Image

Agenda


Note: Subject to change

Theme: Navigating change, uncertainty and threats to energy and beyond: Safeguarding critical infrastructure from cyber-physical attacks

Monday, June 2, 2025

9:00 am - 5:00 pm
EC Council Workshop: Introduction to ICS/SCADA Cybersecurity

A full-day hands-on course hosted by EC Council covering fundamentals of ICS/SCADA threat analysis, network design, and incident response within a realistic simulated ICS environment.
> View agenda

Tuesday, June 3, 2025

8:00 - 9:00 am
Welcome Continental Breakfast & Coffee

9:00 - 10:15 am
Addressing the Culture Chasm Between CISO and Ops: Who is in Charge of OT Cybersecurity?

This session brings together OT cybersecurity experts to explore the cultural and operational divide between traditional IT security leadership and on-the-ground operations teams in the realm of OT cybersecurity. Panelists will examine how the differing priorities and mindsets of CISOs and operational teams contribute to a persistent "culture chasm" and discuss innovative strategies for bridging these gaps. By delving into real-world challenges and case studies, the session will clarify who should be accountable for OT cybersecurity and outline actionable approaches for aligning risk management, operational resilience, and effective decision-making across organizational boundaries.

Joe Weiss
Chair
Joe Weiss
Managing Partner
Applied Control Solutions, LLC
profile
Nadine Miller
Nadine Miller
Founder & CEO
Tinkerer Borg LLC
profile
Sai Molige
Sai Molige
Sr. Manager of Threat Hunting
Forescout Technologies
profile

10:15 - 10:45 am
Networking Coffee Break

10:45 - 12:15 pm
Cybersecurity for Operational Technology

This panel delves into the unique challenges and evolving threat landscape facing industrial environments and critical infrastructure. Experts will explore best practices for securing OT networks -- from robust asset management and network segmentation to real-time monitoring and tailored incident response strategies -- while addressing the complexities of integrating IT and OT security cultures. Attendees will gain practical insights into mitigating risks associated with legacy systems, regulatory compliance, and operational constraints, equipping them with actionable strategies to enhance the resilience and continuity of their critical operational systems.

Brian Burnett
Chair
Brian Burnett
Director of Cybersecurity, Business Information and Technology Services
North Carolina's Electric Cooperatives
profile
Emma Stewart
Dr. Emma Stewart
Director, Center for Securing Digital Energy Technology
Idaho National Laboratory
profile
Shane McFly
Shane McFly
Senior Cybersecurity Researcher
National Renewable Energy Laboratory (NREL)
profile

12:15 - 1:15 pm
Lunch Break
 
TRACK A

1:15 - 2:15 pm
Gen AI and Agentic AI Usage in ICS Cybersecurity

This session discusses the use of GEN AI and Agentic AI in industrial control systems cybersecurity. GenAI can be used to simulate attacks, generate threat scenarios, and assist with policy and vulnerability management. Agentic AI focuses on autonomous tasks and their orchestration in cybersecurity systems. Large Language Models and Digital Twins are the backbone of these systems. After setting this background, we will focus on how Microsoft is dealing with common AI attacks that occur in GEN AI and Agentic AI systems. Through live demos, we will explain how an organization should safeguard against AI-driven risks in Gen AI and Agentic AI applications.

Ramesh Reddi
Ramesh Reddi
Chief Technology Officer
CybsecBCML, Inc
profile
Liliane Scarpari
Liliane Scarpari
Sr. Technical Specialist
Microsoft
profile

2:15 - 2:45 pm
AI-Powered Cloud Security: Defending Cloud Workloads from Next-Gen Cyber Threats

As AI-powered cloud workloads continue to scale, so do sophisticated cyber threats targeting AI models, cloud infrastructure, and data pipelines. Adversarial AI attacks, cloud misconfigurations, and automated malware are evolving, forcing security teams to rethink their defensive strategies. This session will highlight real-world attack scenarios and defense mechanisms, including securing generative AI models against adversarial attacks, AI-driven threat detection, and Zero Trust architectures for AI workloads. Attendees will walk away with actionable strategies to protect AI applications and cloud environments from next-gen threats.

Key Takeaways:
  • Understand the latest AI-driven cloud threats (adversarial AI, model poisoning, API attacks)
  • Learn security best practices for AI-hosted cloud applications
  • Explore AI-powered threat detection and Zero Trust security models
  • Analyze real-world security incidents involving AI workloads
  • Gain hands-on knowledge of AI security defense strategies for DevSecOps teams
Advait Patel
Advait Patel
Senior Site Reliability Engineer
Broadcom
profile
 
TRACK B

1:15 - 1:45 pm
Golden Rules for Industrial Cybersecurity

In today's evolving threat landscape, industrial environments face unique cybersecurity challenges that require more than just compliance -- they demand resilience. This session outlines the golden rules of industrial cybersecurity, combining strategic principles with practical implementation guidance. The presentation will explore leading frameworks such as IEC 62443 and the NIS T Cybersecurity Framework and show how they support a risk-based approach to securing Operational Technology (OT). Attendees will learn why asset visibility, network segmentation, and continuous risk assessment are foundational pillars of a strong cybersecurity posture.

The session will also tackle the often-overlooked challenge of aligning regulatory compliance (e.g., the Cyber Resilience Act, Machinery Directive) with real-world security needs -- bridging the gap between paperwork and protection. To ground these principles in reality, the session will analyze recent cyber-physical incidents in the U.S., including ransomware attacks on critical infrastructure. These cases will illustrate common vulnerabilities in industrial control systems (ICS), their operational impacts, and what we can learn from them.

Key Insights:

  • Practical insights into IEC 62443 and NIST CSF application in OT
  • Strategies for risk-based assessment and security mitigation
  • Approaches to aligning compliance requirements with actual protection
  • Lessons from real-world ransomware and ICS compromise incidents

Floris Duvekot
Floris Duvekot
Director of Cybersecurity & Integration
Bureau Veritas
profile

1:45 - 2:15 pm
Why VLANs Are a Poor Network Segmentation Solution in Industrial ICS/SCADA Environments

VLANs are a legacy solution that fail to meet the security and scalability demands of modern ICS/SCADA environments. They introduce significant risks due to misconfigurations, lack of visibility, and poor security segmentation. Additionally, protocols like 802.1x are outdated, overly complex, and no one likes them.

This session will break down why zero-trust principles -- built on segmentation, continuous verification, and least-privilege access -- are critical for securing operational technology. We'll explore how scalable solutions like proxy-based architectures, software-defined DMZs, and application-layer firewalls (L7) are replacing VLANs as the new standard for robust network security.

Florian Doumenc
Florian Doumenc
CEO
Trout Software
profile

2:15 - 2:45 pm
APT Group Attack Method Commonalities Against Critical Infrastructure

APT groups such as Typhoon have consistently exploited identity and access gaps across critical IT and OT systems leading to significant monetary and reputational damages. These breaches led to a dizzying array of new guidelines from federal agencies like NIST, CISA, and the EPA aimed at protecting US critical infrastructure from these emerging and dangerous threats.

In this session, Dr. Ymir Vigfussion compares real-world attack patterns against current federal guidance to uncover a critical insight: APT groups continue to succeed -- not because defenders lack standards, but because those standards don't address the attackers' preferred path. Fortunately, the research also points to an efficient way to detect and block APTs before they reach sensitive systems.

This session will cover:
  • The most common methods and protocols exploited by state-sponsored attackers and other APT groups
  • An analysis of the 2024-2025 best practices for critical infrastructure from CISA, NIST, and the EPA
  • The most efficient and effective detection point and method to stop APT groups
Dr. Ymir Vigfusson
Dr. Ymir Vigfusson
Professor of Computer Science, Emory University
CTO, Keystrike
profile

2:45 - 3:15 pm
Networking Coffee Break

3:15 - 4:15 pm
Next-Generation Cybersecurity Standards -- Bridging IEC 62443 and TEIA for Industrial IoT Security

As industrial control systems evolve, so must our approach to securing them. This panel brings together leading experts to explore how integrating IEC 62443's system-level security with TEIA's device-level trust model creates a comprehensive, zero-trust architecture for industrial IoT. Panelists will share real-world case studies, tackle key integration challenges, and provide practical strategies for securing IT/OT environments. Join us to gain actionable insights on leveraging these complementary standards to enhance resilience, scalability, and interoperability in critical infrastructure cybersecurity.

Julian Durand
Julian Durand
Chief Security Officer and Senior Vice President
Intertrust
profile
Bruce Tulloch
Bruce Tulloch
Director, Intelligent Systems
Mayman Aerospace
Senior Technology Advisor
JERA Co., Inc.
profile

4:15 - 4:45 pm
Securing Critical Infrastructure: A Case Study in Proactive Exposure Management

In today's landscape of escalating cyber threats, ensuring the security of critical infrastructure is paramount. This presentation will share a case study exploring how a leading U.S. energy provider, operating a vast and complex IT/OT environment, successfully addressed significant security gaps. Faced with the challenge of maintaining essential electrical services while mitigating risks from sophisticated cyberattacks and system failures, the organization requires comprehensive network visibility and proactive threat management.

Attendees will learn how integration with diverse IT/OT systems and advanced analytics capabilities enable the energy provider to achieve superior clarity on exposures and risks, strengthening their defense and highlighting the importance of proactive exposure management and the transformative impact of leveraging advanced network security solutions in high-risk environments.

Dr. Mike Lloyd
Dr. Mike Lloyd
CTO
RedSeal Networks
profile

5:00 - 6:30 pm
Networking Reception

6:30 - 8:30 pm
Drinks & Dinner co-hosted by Bureau Veritas and Business France

Fireside Chat: Regulatory Shifts & Business Resilience: What Cybersecurity Leaders Need to Know
As global frameworks like NIS2, DORA, the EU AI Act, and CMMC reshape the compliance landscape, leaders must adapt fast to stay secure, competitive, and compliant. Join us for a practical and engaging conversation on how to navigate these regulatory shifts using international standards and build true business resilience.
  • 6:30 pm -- Arrival & Welcome Drinks
  • 7:00 pm -- Opening Words
  • 7:10 pm -- Fireside Chat with Floris Duvekot
  • 7:30 pm -- Networking Cocktail and Dinner
  • 8:30 pm -- Closing
Space is limited and registration is required. Register here


Wednesday, June 4, 2025

8:00 - 9:00 am
Coffee and Continental Breakfast

9:00 - 10:15 am
Cyber Risk Assessment and Development for Distributed Energy Resources

This session discusses methodologies for assessing cyber risks specific to DER environments, focusing on vulnerabilities inherent in interconnected renewable energy assets such as solar panels, wind turbines, and energy storage systems. Panelists will cover risk modeling, threat identification, and the development of tailored cybersecurity strategies to mitigate potential attacks that could disrupt grid stability. Gain insights into best practices for integrating cyber risk management into the development and deployment of DERs, ensuring a secure and resilient transition to decentralized energy generation.

Dr. Chee-Wooi Ten
Chair
Dr. Chee-Wooi Ten
Professor, Electrical and Computer Engineering
Director, Center for Cyber-Physical Systems
Michigan Tech
profile
Jim Harmening
Jim Harmening
Director of Cyber and Risk Management
Illinois Commerce Commission
profile
Larry Truong
Larry Truong
Product Manager for Solar & Energy Storage
Toshiba Mitsubishi-Electric Industrial Systems Corporation
profile

10:15 - 10:45 am
Networking Coffee Break

10:45 am - 12:00 pm
IT/OT Convergence: Cyber-Informed Engineering and Engineering-Informed Threats

This session explores the dynamic intersection of IT and OT environments by examining how cyber-informed engineering is reshaping system design and resilience, while also highlighting how engineering insights can drive more accurate threat modeling-what we term engineering-informed threats. Panelists will discuss strategies for integrating IT's data-driven analytics with OT's real-time operational demands, sharing case studies on how converged systems can proactively anticipate and mitigate cyber risks. Attendees will learn how to embed cybersecurity into the very fabric of engineering processes and, conversely, use engineering principles to refine threat detection and response, ultimately building robust, resilient infrastructures in an increasingly interconnected industrial landscape.

Dr. Chee-Wooi Ten
Chair
Dr. Chee-Wooi Ten
Professor, Electrical and Computer Engineering
Director, Center for Cyber-Physical Systems
Michigan Tech
profile
Tobias Whitney
Tobias Whitney
President and CEO
Cumulys
profile
Ruchi Rajasekhar
Ruchi Rajasekhar
Principal Advisor, Strategic Innovations
Midcontinent Independent System Operator (MISO)
profile
Carter Manucy
Carter Manucy
Director, Cybersecurity
National Rural Electric Cooperative Association (NRECA)
profile
Sam Chanoski
Sam Chanoski
Technical Relationship and Program Development | Cybercore Integration Center
Idaho National Laboratory
profile

12:00 - 1:00 pm
Lunch Break

1:00 - 2:15 pm
Resisting the Weaponization of the Energy Network

This panel will delve into emerging challenges such as vulnerabilities in distributed energy resources, the cybersecurity risks associated with IoT-enabled smart grids and peer-to-peer energy trading platforms, and the sophisticated techniques employed by state-sponsored adversaries. Power-based cyber attacks, Aurora attacks (eg., opening / closing breakers out of phase with the grid), and Volt/VAR attacks will be discussed, as will the integration of AI for threat analysis and the adoption of "secure by design" principles to fortify energy systems against weaponization. The session will also emphasize the need for coordinated public-private partnerships and policy innovations to ensure resilient, future-proof energy networks.

Patrick Miller
Chair
Patrick Miller
CEO
Ampyx Cyber
profile
Dr. Taesic Kim
Dr. Taesic Kim
Associate Professor, Electrical Engineering and Computer Science
University of Missouri
profile
Joe Weiss
Joe Weiss
Managing Partner
Applied Control Solutions, LLC
profile

2:15 - 2:45 pm
Coffee Break

2:45 - 4:00 pm
Risk Management Business Case

Escalating liability risks associated with data breaches in ICS/SCADA environments can lead to severe legal and financial repercussions. Focusing on the risk management business case, panelists will discuss how vulnerabilities in industrial control systems not only jeopardize operational continuity but also expose organizations to regulatory fines, litigation costs, and reputational damage. By analyzing real-world incidents and regulatory frameworks, the discussion will provide strategies to quantify potential breach liabilities and build a compelling business case for investing in advanced cybersecurity controls.

Scott Morris
Scott Morris
Senior Vice President, Technology and Security
The Beckage Firm
profile
Dr. Sanju Abraham
Dr. Sanju Abraham
Chief Technology Officer
kWh Analytics
profile
K. Dixon Wright
K. Dixon Wright
President
SRC Digital Insurance Services
profile