Image

Agenda


Note: Subject to change

Theme: Navigating change, uncertainty and threats to energy and beyond: Safeguarding critical infrastructure from cyber-physical attacks

Monday, June 2, 2025

9:00 am - 5:00 pm
EC Council Workshop: Introduction to ICS/SCADA Cybersecurity

A full-day hands-on course hosted by EC Council covering fundamentals of ICS/SCADA threat analysis, network design, and incident response within a realistic simulated ICS environment.
> View agenda

Tuesday, June 3, 2025

8:00 - 9:00 am
Welcome Continental Breakfast & Coffee

9:00 - 10:15 am
Addressing the Culture Chasm Between CISO and Ops: Who is in Charge of OT Cybersecurity?

This session brings together OT cybersecurity experts to explore the cultural and operational divide between traditional IT security leadership and on-the-ground operations teams in the realm of OT cybersecurity. Panelists will examine how the differing priorities and mindsets of CISOs and operational teams contribute to a persistent "culture chasm" and discuss innovative strategies for bridging these gaps. By delving into real-world challenges and case studies, the session will clarify who should be accountable for OT cybersecurity and outline actionable approaches for aligning risk management, operational resilience, and effective decision-making across organizational boundaries.

Joe Weiss
Chair
Joe Weiss
Managing Partner
Applied Control Solutions, LLC
profile
Nadine Miller
Nadine Miller
Founder & CEO
Tinkerer Borg LLC
profile
Sai Molige
Sai Molige
Sr. Manager of Threat Hunting
Forescout Technologies
profile

10:15 - 10:45 am
Networking Coffee Break

10:45 - 12:15 pm
Cybersecurity for Operational Technology

This panel delves into the unique challenges and evolving threat landscape facing industrial environments and critical infrastructure. Experts will explore best practices for securing OT networks -- from robust asset management and network segmentation to real-time monitoring and tailored incident response strategies -- while addressing the complexities of integrating IT and OT security cultures. Attendees will gain practical insights into mitigating risks associated with legacy systems, regulatory compliance, and operational constraints, equipping them with actionable strategies to enhance the resilience and continuity of their critical operational systems.

Brian Burnett
Chair
Brian Burnett
Director of Cybersecurity, Business Information and Technology Services
North Carolina's Electric Cooperatives
profile
Emma Stewart
Dr. Emma Stewart
Director, Center for Securing Digital Energy Technology
Idaho National Laboratory
profile
Katherine Hutton
Katherine Hutton
Cybersecurity Product Manager
Fluence
profile
Shane McFly
Shane McFly
Senior Cybersecurity Researcher
National Renewable Energy Laboratory (NREL)
profile

12:15 - 1:15 pm
Lunch Break

1:15 - 1:45 pm
AI-Powered Cloud Security: Defending Cloud Workloads from Next-Gen Cyber Threats

As AI-powered cloud workloads continue to scale, so do sophisticated cyber threats targeting AI models, cloud infrastructure, and data pipelines. Adversarial AI attacks, cloud misconfigurations, and automated malware are evolving, forcing security teams to rethink their defensive strategies. This session will highlight real-world attack scenarios and defense mechanisms, including securing generative AI models against adversarial attacks, AI-driven threat detection, and Zero Trust architectures for AI workloads. Attendees will walk away with actionable strategies to protect AI applications and cloud environments from next-gen threats.

Key Takeaways:
  • Understand the latest AI-driven cloud threats (adversarial AI, model poisoning, API attacks)
  • Learn security best practices for AI-hosted cloud applications
  • Explore AI-powered threat detection and Zero Trust security models
  • Analyze real-world security incidents involving AI workloads
  • Gain hands-on knowledge of AI security defense strategies for DevSecOps teams
Advait Patel
Advait Patel
Senior Site Reliability Engineer
Broadcom
profile

1:45 - 2:15 pm
Why VLANs Are a Poor Network Segmentation Solution in Industrial ICS/SCADA Environments

VLANs are a legacy solution that fail to meet the security and scalability demands of modern ICS/SCADA environments. They introduce significant risks due to misconfigurations, lack of visibility, and poor security segmentation. Additionally, protocols like 802.1x are outdated, overly complex, and no one likes them.

This session will break down why zero-trust principles -- built on segmentation, continuous verification, and least-privilege access -- are critical for securing operational technology. We'll explore how scalable solutions like proxy-based architectures, software-defined DMZs, and application-layer firewalls (L7) are replacing VLANs as the new standard for robust network security.

Florian Doumenc
Florian Doumenc
CEO
Trout Software
profile

2:15 - 2:45 pm
Use of AI/ML in ICS/SCADA Cybersecurity

This session discusses the crucial role AI and Machine Learning (ML) plays in ICS/SCADA cybersecurity systems. Key areas where AI/ML impacts are threat detection/prevention, incidence detection/response, vulnerability management, data loss prevention, network traffic analysis, risk assessment, and threat modeling. An emerging field is the combined use of digital twin and AI/ML technologies in securing ICS/SCADA systems. Use of GEN AI and AI agents in the ICS/SCADA cybersecurity will also be discussed.

Ramesh Reddi
Ramesh Reddi
Chief Technology Officer
CybsecBCML, Inc
profile

2:45 - 3:15 pm
Networking Coffee Break

3:15 - 4:15 pm
Next-Generation Cybersecurity Standards -- Bridging IEC 62443 and TEIA for Industrial IoT Security

As industrial control systems evolve, so must our approach to securing them. This panel brings together leading experts to explore how integrating IEC 62443's system-level security with TEIA's device-level trust model creates a comprehensive, zero-trust architecture for industrial IoT. Panelists will share real-world case studies, tackle key integration challenges, and provide practical strategies for securing IT/OT environments. Join us to gain actionable insights on leveraging these complementary standards to enhance resilience, scalability, and interoperability in critical infrastructure cybersecurity.

Julian Durand
Julian Durand
Chief Security Officer and Senior Vice President
Intertrust
profile
Bruce Tulloch
Bruce Tulloch
Director, Intelligent Systems
Mayman Aerospace
Senior Technology Advisor
JERA Co., Inc.
profile

4:15 - 4:45 pm
Securing Critical Infrastructure: A Case Study in Proactive Exposure Management

In today's landscape of escalating cyber threats, ensuring the security of critical infrastructure is paramount. This presentation will share a case study exploring how a leading U.S. energy provider, operating a vast and complex IT/OT environment, successfully addressed significant security gaps. Faced with the challenge of maintaining essential electrical services while mitigating risks from sophisticated cyberattacks and system failures, the organization requires comprehensive network visibility and proactive threat management.

Attendees will learn how integration with diverse IT/OT systems and advanced analytics capabilities enable the energy provider to achieve superior clarity on exposures and risks, strengthening their defense and highlighting the importance of proactive exposure management and the transformative impact of leveraging advanced network security solutions in high-risk environments.

Speaker from RedSeal, Inc. TBA

5:00 - 6:30 pm
Networking Reception

Wednesday, June 4, 2025

8:00 - 9:00 am
Coffee and Continental Breakfast

9:00 - 10:15 am
Cyber Risk Assessment and Development for Distributed Energy Resources

This session discusses methodologies for assessing cyber risks specific to DER environments, focusing on vulnerabilities inherent in interconnected renewable energy assets such as solar panels, wind turbines, and energy storage systems. Panelists will cover risk modeling, threat identification, and the development of tailored cybersecurity strategies to mitigate potential attacks that could disrupt grid stability. Gain insights into best practices for integrating cyber risk management into the development and deployment of DERs, ensuring a secure and resilient transition to decentralized energy generation.

Tom Tansy
Chair
Tom Tansy
CEO, DER Security Corp
Chairman, SunSpec Alliance
profile
Jim Harmening
Jim Harmening
Director of Cyber and Risk Management
Illinois Commerce Commission
profile
Larry Truong
Larry Truong
Product Manager for Solar & Energy Storage
Toshiba Mitsubishi-Electric Industrial Systems Corporation
profile

10:15 - 10:45 am
Networking Coffee Break

10:45 am - 12:00 pm
IT/OT Convergence: Cyber-Informed Engineering and Engineering-Informed Threats

This session explores the dynamic intersection of IT and OT environments by examining how cyber-informed engineering is reshaping system design and resilience, while also highlighting how engineering insights can drive more accurate threat modeling-what we term engineering-informed threats. Panelists will discuss strategies for integrating IT's data-driven analytics with OT's real-time operational demands, sharing case studies on how converged systems can proactively anticipate and mitigate cyber risks. Attendees will learn how to embed cybersecurity into the very fabric of engineering processes and, conversely, use engineering principles to refine threat detection and response, ultimately building robust, resilient infrastructures in an increasingly interconnected industrial landscape.

Dr. Chee-Wooi Ten
Chair
Dr. Chee-Wooi Ten
Professor, Electrical and Computer Engineering
Director, Center for Cyber-Physical Systems
Michigan Tech
profile
Tobias Whitney
Tobias Whitney
President and CEO
Cumulys
profile
Ruchi Rajasekhar
Ruchi Rajasekhar
Principal Advisor, Strategic Innovations
Midcontinent Independent System Operator (MISO)
profile
Carter Manucy
Carter Manucy
Director, Cybersecurity
National Rural Electric Cooperative Association (NRECA)
profile
Abubaker Elteriefi
Abubaker Elteriefi, PE
Operational Planning Manager
ITC Holdings Corp.
profile
Sam Chanoski
Sam Chanoski
Technical Relationship and Program Development | Cybercore Integration Center
Idaho National Laboratory
profile

12:00 - 1:00 pm
Lunch Break

1:00 - 2:15 pm
Resisting the Weaponization of the Energy Network

This panel will delve into emerging challenges such as vulnerabilities in distributed energy resources, the cybersecurity risks associated with IoT-enabled smart grids and peer-to-peer energy trading platforms, and the sophisticated techniques employed by state-sponsored adversaries. Power-based cyber attacks, Aurora attacks (eg., opening / closing breakers out of phase with the grid), and Volt/VAR attacks will be discussed, as will the integration of AI for threat analysis and the adoption of "secure by design" principles to fortify energy systems against weaponization. The session will also emphasize the need for coordinated public-private partnerships and policy innovations to ensure resilient, future-proof energy networks.

Dr. Taesic Kim
Chair
Dr. Taesic Kim
Associate Professor, Electrical Engineering and Computer Science
University of Missouri
profile
Patrick Miller
Patrick Miller
CEO
Ampyx Cyber
profile
Tom Tansy
Tom Tansy
CEO, DER Security Corp
Chairman, SunSpec Alliance
profile
Joe Weiss
Joe Weiss
Managing Partner
Applied Control Solutions, LLC
profile

2:15 - 2:45 pm
Coffee Break

2:45 - 4:00 pm
Risk Management Business Case

Escalating liability risks associated with data breaches in ICS/SCADA environments can lead to severe legal and financial repercussions. Focusing on the risk management business case, panelists will discuss how vulnerabilities in industrial control systems not only jeopardize operational continuity but also expose organizations to regulatory fines, litigation costs, and reputational damage. By analyzing real-world incidents and regulatory frameworks, the discussion will provide strategies to quantify potential breach liabilities and build a compelling business case for investing in advanced cybersecurity controls.

Scott Morris
Scott Morris
Senior Vice President, Technology and Security
The Beckage Firm
profile
Dr. Sanju Abraham
Dr. Sanju Abraham
Chief Technology Officer
kWh Analytics
profile
K. Dixon Wright
K. Dixon Wright
President
SRC Digital Insurance Services
profile