\"

Agenda Day 1

8:00 AM - 9:00 AM Registration and Coffee

9:00 AM - 9:10 AM CHAIRMAN’S OPENING REMARKS

9:10 AM - 9:50 AM THE OPERATIONAL AND MANAGEMENT ASPECTS OF PLANNING AND IMPLEMENTING CYBER SECURITY PROGRAMMES IN GLOBAL ENTERPRISES

  • How can cyber security programmes be executed with multiple stakeholders?
  • How can the progress be monitored in a clear and lean approach?
  • What processes and procedures need implementation?
  • Can we simultaneously implement cyber security programmes during the design phase to be more efficient in tackling the threat?

9:50 AM - 10:30 AM ICS CYBERSECURITY IN THE BOARDROOM: NEEDED NEXT STEPS

Lhoussain Lhassani, CISS, Sr. Specialist Asset management, Stedin
  • Understanding the high risks posed by unsecure Industrial Systems and their impact on economy and society
  • Highlighting the board’s role in managing cyber security as part of assessing business risk
  • Evaluating the growing impact of regulation on the industrial sector and how to be prepared
  • How can cyber security be used as an enabler of new businesses?

Lhoussain Lhassani

CISS, Sr. Specialist Asset management
Stedin

10:30 AM - 11:00 AM MORNING COFFEE AND NETWORKING

11:00 AM - 11:40 AM CREATING A CULTURE OF CO-OPERATIVE MALWARE INFORMATION SHARING

Johan Schrooyen, Information Engineer, NATO C3 Representative
  • How can information regarding malware be better shared and prepare you for the related indicators of compromise?
  • Assessing the functionality of open source Malware Information Sharing Platforms (MISP) to exchange technical malware information with your peers
  • Understanding how governments and international organisations (such as NATO and the EU) have used MISP as an opportunity to build a community of trust

Johan Schrooyen

Information Engineer
NATO C3 Representative

11:40 AM - 12:20 PM INSTALLING CYBERSECURITY AND LIMITED REMOTE ACCESS ON INDUSTRIAL CONTROL SYSTEMS

Heinz Janiec, Sen. Consultant/ Sen Project Manager, Shell
  • Understanding how remote access functionality can create opportunities for cyber adversaries to cause harm or damage to critical processes, that could affect the lives of people, health, society, the economy and the environment
  • Assessing the risk and consequences that remote access can have on systems, potentially allowing outside influences to circumvent physical or logical security controls
  • Implementing a token based multi-factor authentication scheme, to gain access to the control network

Heinz Janiec

Sen. Consultant/ Sen Project Manager
Shell

12:20 PM - 1:20 PM NETWORKING LUNCH

1:20 PM - 2:00 PM EFFECTIVELY COMMUNICATING THE BENEFITS OF ICS RISK ASSESSMENTS INTERNALLY

, ,
  • Improving control system safety, reliability and availability through employee engagement
  • Improving employee morale, loyalty, and retention in order to improve acceptance of cyber security measures
  • Ensuring that you are meeting regulatory requirements, and communicating these to staff throughout the business
  • Enhancing the corporate image and reputation through effective cyber security controls

2:00 PM - 2:40 PM CYBER RISK ASSESSMENTS FOR ICS FROM A REINSURANCE PERSPECTIVE

Tobias Gebhardt, Loss Control Consultant – ICS Security, Munich Re
  • Exploring the cyber threat landscape for national critical infrastructure and production environments
  • Including an holistic approach for ICS cyber risk assessments
  • Highlighting strategic focus areas and what the future steps are when approaching risk assessments

Tobias Gebhardt

Loss Control Consultant – ICS Security
Munich Re

2:40 PM - 3:10 PM AFTERNOON TEA AND NETWORKING

3:10 PM - 3:50 PM HOW TO SECURE ACCESS TO YOUR ENTERPRISE APPLICATIONS

Benjamin Borchers, Senior Solutions Consultant, LogMeIn
  • Manage access control across your organization
  • Mitigate risk effectively, improve compliance and increase efficiency
  • Establish strong password practices
  • Increase productivity by getting employees on and off systems fast

Benjamin Borchers

Senior Solutions Consultant
LogMeIn

3:50 PM - 4:30 PM INCIDENT DETECTION, RESPONSE, AND SYSTEM RECOVERY

Olivier Hauert, Telecommunication Engineer, Project Manager, Alpiq
  • Increasing how soon after an incident has occurred that the incident can be detected- and- how quickly it can be recovered after an incident has been detected in ICS-specific environments
  • Ensuring that Incident Responders are trained for ICS-specific scenarios, as normal methods of recovering IT systems may not apply to ICS
  • Incident response in ICS is closely aligned to disaster recovery, specifically to address the stringent uptime requirements of ICS

Olivier Hauert

Telecommunication Engineer, Project Manager
Alpiq

4:30 PM - 4:45 PM CHAIRMAN'S CLOSING REMARKS