Industrial Cyber Security

Monday, October 24, 2022 — 8:00 AM- 4:30 PM

This ever-changing technology landscape provides a fertile battleground for cyber threats and attacks.

Agenda

8:00 am
Int’l Soc. of Automation: ISASecure intro & overview of ISA/IEC 62443 solution sets for Systems (3-1, 3-2, 3-3) and Components (4-1, 4-2)

Andre Ristaino, Managing Director, ISA

Full Description Coming Soon!


9:00 am
Idaho Nat. Labs (INL) overview of cybersecurity research, ICS COP w/focus on Cyber-CHAMP

Glenn Merrell, Owner & Freelance Consultant, Industrial Control System Security
Dr. Shane D. Stailey, Organizational Cybersecurity Development & Training Strategist, Idaho National Laboratory

Problem Statement: There is a pervasive talent deficit in the cybersecurity industry that prevents employers from being able to fill their open positions effectively. Additionally, it is often very difficult for employers to understand how to upskill current employees to work in cyber, and/or maintain appropriate levels of cyber cognizance and competency within their organization.

Contribution:  The Cyber-Competency Healthy and Maturity Progression (Cyber-CHAMP©) model provides a customized solution for businesses to:

  1. Understand their security gaps
  2. Align the organization to close on current security gaps
  3. Align education/training needs to fulfill security gaps
  4. Continually monitor and improve by having at the ready, cybersecurity workforce development visuals, metrics, and measurements

Rationale: The Cyber Security Framework for Improving Critical Infrastructure Security (CSF) v1.1 does not offer a measurement of cybersecurity maturity or clear methods to ascertain an organization’s current risk profile.  Cyber-CHAMP© provides several visuals products, metrics, and measurements to help an organization build their current and target risk profiles.  The NICE Workforce Framework provides a structure for planning an IT cybersecurity workforce, but OT aspects of IT security are only briefly discussed.  The Cyber-CHAMP© framework provides a structure to examine competencies across an organization’s workforce, which includes IT, OT, … roles.  Current frameworks do not offer next steps to increase an organization’s cybersecurity.  The Cyber-CHAMP framework offers recommendations and roadmaps for improvement, across the organization, to increase the organization’s cybersecurity via improving the cyber cognizance and competency of individuals across the organization.


10:00 am
Cyber Ranges – For gaining the valuable experience needed now and henceforward

Craig Cocciola, VP Cyber Range Operations, ABL Cyber Range and Academy|
Susan Morris, SVP, Co-Owner, ABL Cyber Academy and Cyber Range

The job roles in both OT and IT Cybersecurity require the highest levels of competency and proficiency in situational awareness, critical thinking, and job role task specific actions.

Education through a cyber range supports multiple cyber strategies. Cases in point: 

Cyber ranges are different in terms of quality, price, and ability to customize.  With new ranges regularly arriving on the market, more than ever, due diligence is required before choosing a range product.

An OT cybersecurity range is one of the most invaluable tools for hands on learning transfer and skills building. The most valuable and compelling cyber range must offer the learner industry specific training, relevant to the job role being performed, and the range design must have:

Close: ABL Range Demo


11:00 am
Dunwoody Presentation:  New OT Cybersecurity & Cloud Computing Initiatives

E.J. Daigle, Dean of Robotics & Manufacturing, Dunwoody College of Technology
Julie McFadden, Director of Computer Technology Problems, Dunwoody College of Technology

Cybersecurity, compliance, and risk have become the world’s most pressing issues. Lack of shared norms, rampant cybercrime, uneven knowledge and competency, and the threat landscape of connected devices create pressing challenges for the future.  Drawing on Dunwoody College of Technology’s national acclaim, expertise, and programs in both Information Technology (IT) and Operational Technology (OT), the New Cybersecurity Initiatives steps into this landscape, highlighting the recent teaming of Dunwoody’s computer and industrial automation programs to bridge the gap between IT and OT cybersecurity.  This session will include a demonstration of Dunwoody’s newest educational asset, the Process Controls & Instrumentation Lab, that provides students and educators the opportunity to play out real-world scenarios, preparing the next generation of cybersecurity graduates and practitioners for immediate impact across industries and critical infrastructure.


11:50 am
Break


1:00 pm

ISA Deeper Dive: Working Group 10 Details and new Technical Report Rollout

Glenn Merrell, Owner & Freelance Consultant, Industrial Control System Security
Dr. Shane D. Stailey, Organizational Cybersecurity Development & Training Strategist, Idaho National Laboratory

Full Description Coming Soon!   


2:00 pm

INL Cyber-CHAMP© Use Cases 

Glenn Merrell, Owner & Freelance Consultant, Industrial Control System Security
Dr. Shane D. Stailey, Organizational Cybersecurity Development & Training Strategist, Idaho National Laboratory

The need for cybersecurity workforce development (in OT, in IT…) to bolster/build:

Current state of cybersecurity workforce development

Use cases for improving cybersecurity workforce development in the following Critical Infrastructure sectors (as Cyber-CHAMP process has been applied), with more Adopters “coming to the party” all the time:


3:00 pm

ABL Virtual Cyber Range Implementation Details

Craig Cocciola, VP Cyber Range Operations, ABL Cyber Range and Academ
Susan Morris, SVP, Co-Owner, ABL Cyber Academy and Cyber Range

Each organization, college, and university require an implementation plan, unique to their sector, OT or IT systems, and current state of cyber OT and/or IT workforce competence.

The foundational tenet of a range implementation plan is the alignment of supporting organizations who interconnect for success assurance.

The common steps for a range implementation across industries and sectors will be presented and discussed in three basic steps:

Subordinate steps will change based on the organization’s and/or educational institution’s current and desired state of skills offerings and workforce development strategies and paths.

A Cyber Range may be out of reach for many SMB’s (Small-Medium Businesses) and ABL has implemented a Virtual Cyber Range configurable to most IT scenarios and now growing into OT. Cybersecurity for Critical Infrastructure.  This subscriber service is a flexible model enabling customized content creation.  Please join us to learn more and make a connection.


4:00 pm

A Roundtable discussion: What do Critical Infrastructure Executives, Managers & Technologists see as their three (3) highest priority OT cybersecurity challenges?

E.J. Daigle, Dean of Robotics & Manufacturing, Dunwoody College of Technology
Julie McFadden, Director of Computer Technology Problems, Dunwoody College of Technology

Bring your cybersecurity knowledge and desires to the next generation of IT/OT professionals.   

Dunwoody’s educators and curriculum planners in Computer Science, Robotic & Manufacturing, and Building Automation & Management are collaborating on a new OT Cybersecurity & Cloud Computing College to create graduate-resources who can make positive and more immediate impact to their employer’s overall cybersecurity stance. 

Dunwoody College of Technology has the legacy, resources, and associations to work directly with your company to structure vocational workforce development with training, education, and certification. They have a historically 100% hire rate of Engineering graduates trained to be hands-on ready for work challenges from Day-1.  Georgetown University’s recent study of colleges with fast ROI of their student’s education investment ranked Dunwoody College of Technology #2 in the nation (A First Try at ROI: Ranking 4,500 Colleges – CEW Georgetown).

This roundtable focus group will allow attendees to help characterize the current state of the IT/OT cybersecurity landscape. Dunwoody faculty are looking to define the next level of cybersecurity competencies as we develop new courses, certificates, and degrees that better align to industry needs.

Come join the Roundtable discussion in person on Monday Oct 24th or virtually from the comfort of your home office or beach hut!

Networking Reception in EXPO

Join us after the Seminar in the EXPO Hall to network with fellow attendees and connect with our Solutions Strategy Partners.

Thank you to our Seminar Supporters


Program Co-chairs

Tom Smertneck, ISA
Paul Veeneman, Beryllium InfoSec Collaborative


Sponsorship Opportunities

To learn about available sponsorship opportunities, contact Jennifer Churchill at 763-548-1306 or jennifer.churchill@eventshows.com.