Loading…
Attending this event?
Industrial 4.0 IOT/OT Security, Threat Detection and Mitigating Cyber Impact on Safety Systems
View analytic

Log in to bookmark your favorites and sync them to your phone or calendar.

Tuesday, September 18
 

9:00am

Welcome from the Cyber Senate Founder
A welcome from James Nesbitt, Founder, Cyber Senate

Tuesday September 18, 2018 9:00am - 9:10am
Citizen Hotel 926 J Street Sacramento, California 95814

9:10am

Introduction from our Chair
Speakers
avatar for Chris Blask

Chris Blask

Director, Industrial Control Systems Security at Unisys, Chair US ICS ISAC, Unisys
Chris Blask has been involved in the industrial control system and information security industries for more than twenty five years.Mr. Blask’s career spans the breadth of the cybersecurity spectrum. He invented one of the first commercial firewall products, built a multi-billion... Read More →


Tuesday September 18, 2018 9:10am - 9:20am
Citizen Hotel 926 J Street Sacramento, California 95814

9:20am

Discussion Session: Advanced 3rd Party Risk Management – Developing Trust Across the Supply Chain
Recent APT attacks affecting multiple sectors through a common attack surface have driven home the lesson that no matter how well we think we have secured our perimeters, our information and systems may still be vulnerable to attack through 3rd party systems with weak security controls. Individually we may all be resilient, but collectively we are not. As critical infrastructure relies more heavily on interconnectivity to function efficiently our mindset needs to evolve to consider cyber-vulnerability not as an individual, but a collective problem. Managing 3rd party risk runs deeper than many imagine and opens fundamental questions around the way we go about the business of building security into our systems and products. We can’t have a 360 degree view of supply chain security, but how can we move towards developing the trust and mechanisms to better support a collaborative approach to security with our suppliers, partners and interrelated sectors?
  • Nothing can be achieved in isolation – What are the barriers to meaningful collaboration between regulators, asset owners, integrators and vendors on mitigating cyber risk?
  • Do all parties concerned have a voice, and is it listened to?
  • Where might we be doubling our efforts and how can we streamline?
  • How are we faring with efforts to collaborate across the supply chain to develop fit for purpose standards regimes, audit compliance check lists and conformity assessments?
  • What work needs to be done around liability and mediation?

Speakers
avatar for Nathan Faith

Nathan Faith

Corporate Nuclear Security - Cyber Security Manager, Exelon Generation
Nathan Faith, MABOSM, CISSP, GISP, GCIH, GICSP is the Cyber Security Manager for Exelon Nuclear - Corporate Security. Nathan has worked in the nuclear industry for over 16 years, including more than 10 years managing nuclear cyber security programs. Previously, he filled electronic... Read More →
avatar for Andy Kling

Andy Kling

Director of Cyber Security and Architecture, Schneider Electric
Andy has over thirty-five years of software development experience. He has worked in the Industrial Control Systems (ICS) development organization at Schneider Electric since 2001. Andy has ushered the Schneider Electric Process Automation Development team to the first in the world... Read More →
avatar for Zach Tudor

Zach Tudor

Associate Laboratory Director, National and Homeland Security, Idaho National Laboratory
Mr Tudor is responsible for Idaho National Laboratory’s (INL) National and Homeland Security (N&HS) mission. N&HS is a major center for national security technology development and demonstration, employing 500 scientists and engineers across $300M in programs at the lab. He is responsiblefor... Read More →


Tuesday September 18, 2018 9:20am - 10:00am
Citizen Hotel 926 J Street Sacramento, California 95814

10:00am

Keynote Presentation: Consequence-driven Engineering for Critical Systems
It won’t come as a surprise to anyone in the room that if you are attempting to secure your systems by maintaining good cyber-hygiene alone you are fighting a losing battle. The rise and continued evolution of the industrial internet of things along with a growing overt threat to connected critical infrastructure from top tier, sophisticated attackers, calls for new approaches to security that take into account increased attack and response surfaces and throw out any notion of being able to simply isolate the network.
One approach is to accept that an attacker may get in, but to engineer resiliency into your systems, arming users with the strength in depth needed to detect and respond to any type of attack. Consequence-driven engineering (CDE) has gained traction as a way of providing organisations with the steps needed to identify high-consequence risk within ICS of critical infrastructure, to engineer out cyber risk from the things that must not fail and to stop potentially catastrophic attacks in their tracks.
  • Identify devices and components that facilitate risk, determine critical functions and high-consequence events then prioritise what cannot fail based on the consequences
  • Think like an attacker to illuminate specific, detailed attack paths, access, information and action to have an effect and highlight system vulnerabilities in networks and the supply chain
  • Engineer out the prioritised cyber-risk with controls, tripwires, mitigations and backstops to interrupt high-consequence risk
  • The importance of collective resilience, collaboration and information sharing to combat high-consequence risk across the supply chain

Speakers
avatar for Zach Tudor

Zach Tudor

Associate Laboratory Director, National and Homeland Security, Idaho National Laboratory
Mr Tudor is responsible for Idaho National Laboratory’s (INL) National and Homeland Security (N&HS) mission. N&HS is a major center for national security technology development and demonstration, employing 500 scientists and engineers across $300M in programs at the lab. He is responsiblefor... Read More →


Tuesday September 18, 2018 10:00am - 10:30am
Citizen Hotel 926 J Street Sacramento, California 95814

10:30am

Networking Break
Tuesday September 18, 2018 10:30am - 11:00am
Citizen Hotel 926 J Street Sacramento, California 95814

11:00am

Understanding and Responding to the Global Threat Landscape
  • What characterises threat actors and their motives?
  • What strategies can be employed to effectively detect and respond to their attacks?
  • How can we move beyond signature-based detection and blocking known threat?

Speakers
avatar for Sean Plankey

Sean Plankey

Cyber Intelligence Advisor, BP
Sean Plankey is the Global Cyber Intelligence Advisor for BP plc, the  12th largest  company  in  the  world and  a  world leader  in  energy  production.  In this role he leads the evaluation of threat intelligence to correlate cyber intelligence with geopolitical issues... Read More →


Tuesday September 18, 2018 11:00am - 11:30am
Citizen Hotel 926 J Street Sacramento, California 95814

11:30am

Getting a grip on Tactics, Techniques and Procedures (TTPs)
To effectively plan an incident response strategy, it is essential to know how attacks happen, how to know that you are being attacked and how to act when you realise you are. This presentation will highlight specific paths used to attack ICS, vulnerabilities that can be exploited and methods of remediation referencing some of the TTPs Dragos has seen threat actors use in the wild.

Speakers
avatar for Daniel Michaud-Soucy

Daniel Michaud-Soucy

Principal Threat Analyst, Dragos, Inc
Further information coming soon! 


Tuesday September 18, 2018 11:30am - 12:00pm
Citizen Hotel 926 J Street Sacramento, California 95814

12:00pm

Vulnerability Assessments for Operational Technology
  • Learn about core components for a vulnerability assessment for industrial control systems.
  • Learn why asset and configuration change management are crucial to a vulnerability assessment in an OT environment.
  • It is very likely that one tool will not solve your Cybersecurity concerns.

Speakers
avatar for Karl Perman

Karl Perman

Cyber and Physical Security/Critical Infrastructure Protection SME, Energy Sector Security Consortium
Karl Perman serves as a management consultant to the critical infrastructure sector. As a former law enforcement officer and well-respected security professional, Mr. Perman brings over 30-years of critical infrastructure, business protection, compliance, risk management and law enforcement... Read More →


Tuesday September 18, 2018 12:00pm - 12:30pm
Citizen Hotel 926 J Street Sacramento, California 95814

12:30pm

Detecting Industrial Network Anomalies without the Risk of Disruption
Description shortly

Speakers
avatar for Dave Weinstein

Dave Weinstein

VP of Threat Research, Claroty
Dave Weinstein is the VP of Threat Research at Claroty. Prior to joining Claroty, Dave was the Chief Technology Officer of New Jersey. He began his career as an operations planner at U.S. Cyber Command, where he served for three years. Dave holds a Bachelor's degree from Johns Hopkins... Read More →


Tuesday September 18, 2018 12:30pm - 1:00pm
Citizen Hotel 926 J Street Sacramento, California 95814

1:00pm

Networking Lunch
Tuesday September 18, 2018 1:00pm - 2:00pm
Citizen Hotel 926 J Street Sacramento, California 95814

2:00pm

The path to Implementing Anomaly Detection
Speakers
avatar for Tim Sanguinetti

Tim Sanguinetti

Industrial Control Systems Cyber Security, Northern California Power Agency

Panellist
avatar for Andrea Carcano

Andrea Carcano

CPO and Co-founder, Nozomi Networks


Tuesday September 18, 2018 2:00pm - 2:30pm
Citizen Hotel 926 J Street Sacramento, California 95814

2:30pm

Discussion Session: Do we know what is on our Network? Are we Getting any Better at Threat Detection?
  • It goes without saying that we cannot design a holistic defence without full visibility of the assets on our ICS network and how they are connected, but do we have it?
  • Are we getting a clearly defined picture of the threat or are we spending too much time chasing false positives?
  • Are threat detection solutions taking a holistic approach to assessing risk, identifying complete characteristics of complex threats and escalating appropriately?

Speakers
avatar for Ian Fitzgerald

Ian Fitzgerald

CIO, Truckee Donner Public Utility District
Leader and decision-maker of the District’s information technology department. Key contributor to formulating organization goals as the importance of information technology grows as a keystone foundation within the District. Continue to keep the District at the forefront of sophisticated... Read More →
avatar for Jeff Cornelius, Ph.D

Jeff Cornelius, Ph.D

EVP Industrial Control and Critical Infrastructure Solutions, Darktrace
Jeff Cornelius joined Darktrace in February of 2014 as Executive Vice President.  His background with large Enterprise Software organizations over the past 18 years lends itself to the needs of an, innovative, market-defining organization.  Jeff oversees the strategic direction... Read More →
avatar for Eric Vettel, Ph.D.

Eric Vettel, Ph.D.

President, American Energy Society
Eric J. Vettel, Ph.D., is the current President of the American Energy Society (20010 – present). He is trained as a historian of science and has published articles on 19th-century chemistry, early 20th-century physics, the biological sciences in the Post War period, and a number... Read More →


Tuesday September 18, 2018 2:30pm - 3:00pm
Citizen Hotel 926 J Street Sacramento, California 95814

3:00pm

Demonstrating Level 0 and 1 device Vulnerability
We don’t need to look very hard to find recent reminders of either the fact that ICS have become a prime target and the sophistication of those who seek to attack them. We now face threat actors developing means of attacking specific components that are all but ubiquitous across connected ICS in certain critical infrastructure. Many level 0 and 1 devices are designed to allow two-way data exchange with SCADA or cloud systems. Recent attacks have demonstrated how vulnerabilities could be exploited to send false information to operators or directly manipulate processes leading to loss of safety, economic loss and possibly cause catastrophic damage. This presentation will highlight current vulnerabilities in OT devices and demonstrate the ways in which they could be exploited by an attacker.
  • Examples of key OT vulnerability and demonstration of potential attack paths
  • Why context matters – Identifying IoT devices, the applications they support and how they could be vulnerable to understand the severity of the risk
  • How anomaly detection in raw process data could provide an additional layer of security

Speakers
avatar for Andy Kling

Andy Kling

Director of Cyber Security and Architecture, Schneider Electric
Andy has over thirty-five years of software development experience. He has worked in the Industrial Control Systems (ICS) development organization at Schneider Electric since 2001. Andy has ushered the Schneider Electric Process Automation Development team to the first in the world... Read More →


Tuesday September 18, 2018 3:00pm - 3:30pm
Citizen Hotel 926 J Street Sacramento, California 95814

3:30pm

Networking Break
Tuesday September 18, 2018 3:30pm - 4:00pm
Citizen Hotel 926 J Street Sacramento, California 95814

4:00pm

The Importance of a Scaled Approach to OT Cybersecurity in a Complex Domain
The concept and concerns around OT cyber security is not new but in recent years, it has catapulted its way to the top of most asset owners’ risks to business; at times even above 'ageing assets'. OT cyber security is a complex problem and requires multidisciplinary and systematic efforts. The spontaneous reaction to this has been to jump to the end of the seemingly more mature path that IT cyber security has taken.
This talk will explore the challenges that the industry faces—especially those with existing install bases—and looks to solve an engineering problem through, engineering. We will look at a simple model to set the incremental path toward better cyber security and to ensure the adoption of business driven, fit for purpose solutions.

Speakers
avatar for Mo Javadi

Mo Javadi

Head of Engineering, Lagoni Engineering
Mo Javadi is the Head of Engineering at Lagoni, a growing engineering consultancy firm providing multidisciplinary engineering with a particular focus on technical safety and cyber security within brownfield, high risk and complex environments. | Mo has over 10 years of international... Read More →


Tuesday September 18, 2018 4:00pm - 4:30pm
Citizen Hotel 926 J Street Sacramento, California 95814

4:30pm

Discussion Session: A strategic Approach to IT and OT Convergence – What are the key Elements to Success?
As businesses efficiency drivers have increased the need to gain better visibility of operational processes, the convergence of IT and OT has quickly become imperative and raised serious challenges. When it comes to security, we are no longer able to think of OT environments as distinct and separate from enterprise IT networks. We must however continue to appreciate that their uniqueness to make them secure without compromising operational efficiency and safety. With fundamental differences in both mindset and process in IT and OT, what are the pain points and what have been hallmarks of successful convergence projects that have overcome them?
  • Confidentiality, Integrity and Availability vs Safety, Reliability and Productivity
  • Building an orchestrated platform with best of breed IT security tools fully supported and tested by ICS Engineers
  • Integration across OEM platforms
  • IT/OT pairing on projects

Speakers
avatar for Andy Bochman

Andy Bochman

Sr. Cyber and Energy Security Strategist, Idaho National Laboratory
Provides strategic guidance to senior USG and industry leaders on topics at the intersection of grid and critical infrastructure modernization and security. Previously was Global Energy & Utilities Security Lead at IBM and Senior Adviser at the Chertoff Group in Washington, DC. A... Read More →
avatar for Rick Kaun

Rick Kaun

VP of Solutions, Verve Industrial Protection
Rick Kaun is the VP of Solutions for Verve Industrial Protection: a Control System Integrator primarily focused on Cyber Security. For over 14 years he has worked with all manner of industries on all sizes of projects around the word from front end scoping to large scale design and... Read More →


Tuesday September 18, 2018 4:30pm - 5:00pm
Citizen Hotel 926 J Street Sacramento, California 95814

5:00pm

Drinks and Networking Conference Dinner Sponsored by Claroty
We will begin our evening with networking drinks in the exhibitor area for an hour and a half before our seated dinner this year.

Thank you to Headline Sponsors Claroty

Claroty’s mission is to protect industrial control networks from cyber-attacks; ensuring safe and continuous operation of the world’s most critical infrastructures. Our technology is specifically designed for industrial control-networks and will “do no harm” to the underlying industrial processes. Our integrated platform is an award-winning suite of superior products giving asset owner/operators extreme visibility into their industrial networks, assets, protocols and ICS security status.  Designed for operations by operations technology and ICS experts, Claroty will be the long-term leader in securing industrial environments. Our global partnerships and investors include Cisco, Microsoft, Qualcomm, AT&T, Accenture, Nokia, Temasek, Rockwell, Schneider, Siemens, Bessemer Venture Partners and Innovation Endeavors.Claroty won the competitive 2018 S4 ICS Detection Challenge, has been named Frost & Sullivan’s Entrepreneurial Company of the Year for 2018, and Wall Street Journal has listed Claroty in their June 2018 Top 25 Companies to Watch. Visit www.claroty.com



Tuesday September 18, 2018 5:00pm - 9:30pm
Citizen Hotel 926 J Street Sacramento, California 95814
 
Wednesday, September 19
 

9:30am

Industrial Control System Security- Enabling Business with Digital Infrastructure
The World is Changing for Industrial Enterprises
There Will Be Winners and Losers
Cryptographic Zoning
ISA99 Architecture
Plan to Embrace ---Digital Innovation

Speakers
avatar for Chris Blask

Chris Blask

Director, Industrial Control Systems Security at Unisys, Chair US ICS ISAC, Unisys
Chris Blask has been involved in the industrial control system and information security industries for more than twenty five years.Mr. Blask’s career spans the breadth of the cybersecurity spectrum. He invented one of the first commercial firewall products, built a multi-billion... Read More →


Wednesday September 19, 2018 9:30am - 10:00am
Citizen Hotel 926 J Street Sacramento, California 95814

10:00am

Leveraging the Virtual Power Grid Testbed to Develop Cyber Resilience Strategy
Speakers
avatar for Tim Yardley

Tim Yardley

Senior Associate Director of Technology and Workforce Development, Information Trust Institute, Information Trust Institute at Illinois
Tim Yardley is the Senior Associate Director of Technology and Workforce Development and a Senior Researcher at the Information Trust Institute at the University of Illinois Urbana-Champaign. His primary duties focus on defining the vision and direction for applied research through... Read More →


Wednesday September 19, 2018 10:00am - 10:30am
Citizen Hotel 926 J Street Sacramento, California 95814

10:30am

Case Study: Using the few to Attack the Many – Lessons Learned from Recent Attacks
  • How are attackers increasingly able to leverage weaknesses in 3rd party products and services to launch attacks on the many using the few
  • What characterises Advanced Persistent Threat actors, their capabilities and techniques?
  • How did the sector co-ordinate a thorough response and what lessons have been learned?

Speakers
avatar for Andy Bochman

Andy Bochman

Sr. Cyber and Energy Security Strategist, Idaho National Laboratory
Provides strategic guidance to senior USG and industry leaders on topics at the intersection of grid and critical infrastructure modernization and security. Previously was Global Energy & Utilities Security Lead at IBM and Senior Adviser at the Chertoff Group in Washington, DC. A... Read More →


Wednesday September 19, 2018 10:30am - 11:00am
Citizen Hotel 926 J Street Sacramento, California 95814

11:00am

Networking Break
Wednesday September 19, 2018 11:00am - 11:30am
Citizen Hotel 926 J Street Sacramento, California 95814

11:30am

Increasing Visibility and Improving Functional Information Sharing
Speakers
avatar for Randy Woods

Randy Woods

M&E IT, Manufacturing CyberSecurity, The Dow Chemical Company


Wednesday September 19, 2018 11:30am - 12:00pm
Citizen Hotel 926 J Street Sacramento, California 95814

12:00pm

Providing Adequate Levels of Assurance with ICS Cyber Governance
This presentation will look at how operators of ICS and OT systems can demonstrate that they've got adequate measures in place to reduce business risk; looking at some of the technical, organisational and managerial elements of providing demonstrable assurance that we are resilient enough to dynamic threat.

Speakers
avatar for Jeff Moore

Jeff Moore

Global Head Of Security Technologist, NIBR Novartis
Jeffrey Moore is a highly respected, and recognized cyber security leader offering over 20 years of management and technical experience. He is a visionary responsible for developing strategies to reduce risk by enhancing IT security policies and procedures, security operations and... Read More →


Wednesday September 19, 2018 12:00pm - 12:30pm
Citizen Hotel 926 J Street Sacramento, California 95814

12:30pm

How do you show the Board how Security Programs are Effective?
  • Reporting board level metrics on the cyber kill chain
  • Cost loss prevention
  • Demonstrating ROI from Cyber Security programs

Speakers
avatar for Adam Traylor

Adam Traylor

Cyber Security Supervisor, Marathon Oil
Adam Traylor brings over 20 years of IT and Cyber Security related experience with specific expertise in Network Monitoring and Alerting, End-Point Protection, Security Audit and Compliance, as well as Cyber Security Intelligence program roadmaps and assessments. In his current role... Read More →


Wednesday September 19, 2018 12:30pm - 1:00pm
Citizen Hotel 926 J Street Sacramento, California 95814

1:00pm

Networking Lunch
Wednesday September 19, 2018 1:00pm - 2:00pm
Citizen Hotel 926 J Street Sacramento, California 95814

2:00pm

Developing a Common Language for IACS Cybersecurity Harmonization with ISA/IEC 62443
An overview of the ISA/IEC 62443 family of standards
Understanding the IACS life-cycle context to clearly define the responsibilities of product suppliers, systems integrators and asset owners
Establishing commonality of vocabulary, concepts and models to facilitate meaningful conversation

Speakers
avatar for Andre Ristaino

Andre Ristaino

Managing Director, ISA Security Compliance Institute
Andre Ristaino is managing director of the ISA Automation Standards Compliance Institute (ASCI) based in Research Triangle Park, N.C. He provides staff leadership for ISA’s conformance certification programs, including the ISASecure IACS certification program managed under the ISCI... Read More →


Wednesday September 19, 2018 2:00pm - 2:30pm
Citizen Hotel 926 J Street Sacramento, California 95814

2:30pm

Seatbelts for Cyber Security
  • Where are we in the adoption and use of cyber security mechanisms?
  • Security mechanisms available in most control system products 
  • Security capabilities for installation and configuration of these technical capabilities
  • Mention that there are standards for this plus an associated IEC certification program for these technical mechanisms and procedural capabilities
  • Risk assessments used to determine which of these mechanisms and capabilities are appropriate for a site 
  • These mechanisms and capabilities are like seat belts, they are incorporated into vendor offerings, but need to be used. Adoption is slow for a number of reasons that must be addressed. Like seat belts, most of us have never really needed them, but the risks are too high not to use them.



Speakers
avatar for Lee Neitzel

Lee Neitzel

Cyber Security Consultant, IEC
Lee Neitzel is a cyber security consultant who has been involved in security and network standards for more than 30 years. He is currently the convenor of the working groups that are developing the IEC 62443 security standards and their associated conformance assessment programs within... Read More →


Wednesday September 19, 2018 2:30pm - 3:00pm
Citizen Hotel 926 J Street Sacramento, California 95814

3:30pm

Working Group Break-out Sessions
How can Asset Owners Transform their Mindset to Become Security Focused?
- To what extent is security an afterthought to operational availability? Lee: does security interfere or compete with operations
- The importance of a holistic understanding of security at different organisational levels
-  What are the steps that can be taken to make meaningful progress towards adopting a security minded approach?
- How will security impact work practices, user behavior, and user attitudes?
Led by David Hanlon
Why Configuration Management Strategy is Essential to Security
- Secure out of the box is a myth
- Understanding that user capability is essential to security and acting accordingly
- What essential steps need to be taken to effectively manage accounts, administrators and patching to ensure our systems are secure
- How much configuration is necessary to customize security features for a site?
- How does the asset owner know what needs to be configured and what values are necessary?
Led by Lee Neitzel
Are we on the right trajectory to develop a framework for secure and efficient ICS technology?
- What is the current state of ICS security and what are the fundamental challenges we face in the immediate and near-term future?
- How well are we developing standards that govern the balance of interoperability and diversity required of ICS technology to achieve operational excellence and security?
- Where should we draw the lines between transparency and privacy to optimise our resilience to risk?
- What steps do we need to take to defend the future?
What measures need to be taken to address the inadequacy of the resource stream at entry and mid-career level?
- What is currently in place to incentivize relevant skills development?
- Where are we lacking the necessary infrastructure to develop short, medium and long-term skills development in both the public and private sectors?
- What does a fit for purpose training and development standard look like?
- What objectives should be set and how can we sell the benefits of new initiatives?
Led by Tim Yardley
What needs to be prioritised to move towards more effective collection, processing and escalation of information on threats?
- How well defined is the threshold at which private sector threat information should be escalated to government authorities, and can we agree first on what should and must be shared?
- What do the mechanics of an effective information sharing infrastructure look like?
- To what extent do we have the national and transnational infrastructure in place to facilitate effective conversations?
How can the public sector better support a defined supply chain risk management strategy?
- What standards are currently available to define configuration management requirements across the supply chain?
- Do we need further regulation to attribute accountability, or can the market successfully self-regulate?
- What are the key points we need to address to reach agreement between public and private entities on a functional process to address supply chain risk?
- How do we move forward with measures to better facilitate supply chain management in partnership?

Wednesday September 19, 2018 3:30pm - 5:00pm
Citizen Hotel 926 J Street Sacramento, California 95814

5:00pm

Working Group Presentations
Speakers
avatar for David Hanlon

David Hanlon

Secretary of the IEC Conformity Assessment Board, IEC
In his current role as Secretary of the IEC Conformity Assessment Board, based in Geneva Switzerland, David liaises with many international organizations and presents at international events on various topics including cybersecurity. David holds a Bachelor in Electrical Engineering from... Read More →
avatar for Lee Neitzel

Lee Neitzel

Cyber Security Consultant, IEC
Lee Neitzel is a cyber security consultant who has been involved in security and network standards for more than 30 years. He is currently the convenor of the working groups that are developing the IEC 62443 security standards and their associated conformance assessment programs within... Read More →
avatar for Andre Ristaino

Andre Ristaino

Managing Director, ISA Security Compliance Institute
Andre Ristaino is managing director of the ISA Automation Standards Compliance Institute (ASCI) based in Research Triangle Park, N.C. He provides staff leadership for ISA’s conformance certification programs, including the ISASecure IACS certification program managed under the ISCI... Read More →
avatar for Tim Yardley

Tim Yardley

Senior Associate Director of Technology and Workforce Development, Information Trust Institute, Information Trust Institute at Illinois
Tim Yardley is the Senior Associate Director of Technology and Workforce Development and a Senior Researcher at the Information Trust Institute at the University of Illinois Urbana-Champaign. His primary duties focus on defining the vision and direction for applied research through... Read More →


Wednesday September 19, 2018 5:00pm - 5:15pm
Citizen Hotel 926 J Street Sacramento, California 95814
 

Twitter Feed