Industrial 4.0 IOT/OT Security, Threat Detection and Mitigating Cyber Impact on Safety Systems
Back To Schedule
Tuesday, September 18 • 9:20am - 10:00am
Discussion Session: Advanced 3rd Party Risk Management – Developing Trust Across the Supply Chain

Log in to save this to your schedule, view media, leave feedback and see who's attending!

Feedback form is now closed.
Recent APT attacks affecting multiple sectors through a common attack surface have driven home the lesson that no matter how well we think we have secured our perimeters, our information and systems may still be vulnerable to attack through 3rd party systems with weak security controls. Individually we may all be resilient, but collectively we are not. As critical infrastructure relies more heavily on interconnectivity to function efficiently our mindset needs to evolve to consider cyber-vulnerability not as an individual, but a collective problem. Managing 3rd party risk runs deeper than many imagine and opens fundamental questions around the way we go about the business of building security into our systems and products. We can’t have a 360 degree view of supply chain security, but how can we move towards developing the trust and mechanisms to better support a collaborative approach to security with our suppliers, partners and interrelated sectors?
  • Nothing can be achieved in isolation – What are the barriers to meaningful collaboration between regulators, asset owners, integrators and vendors on mitigating cyber risk?
  • What are we learning about VPN Filter attack and how does it illustrate supply chain vulnerability?
  • What do we need to change to achieve an adequate level of commitment from all stakeholders, and how are we reconciling different perspectives?
  • Where might we be doubling our efforts and how can we streamline?
  • How are we faring with efforts to collaborate across the supply chain to develop fit for purpose standards regimes, audit compliance check lists and conformity assessments?

avatar for Nathan Faith

Nathan Faith

Cyber Security Manager, Exelon Nuclear Corporate Security
As a long-standing contributor in the public and private partnership toward cyber security programs, Nathan has a deep-rooted passion towards critical infrastructure protection. He has served as a contributing author on numerous industry documents and holds leadership positions on... Read More →
avatar for Andy Kling

Andy Kling

Director of Cyber Security and Architecture, Schneider Electric
Andy has over thirty-five years of software development experience. He has worked in the Industrial Control Systems (ICS) development organization at Schneider Electric since 2001. Andy has ushered the Schneider Electric Process Automation Development team to the first in the world... Read More →
avatar for Zach Tudor

Zach Tudor

Associate Laboratory Director, National and Homeland Security, Idaho National Laboratory
Mr Tudor is responsible for Idaho National Laboratory’s (INL) National and Homeland Security (N&HS) mission. N&HS is a major center for national security technology development and demonstration, employing 500 scientists and engineers across $300M in programs at the lab. He is responsiblefor... Read More →
avatar for Dave Weinstein

Dave Weinstein

VP of Threat Research, Claroty
Dave Weinstein is the VP of Threat Research at Claroty. Prior to joining Claroty, Dave was the Chief Technology Officer of New Jersey. He began his career as an operations planner at U.S. Cyber Command, where he served for three years. Dave holds a Bachelor's degree from Johns Hopkins... Read More →

Tuesday September 18, 2018 9:20am - 10:00am PDT
Citizen Hotel 926 J Street Sacramento, California 95814