TUESDAY, NOVEMBER 6TH
5:30PM – 7:00PM
WEDNESDAY, NOVEMBER 7TH
All sessions will take place in the Howe Room (33rd floor).
7:30AM – 8:30AM
Location: The Terrace (33rd floor)
Implementing the Cybersecurity Framework
Ernie Begin, Director of Information Security, Kaman Corporation
How can you measure your cybersecurity posture? What is your IT risk tolerance? Are our cybersecurity practices mature enough? Hear how Kaman, a mid-sized provider of aerospace and industrial solutions, identified and implemented the Cybersecurity Framework from an IT policy perspective, how they measure their cybersecurity maturity, and how they plan to communicate that to their suppliers and customers.
8:30AM – 9:15AM
9:15AM – 10:15AM
GDPR: Six Months Later — Are You Prepared for What’s Next?
Fred Hobbs, Hyster-Yale Cyber Security Director and Nuvera IT Manager, Hyster-Yale Group
The rush to the May 25th deadline is over. Now what? This session will look forward into the future of PII risk, new regulations outside of Europe, what a breach looks like, and what 72 hour breach notification really means. Be prepared for an interactive discussion concerning this paradigm shift occurring with personal data security.
10:15AM – 10:30AM
10:30AM – 11:15AM
Cybersecurity KPIs: Reporting to the Board of Directors
Brian Cyphert, Chief Information Security Officer / Executive Director of Global IT Infrastructure, MSA Safety Inc.
In this session, we will discuss the difference between CISO and Board of Directors KPIs and have an open discussion regarding the variation of relevant KPIs among the company representatives in attendance.
11:15AM – 12:15PM
12:15PM – 1:15PM
Location: The Terrace (33rd floor)
Securing Critical Infrastructure
Wayne Dennis, Security Lead – Products, Accenture
Internet connected systems are vulnerable to attack 24/7 from anywhere in the world and the economic disruption caused by a successful attack on critical infrastructure means that controlling systems are the main target for attackers. The cost and complexity of industrial control systems used to operate critical infrastructure have extremely long lifespans meaning that the security mechanisms might not have been included or accounted for. Organizations need to be aware of the risks within CI and have the toolkit necessary to defend and mitigate against attacks.
1:15PM – 2:00PM
2:00PM – 3:00PM
Join fellow manufacturing leaders in the cyber space to discuss the issues important to you. Have candid conversations with peers to help you solve your most pressing challenges. Attendees will have the opportunity to provide suggestions for discussion topics.
3:00PM – 3:15PM
3:15PM – 4:00PM
Manufacturing 4.0: What’s Next for Cybersecurity
Vincent M. Voci, Cyber Policy Director, Cyber, Intelligence, and Security Division, U.S. Chamber of Commerce
Cyber risk continues to be a front-of-mind issue for businesses of all stripes, and the incessant pace of new breaches and the resulting string of regulations ensure that this will be the case for the foreseeable future. While once viewed in terms of absolutes, more companies are looking at cyber risk management along a continuum of risk and reward and are deploying time-proven methods of quantitative risk management to the cyber problem. This session will discuss developments in the world of regulation and enforcement, as well as the way in which quantitative methods can be used to measure, predict, and mitigate risk in the uncertain world of cyber security.
*Agenda is subject to change.