassaniCISS, Sr. Specialist Asset management
10:30 am - 11:00 am MORNING COFFEE AND NETWORKING
11:00 am - 11:40 am CREATING A CULTURE OF CO-OPERATIVE MALWARE INFORMATION SHARINGJohan Schrooyen - Information Engineer, NATO C3 Representative
- How can information regarding malware be better shared and prepare you for the related indicators of compromise?
- Assessing the functionality of open source Malware Information Sharing Platforms (MISP) to exchange technical malware information with your peers
- Understanding how governments and international organisations (such as NATO and the EU) have used MISP as an opportunity to build a community of trust
Johan SchrooyenInformation Engineer
NATO C3 Representative
11:40 am - 12:20 pm INSTALLING CYBERSECURITY AND LIMITED REMOTE ACCESS ON INDUSTRIAL CONTROL SYSTEMSHeinz Janiec - Sen. Consultant/ Sen Project Manager, Shell
- Understanding how remote access functionality can create opportunities for cyber adversaries to cause harm or damage to critical processes, that could affect the lives of people, health, society, the economy and the environment
- Assessing the risk and consequences that remote access can have on systems, potentially allowing outside influences to circumvent physical or logical security controls
- Implementing a token based multi-factor authentication scheme, to gain access to the control network
Heinz JaniecSen. Consultant/ Sen Project Manager
12:20 pm - 1:20 pm NETWORKING LUNCH
1:20 pm - 2:00 pm EFFECTIVELY COMMUNICATING THE BENEFITS OF ICS RISK ASSESSMENTS INTERNALLY
- Improving control system safety, reliability and availability through employee engagement
- Improving employee morale, loyalty, and retention in order to improve acceptance of cyber security measures
- Ensuring that you are meeting regulatory requirements, and communicating these to staff throughout the business
- Enhancing the corporate image and reputation through effective cyber security controls
2:00 pm - 2:40 pm CYBER RISK ASSESSMENTS FOR ICS FROM A REINSURANCE PERSPECTIVETobias Gebhardt - Loss Control Consultant – ICS Security, Munich Re
- Exploring the cyber threat landscape for national critical infrastructure and production environments
- Including an holistic approach for ICS cyber risk assessments
- Highlighting strategic focus areas and what the future steps are when approaching risk assessments
Tobias GebhardtLoss Control Consultant – ICS Security
2:40 pm - 3:10 pm AFTERNOON TEA AND NETWORKING
3:10 pm - 3:50 pm HOW TO SECURE ACCESS TO YOUR ENTERPRISE APPLICATIONSBenjamin Borchers - Senior Solutions Consultant, LogMeIn
- Manage access control across your organization
- Mitigate risk effectively, improve compliance and increase efficiency
- Establish strong password practices
- Increase productivity by getting employees on and off systems fast
Benjamin BorchersSenior Solutions Consultant
3:50 pm - 4:30 pm INCIDENT DETECTION, RESPONSE, AND SYSTEM RECOVERYOlivier Hauert - Telecommunication Engineer, Project Manager, Alpiq
- Increasing how soon after an incident has occurred that the incident can be detected- and- how quickly it can be recovered after an incident has been detected in ICS-specific environments
- Ensuring that Incident Responders are trained for ICS-specific scenarios, as normal methods of recovering IT systems may not apply to ICS
- Incident response in ICS is closely aligned to disaster recovery, specifically to address the stringent uptime requirements of ICS
Olivier HauertTelecommunication Engineer, Project Manager