Log in to bookmark your favorites and sync them to your phone or calendar.
Welcome from the C...
Introduction from...
Discussion Session: Advanced 3rd Party Ris... 9:20am - 10:00am
Keynote Presentation: Consequenc... 10:00am - 10:30am
Networking Break 10:30am - 11:00am
Understanding and Responding to... 11:00am - 11:30am
Getting a grip on Tactics, Techn... 11:30am - 12:00pm
Vulnerability Assessments for Op... 12:00pm - 12:30pm
Detecting Industrial Network Ano... 12:30pm - 1:00pm
Networking Lunch 1:00pm - 2:00pm
The path to Implementing Anomaly... 2:00pm - 2:30pm
Discussion Session: Do we know w... 2:30pm - 3:00pm
Information Sharing Vs Intellige... 3:00pm - 3:30pm
Networking Break 3:30pm - 4:00pm
Demonstrating Level 0 and 1 devi... 4:00pm - 4:30pm
Discussion Session: A strategic... 4:30pm - 5:00pm
Drinks and Networking Conference Dinner Sponsored by Claroty 5:00pm - 9:30pm
Welcome Back
Industrial Control System Securi... 9:10am - 9:40am
Leveraging the Virtual Power Gri... 9:40am - 10:10am
Case Study: Using the few to Att... 10:10am - 10:40am
Networking Break 10:40am - 11:10am
Cyber Incident Response and Comm... 11:10am - 11:40am
Results from Analyzing Real-Worl... 11:40am - 12:10pm
Developing a Common Language for... 12:10pm - 12:40pm
Networking Lunch 12:40pm - 1:40pm
Cybersecurity & a...
Standards-based Cy...
The Start Button: Navigating ISA... 2:20pm - 2:50pm
Networking Break 2:50pm - 3:20pm
Working Group Break-out Sessions 3:30pm - 4:30pm
Working Group Presentations and... 4:30pm - 5:00pm