Agenda*

 

TUESDAY, NOVEMBER 6TH

5:30PM – 7:00PM

Welcome Reception 
Location: Iron Hill Brewery & Restaurant

WEDNESDAY, NOVEMBER 7TH

All sessions will take place in the Howe Room (33rd floor).

7:30AM – 8:30AM

Breakfast
Location: The Terrace (33rd floor)

Implementing the Cybersecurity Framework

  • Ernie Begin, Director of Information Security, Kaman Corporation

How can you measure your cybersecurity posture? What is your IT risk tolerance? Are our cybersecurity practices mature enough? Hear how Kaman, a mid-sized provider of aerospace and industrial solutions, identified and implemented the Cybersecurity Framework from an IT policy perspective, how they measure their cybersecurity maturity, and how they plan to communicate that to their suppliers and customers.

8:30AM – 9:15AM

9:15AM – 10:15AM

GDPR: Six Months Later — Are You Prepared for What’s Next?

  • Fred Hobbs, Hyster-Yale Cyber Security Director and Nuvera IT Manager, Hyster-Yale Group

The rush to the May 25th deadline is over. Now what? This session will look forward into the future of PII risk, new regulations outside of Europe, what a breach looks like, and what 72 hour breach notification really means. Be prepared for an interactive discussion concerning this paradigm shift occurring with personal data security.

10:15AM – 10:30AM

Break 

10:30AM – 11:15AM

Cybersecurity KPIs: Reporting to the Board of Directors

  • Brian Cyphert, Chief Information Security Officer / Executive Director of Global IT Infrastructure, MSA Safety Inc.

In this session, we will discuss the difference between CISO and Board of Directors KPIs and have an open discussion regarding the variation of relevant KPIs among the company representatives in attendance.

11:15AM – 12:15PM

Ransomware and the Rise of Cybersecurity Insurance

12:15PM – 1:15PM

Lunch
Location: The Terrace (33rd floor)

Securing Critical Infrastructure

Internet connected systems are vulnerable to attack 24/7 from anywhere in the world and the economic disruption caused by a successful attack on critical infrastructure means that controlling systems are the main target for attackers. The cost and complexity of industrial control systems used to operate critical infrastructure have extremely long lifespans meaning that the security mechanisms might not have been included or accounted for. Organizations need to be aware of the risks within CI and have the toolkit necessary to defend and mitigate against attacks.

1:15PM – 2:00PM

2:00PM – 3:00PM

Ignite Session

Join fellow manufacturing leaders in the cyber space to discuss the issues important to you. Have candid conversations with peers to help you solve your most pressing challenges. Attendees will have the opportunity to provide suggestions for discussion topics.

3:00PM – 3:15PM

Break

3:15PM – 4:00PM

Manufacturing 4.0: What’s Next for Cybersecurity

  • Vincent M. Voci, Cyber Policy Director, Cyber, Intelligence, and Security Division, U.S. Chamber of Commerce

    Cyber risk continues to be a front-of-mind issue for businesses of all stripes, and the incessant pace of new breaches and the resulting string of regulations ensure that this will be the case for the foreseeable future. While once viewed in terms of absolutes, more companies are looking at cyber risk management along a continuum of risk and reward and are deploying time-proven methods of quantitative risk management to the cyber problem.  This session will discuss developments in the world of regulation and enforcement, as well as the way in which quantitative methods can be used to measure, predict, and mitigate risk in the uncertain world of cyber security.


*Agenda is subject to change.