Industrial Security Conference Copenhagen 2024

Page 1


PROGRAM TUESDAY 12 NOV 2024

08.00

WELCOME TO ISC-CPH: REGISTRATION AND BREAKFAST

This day of the conference will be in danish

09.00

OPENING OF INDUSTRIAL SECURITY CONFERENCE CPH

Nina Meyer, Senior Project Manager, Insight Events

09.05

WELCOME TO THE CONFERENCE AND INTRODUCTION TO TODAY’S PROGRAM

Peter Frøkjær, Senior Security Architect, Vestas & President, ISACA Denmark

09.10

THE THREAT ASSESSMENT AGAINST DENMARK

Søren Maigaard, Director, SektorCERT

09.50

10.00

UPDATING EMERGENCY RESPONSE LEGISLATION IN THE ENERGY SECTOR

Jesper Rode Tholstrup, Head of Division, Energistyrelsen

10.40

11.15

AND NETWORKING

CREATE VISIBILITY ON YOUR PRODUK2ONSNETWORK!

Kenneth B. Jørgensen, Owner, KCERT

AND CTI - A MATCH MADE IN HEAVEN

Technical Level: Beginner

Martin Hansen, CISO, Elnetselskabet N1 Tibor Földesi, Security Analyst, Norlys

14.25

AND NETWORKING

THE CONFERENCE CONTINUES IN TWO TRACKS: ”MAIN TRACK” AND ”SESSIONS”. YOU ARE FREE TO CHOOSE WHICH PRESENTATIONS YOU WOULD LIKE TO ATTEND ACROSS THE TRACKS.

MAIN TRACK

14.55

BUTTERFLY EFFECTS ON CRITICAL INFRASTRUCTURE

Helena Marqvertsen Frank, OT Security Manager, Ørsted

15.35 SHORT BREAK

15.45

SUPPLY CHAIN SECURITY IN THE OT ENVIRONMENT – HOW DO WE HANDLE IT?

Morten Holm Gregersen, Founder & Director, Cybernordic

16.25 SHORT BREAK

SESSIONS

14.55

WHAT DO OT SECURITY PROFESSIONALS NEED TO KNOW ABOUT NIS2?

Julie Bak-Larsen, Partner, Bird & Bird

15.35 KORT PAUSE

15.45

WORKSHOP - – LOG MANAGEMENT/MONITORING IN OT

Technical Level: Beginner

Kenneth B. Jørgensen, Owner, KCERT

Morten Kromann, Head of Industrial Security, Siemens Josef Gustafsson, Systems Engineer, Corelight

16.25 SHORT BREAK

THE FIRST DAY OF THE CONFERENCE CONTINUES TOGETHER

16.30

HOW DOES ENERGISTYRELSEN/THE DANISH ENERGY AGENCY USE SCENARIOS AS A METHOD TO ENSURE PREPARATION OF THE SECTOR?

Malene Hein Nybroe, Long Term Energy Advisor – Ukraine, Ministry of Foreign Affairs of Denmark

17.10

THE FIRST DAY OF THE CONFERENCE IS ROUNDED OFF BY THE CHAIRMAN

Peter Frøkjær, Senior Security Architect, Vestas & President, ISACA Denmark

17.20–18.20

NETWORKING RECEPTION – ENJOY REFRESHMENTS AND NETWORK WITH OUR PARTNERS

PROGRAM WEDNESDAY 13 NOV 2024

08.00

WELCOME TO DAY 2

09.00

OPENING OF THE CONFERENCE BY NINA MEYER, SENIOR PROJECT MANAGER, INSIGHT EVENTS

09.05

CHAIRMAN PETER FRØKJÆR, SENIOR SECURITY ARCHITECT, VESTAS & PRESIDENT, ISACA DENMARK INTRODUCES THE CONFERENCE AND TODAY’S PROGRAM

09.10

MANAGING COMPLEXITY BY ENGINEERING OT SECURITY

Technical level: Intermediate Vivek Ponnada, Technology Solutions Director, Nozomi Networks

09.45 SHORT BREAK

09.55 ROUGH AROUND THE EDGES: THE STATE OF SOFTWARE SUPPLY CHAIN IN OT/IOT ROUTERS

Technical level: intermediate Daniel dos Santos, Head of Security Research, Forescout Technologies, Inc.

10.30

AN APPROACH TO DISASTER RECOVERY IN OT

Technical level: intermediate/ advanced Saltanat Mashirova, Advanced Cyber Security Architect/Engineer, Honeywell

12.20 LUNCH AND NETWORKING

THE CONFERENCE CONTINUES IN TWO TRACKS: ”MAIN TRACK” AND ”SESSIONS”. YOU ARE FREE TO CHOOSE WHICH PRESENTATIONS YOU WOULD LIKE TO ATTEND ACROSS THE TRACKS.

MAIN TRACK

13.20

LESSONS LEARNED FROM A MALWARE INCIDENT ON A CRUISE SHIPS CONTROL SYSTEMS

Technical level: Beginner Christopher Stein, Lead Engineer, Maritime Cybersecurity, Royal Caribbean Group

13.55 SHORT BREAK 14.05

STRENGTHENING ENERGY SUPPLY AND CYBER RESILIENCE IN EUROPE’S ENERGY SECTOr

Technical level: Intermediate Kenneth Titlestad, Director –Industrial IT/OT & Cybersecurity, Sopra Steria

14.40 REFRESHMENTS AND NETWORKING

15.10

WHY ISA/IEC 62443 RISK

ASSESSMENT SHOULD BE THE FIRST STEP IN YOUR OT SECURITY PROGRAM

Technical Level: Intermediate Tommy Evensen, Director, Omny AS

HOW AI/ML/LLMS ARE BEING USED IN THE OT/ICS FIELD

Patrick C Miller, CEO, Ampere Industrial Security

16.30 SHORT BREAK

SESSIONS

13.20

WORKSHOP PART 1: APPLIED

REVERSE ENGINEERING IN OT PROTOCOLS

Technical level: Advanced Ali Rıza Sahinkaya, Researcher, ICSFusion

13.55 SHORT BREAK

14.05

WORKSHOP PART 2: APPLIED REVERSE ENGINEERING IN OT PROTOCOLS

Ali Rıza Sahinkaya, Researcher, ICSFusion

14.40 REFRESHMENTS AND NETWORKING

15.10

REAL LESSONS AND CONSIDERATIONS WHEN DEPLOYING SECURITY TO OT ENVIRONMENTS

Technical level: Beginner Craig Carolessen, Senior Manager, BDO UK

15.45 SHORT BREAK

15.55

LATEST OT THREAT INTELLIGENCE DIRECTLY FROM THE SOURCE Geri Revay, Researcher, FortiGuards Lab

16.30 SHORT BREAK

THE CONFERENCE CONTINUES IN THE SHARED TRACK 16.35

SECURING OFFSHORE WIND BY DESIGN

Technical level: Intermediate Tony Turner, CEO, Opswright 17.00 SIGHTSEEING + WALK AND TALK

RECEPTION

18.40 – 20.30

& NETWORKING (requires separate signup)

PROGRAM THURSDAY 14 NOV 2024

08.00 WELCOME TO DAY 3 AT ISC-CPH.

09.00 CHAIRMAN PETER FRØKJÆR, SENIOR SECURITY ARCHITECT, VESTAS & PRESIDENT, ISACA DENMARK INTRODUCES TODAY’S PROGRAM.

THE CONFERENCE CONTINUES IN TWO TRACKS: ”MAIN TRACK” AND ”SESSIONS”. YOU ARE FREE TO CHOOSE WHICH PRESENTATIONS YOU WOULD LIKE TO ATTEND ACROSS THE TRACKS.

MAIN TRACK

09.05

AUDIENCE PARTICIPATION ACTIVITY

Peter Frøkjær, Senior Security Architect, Vestas & President, ISACA Denmark

09.40 SHORT BREAK

09.50

REAPING PROCESS IMPROVEMENTS FROM NETWORK LEAKS - BOOST YOUR OT SECURITY CONTROLS

Technical level: intermediate

Robert Valkama, Senior Manager, OT Cyber Security, Fortum

Mikko Kenttälä, Founder and CEO, SensorFu

10.25 REFRESHMENTS AND NETWORKING

10.55

ARE WE GETTING TO ITGRATIONALIZED IN OT?

Technical level: Intermediate Søren Egede Knudsen, CEO & IT/OT Security expert, Egede

11.30 LUNCH AND NETWORKING

12.30

PRIORITIZATION & DECISION MAKING IN CRITICAL INFRASTRUCTURE DEFENSE

Technical level: Intermediate Joe Slowik, Threat Intelligence & Critical Infrastructure Security Leader, MITRE

13.05 REFRESHMENTS AND NETWORKING

13.35

SECURING A WORLD OF LEGACY

Technical level: intermediate

Daniel Rosenring, Senior Specialist, Safety & Cyber Security Control SW, Grundfos

14.10 Short break

SESSIONS

09.05

STRATEGI SESSION

Technical level: Beginner

Jens Christian Vedersø, Enterprise Cyber Security Strategist, Vestas

09.40 SHORT BREAK

09.50

TOWARD TO THE FINAL FRONTIER - PRINCIPLE TO SECURE NETWORK RESILIENCE OF YOUR CYBERPHYSICAL SYSTEM AGAINST APT WAR

Technical level: Beginner

Yenting Lee, Senior Threat Researcher, TXOne Networks Inc.

10.25 REFRESHMENTS AND NETWORKING

10.55

NO VR REQUIRED: SIMULATING ATTACK PATHS FOR VULNERABILITY MANAGEMENT

Technical level: Intermediate Kylie McClanahan, CTO, Bastazo

11.30 LUNCH AND NETWORKING

12.30

DEEPFAKES, RELATING TO SOCIAL ENGINEERING ATTACKS

Technical level: Beginner

James R. McQuiggan, Security Awareness Advocate, KnowBe4

13.05 REFRESHMENTS AND NETWORKING

13.35

DETECTING DESTRUCTIVE MALWARE IN OT PROTOCOLS

Technical level: Intermediate Odin Jenseg, Detection Engineer, mnemonic Rafael Lukas Maers, Reverse Engineering Team Lead, mnemonic

14.10 SHORT BREAK

THE CONFERENCE CONTINUES IN A SHARED TRACK

14.20

23ANDME AND 2TB – YOUR SUPPLY CHAIN’S DNA

Technical level: Slightly advanced

Ron Brash, VP of Technical Research & Integrations, aDolus Technology Inc.

14.55

SECURING OT: LESSONS LEARNED FROM GLOBAL AUTOMOTIVE LEADER VOLVO AND ORANGE CYBERDEFENSE

Technical level: Intermediate

Andreas Jacobsson, OT Security Consultant, Orange Cyberdefense

Martin Enefeldt, Senior Network & Security Architect, Volvo Cars

Fawzi Aiboud Nygren, CISO & BISO, Volvo Truck & Volvo AB

15.30

CHAIRMAN PETER FRØKJÆR, SENIOR SECURITY ARCHITECT, VESTAS & PRESIDENT, ISACA DENMARK TALKS ABOUT TODAY’S LEARNINGS

15.40 THE CONFERENCE ENDS

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.