The ICS Risk & Vulnerability Lan... 10:00am - 10:30am
Assessment Done, Now What? How t... 10:30am - 11:00am
[Panel] Stories from the Edge 11:00am - 11:45am
Using Attack Path Mapping to Reduce Risk and Cos... 12:00pm - 12:45pm
SAE G-32 Cyber-Physical System S... 12:45pm - 1:15pm
What Does a Complete OT Security... 1:30pm - 2:00pm
Bringing OT & IT Together for Stronger Integrate... 2:45pm - 3:30pm
Break - Visit Expo...
Managing Your Risk Through Situa... 10:00am - 10:30am
Making Threat Modeling Work Acro... 10:20am - 10:50am
Open Security – From Patchwork t... 11:00am - 11:30am
What Your ICS/DCS/SCADA Vendor Doesn’t Want You... 11:30am - 12:15pm
Defining the Next-Generation of Security as IT a... 12:30pm - 1:15pm
Zero Trust Industrial Control - What Can We Lear... 3:00pm - 3:45pm
Identifying Process Structure an... 1:15pm - 1:45pm
Developing a Critical Infrastruc... 2:30pm - 3:00pm
ICS Attacks Aren't Evolving, They Are Devolving 10:30am - 11:15am
IT vs. OT: Comparing Process Control Room and SO... 11:15am - 12:00pm
Mitigating OT Cyber Risk by Securing the OT Netw... 12:15pm - 1:00pm
[Encore] From the Trenches: OT Security Transfor... 3:15pm - 4:00pm
[Encore] Fireside Chat With Admiral Mike Rogers 3:15pm - 4:00pm