SlideShare uma empresa Scribd logo
1 de 22
Baixar para ler offline
accenture.com/OperationNext
Event follow-up
| Advance today, accelerate tomorrow
During this
unparalleled time of
physical distancing,
traditional
collaboration has
been a challenge.
It’s created a void
and we felt it.
Why? That’s the first question my team
asked when I said we were hosting a
summit. It’s a fair question.
Knowledge sharing is a hallmark of the
OT/ICS community. During this
unparalleled time of physical distancing,
traditional collaboration has been a
challenge. It’s created a void and we felt
it. In talking with our clients, our alliance
partners, and even some of our
competitors, the sentiment was echoed
back, loudly.
My response to my team was, why not?
Our mission was to bring together
people from the critical infrastructure
space and provide a forum that offers:
• candid peer-to-peer cross-industry
discussions
• real-world experiences from the field
to the boardroom
• scalable security solutions for future
success
• tangible next steps for building an
OT/ICS security roadmap
What follows are key takeaways from each
session. Bold statements from OT
cybersecurity practitioners based on real-
world experience advancing programs
and surmounting the same challenges
facing your organization.
Review the notes. Share the on-demand
content. And reach out if you’re looking for
a sounding board. Always happy to
collaborate to advance today and
accelerate tomorrow.
Cheers
Jim Guinn, II
Accenture
Global Managing Director
LinkedIn: @Jim Guinn, II
Twitter: @jimmy_guinn
—Jim Guinn II
Stage 1
Operation Track
How do you build an OT security
program that is threat-justified and
business-aligned? Should OT
monitoring be centralized in an IT or
an OT SOC? What factors should
inform your decision-making process?
Listen in to a discussion on
navigating—and conquering—complex
challenges from program inception to
SOC design, build and implementation
including;
• enterprise-wide configuration and
asset management
• foundational program elements
and structure
• critical criteria for scoping
technology
• measuring success metrics that
align to the business
Conquering
Complexities
from OT Program
to OT SOC
OT Security Program
with Jason Holcomb, Accenture
Tony Souza
Duke Energy
Director of Cyber
Architecture,
IT/OT Integration
and TVM
| Advance today, accelerate tomorrow
Contact to learn more
Conquering
Complexities
from OT Program
to OT SOC
OT Security Program
| Advance today, accelerate tomorrow
Stop manual asset management.
You can’t protect things you don’t know exist and you
can’t protect systems being changed in a vacuum. If the
goal is to build good, see bad, take action, you’ll never
get there manually.
Continue operational excellence.
Build relationships, foster synergies, and collaborate
between operators and cyber defenders.
Start building an OT security program.
It’s a heavy lift no matter the size of the company, but
it’s important. Important things are hard and hard things
are necessary.
Key
session
takeaways:
View session on-demand
Once sacrilege to the OT/ICS
cybersecurity “secure by isolation”
ethos, cloud and edge technologies
are steadily making their way into
operational use cases with plenty of
business drivers to support the shift.
This session will examine the use
cases, drivers, and lessons learned for
using cloud in OT from the
perspectives of current state as well
as what is coming next.
Evolving IT/OT
Security
Architecture
OT Cloud
with Doug Wylie, Accenture
Darren
Highfill
Norfolk
Southern
Chief Information
Security Officer
| Advance today, accelerate tomorrow
Contact to learn more
Evolving IT/OT
Security
Architecture
OT Cloud
| Advance today, accelerate tomorrow
Stop fighting the inevitable.
OT is progressively moving in the direction of IT. As OT
environments become increasingly more technology-
enabled, it’s imperative to employ a measured risk
evaluation process to make deliberate, case-by-case
decisions along the way.
Continue sharpening your
problem statements.
In light of recent supply chain headlines and evolving
technology opportunities, you need to continue tuning
your action plans.
Start tightening alignment between
your contracts and your projects.
Treat it as an API at the business level with defined
responsibilities on both sides.
Key
session
takeaways:
View session on-demand
Aligning risk management to the
business while effectively addressing
the security needs of both IT and OT
environments requires balance.
Join Sam Linares as he leads a lively
panel discussion with three security-
specialist contributors ready to share
their real-world insights.
• How can risk be categorized
—if at all?
• What factors contribute to building
a resilient infrastructure and
business processes?
• Can cyber risk be engineered out
of the defense equation?
• Are new methodologies and
approaches (like CCE) bringing
additional light or additional noise
to the cybersecurity control room?
IT/OT Risk
Alignment
Risk Management
with Samuel Linares, Accenture
Andrew
Bochman
Idaho National
Laboratory
Senior Cyber & Energy
Security Strategist
Agustin
Valencia
Iberdrola
Head of OT Global
Security
| Advance today, accelerate tomorrow
Contact to learn more
IT/OT Risk
Alignment
Risk Management
| Advance today, accelerate tomorrow
Stop trusting.
Don't assume something (people, process, technology)
is trustworthy because others are using it or you're told
to trust it. Always question what you're doing: is it the
right thing to do and are we doing enough of it.
Continue collaborating.
IT and OT need to continue to work together. When you
work in silos you create weaknesses in your
organization. Adversaries will exploit those weaknesses.
Start empowering your people.
Empower them to adopt IT technology in the OT
environment, and hold them accountable for the
security systems they use and manage.
View session on-demand
Key
session
takeaways:
When cyber incidents, such as
ransomware, compromise industrial
control systems the impacts are
significant and protracted. Companies
are being attacked repeatedly and post-
incident action plans are falling short of
meaningful mitigations. Bryan Singer
reveals the lessons learned and insights
gained during his time working on
hundreds of incident response
engagements across various industries.
Hear about:
• What companies can do to prepare
for security breach impacts
• What common pitfalls to avoid when
recovering from an incident
• What benefits are gained from
proactive and reactive incident
response activities
Proactive and
Reactive IR
Incident Response
Bryan Singer
Accenture
Principal Director,
Security
Innovation
| Advance today, accelerate tomorrow
Contact to learn more
Proactive and
Reactive IR
Incident Response
| Advance today, accelerate tomorrow
Stop ignoring past lessons.
Continue working to improve
detection and alignment.
Start improving– or creating– an
incident response strategy today.
Key
session
takeaways:
View session on-demand
Intermission
Houston OT Cyber
Fusion Center
I challenge you to
think about a pressing
OT security concern
in your organization
and then let us
collaborate with you
to solve it jointly.
—Jim Guinn II
Stage 2
Executive Track
Rich Mahler talks with leaders from
electricity supply company Southern
California Edison about what it takes to
pull a formal governance program
together—from conception and design
to approval and implementation. Find out
how the team took a fresh approach to
OT governance with the buy-in of every
stakeholder involved; cybersecurity,
distribution, operations and IT.
OT Governance Structure
with Rich Mahler, Accenture
Paul J. Grigaux
Southern
California Edison
Vice President, Asset
Management, Strategy
& Engineering
Puesh Kumar
Southern California
Edison
Principal Manager for
Cybersecurity and
Risk Management
| Advance today, accelerate tomorrow
OT Cybersecurity
Contact to learn more
OT Governance Structure
| Advance today, accelerate tomorrow
OT Cybersecurity
View session on-demand
Stop fighting the last battle.
Focus on improvements versus fighting over what went
wrong and what led you to consider building in cybersecurity.
Continue discussing reliability and safety
as the bedrock of the electric industry.
Fold in security as a key element to ensure that safety and
reliability.
Start confirming you have executive
buy-in at the highest levels (C-suite).
Key
session
takeaways:
Dan Mellen will moderate a deep-dive
discussion focused on how OT
stakeholders are meeting the
challenge to deploy and secure next-
gen cloud architectures. Participants
will speak to key components for
success based on their experience
securing an environment where cyber
incidents can have kinetic impact.
Tune in as they reveal pro tips to
enabling new technology at the
intersection of IT and OT:
• determining the right fundamentals
to drive a secure cloud foundation
from the start
• harnessing standardization and
automation to build consistent and
repeatable outcomes
• articulating noteworthy business
outcomes to gain—and keep—
momentum
Cloud and IoT
Integration
Next-Gen Cloud
with Dan Mellen, Accenture
Gretchen
Myers
Chevron
Principal
Architect IT/OT
| Advance today, accelerate tomorrow
Contact to learn more
Cloud and IoT
Integration
Next-Gen Cloud
| Advance today, accelerate tomorrow
Stop using IT compliance as
a barrier to innovation.
Don’t create blockers where they don’t need to be;
innovate the conversation around risk.
Continue learning, tinkering, and
exploring new technology.
Push to uncover new data models and new ways to use
IIoT by bringing engineers and software engineers
together to collaborate.
Start building cross functional teams.
Get key business SMEs in the same room with IT so they
can work together to build the prototype of what good
looks like.
Key
session
takeaways:
View session on-demand
Prioritization is the name of the game
when it comes to managing risk—and
expectations. Luis Luque is the host for a
conversation between two OT security
stakeholders, each with a different
constituency—IT and OT. They will
explore why context matters when it
comes to prioritizing investments and
implementing program metrics and will
reveal how to:
• deal with cyber risk specific to
operations
• negotiate road map timelines to
support successful outcomes
• answer the toughest question you’re
likely to get from the board
Priority
Investments and
Program Metrics
Risk Management
with Luis Luque, Accenture
Ruud Gal
DSM
Global Project Director
Cyber Security in
Operations
Giancarlo Mirtelli
ENI
Head of Cyber
Security for Foreign
Subsidiaries and
Industrial Sites
| Advance today, accelerate tomorrow
Contact to learn more
Priority
Investments and
Program Metrics
Risk Management
| Advance today, accelerate tomorrow
Stop postponing upgrades.
Upgrade cycle is only going to become more frequent
as technology advances and virtualization makes its
way to the plant floor.
Continue to align with the overall
enterprise risk management (ERM).
Engage the broader group of stakeholders to elevate
internal visibility of the program and ensure the scale of
the priority is given the appropriate ranking.
Start thinking of change management
as the critical success factor
on which communication, customer satisfaction and
confidence can be built.
Key
session
takeaways:
View session on-demand
Negotiating Risk,
Security and
Spending Across
the Board
Executive Roundtable
with Michael Krauss,
Accenture Cybersecurity Forum
Kelly Bissel
Accenture
Senior Managing
Director
What are the challenges and leading
practices necessary for effective
security, efficient operations, proper
risk management, sensible spending
and suitable governance?
During this roundtable discussion, an
executive panel of senior leaders from
cyber defense, business operations,
finance and the board will weigh-in on
the challenges. Under scrutiny will be
how to align diverse business functions
to achieve the right levels of risk
management, while limiting cost and
optimizing enterprise outcomes.
Adam Lee
Dominion
Energy
Vice President,
Chief Security
Officer
Frank
Modruson
First Midwest
Bank
Board Member
| Advance today, accelerate tomorrow
Contact to learn more
Negotiating Risk,
Security and
Spending Across
the Board
Executive Roundtable
| Advance today, accelerate tomorrow
Stop working in silos and
focusing solely on through-put
and efficiency.
Continue executing on a balanced
enterprise vision that considers operational
effectiveness and risk management.
Start a deeper dialogue between
operations, security, risk management,
the C-suite, and the Board.
Key
session
takeaways:
View session on-demand
Thank you to our sponsors:
Thank you

Mais conteúdo relacionado

Mais procurados

DevOps in Digital Transformation
DevOps in Digital TransformationDevOps in Digital Transformation
DevOps in Digital TransformationBrillio
 
When, Where & How AI Will Boost Federal Workforce Productivity
When, Where & How AI Will Boost Federal Workforce ProductivityWhen, Where & How AI Will Boost Federal Workforce Productivity
When, Where & How AI Will Boost Federal Workforce Productivityaccenture
 
Trash The Rulebook
Trash The RulebookTrash The Rulebook
Trash The Rulebookaccenture
 
Future Ready Enterprise Systems | Accenture
Future Ready Enterprise Systems | AccentureFuture Ready Enterprise Systems | Accenture
Future Ready Enterprise Systems | Accentureaccenture
 
Growth-Driving Enterprise Innovation Model | Accenture
Growth-Driving Enterprise Innovation Model | AccentureGrowth-Driving Enterprise Innovation Model | Accenture
Growth-Driving Enterprise Innovation Model | Accentureaccenture
 
Perspectives on the Future of Remote Work for States
Perspectives on the Future of Remote Work for StatesPerspectives on the Future of Remote Work for States
Perspectives on the Future of Remote Work for Statesaccenture
 
DARQ power driving value for the Communications Industry
DARQ power driving value for the Communications Industry DARQ power driving value for the Communications Industry
DARQ power driving value for the Communications Industry accenture
 
CIO Cloud Champion Checklist
CIO Cloud Champion ChecklistCIO Cloud Champion Checklist
CIO Cloud Champion ChecklistFuze
 
Oracle Technology Vision 2021
Oracle Technology Vision 2021Oracle Technology Vision 2021
Oracle Technology Vision 2021accenture
 
Accenture Program Project and Service Management
Accenture Program Project and Service ManagementAccenture Program Project and Service Management
Accenture Program Project and Service ManagementAccenture Technology
 
Leading in the New
Leading in the New Leading in the New
Leading in the New accenture
 
Transforming the industry that transformed the world
Transforming the industry that transformed the worldTransforming the industry that transformed the world
Transforming the industry that transformed the worldaccenture
 
Accenture Communications Industry 2021 - Connectivity Optimizer
Accenture Communications Industry 2021 - Connectivity OptimizerAccenture Communications Industry 2021 - Connectivity Optimizer
Accenture Communications Industry 2021 - Connectivity Optimizeraccenture
 
Unleashing Competitiveness on the Cloud Continuum | Accenture
Unleashing Competitiveness on the Cloud Continuum | AccentureUnleashing Competitiveness on the Cloud Continuum | Accenture
Unleashing Competitiveness on the Cloud Continuum | Accentureaccenture
 
Accenture Public Sector Emerging Technologies Research - Smart Nation Workforce
Accenture Public Sector Emerging Technologies Research - Smart Nation WorkforceAccenture Public Sector Emerging Technologies Research - Smart Nation Workforce
Accenture Public Sector Emerging Technologies Research - Smart Nation Workforceaccenture
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilienceaccenture
 
Digitally Enabled Grid 2017: Toward a more digital, distributed and resilient...
Digitally Enabled Grid 2017: Toward a more digital, distributed and resilient...Digitally Enabled Grid 2017: Toward a more digital, distributed and resilient...
Digitally Enabled Grid 2017: Toward a more digital, distributed and resilient...accenture
 
The Human+ Worker in Public Service | Accenture
The Human+ Worker in Public Service | AccentureThe Human+ Worker in Public Service | Accenture
The Human+ Worker in Public Service | Accentureaccenture
 
Evolving Role of System z in the Application Economy
 Evolving Role of System z in the Application Economy Evolving Role of System z in the Application Economy
Evolving Role of System z in the Application EconomyCA Technologies
 

Mais procurados (20)

DevOps in Digital Transformation
DevOps in Digital TransformationDevOps in Digital Transformation
DevOps in Digital Transformation
 
When, Where & How AI Will Boost Federal Workforce Productivity
When, Where & How AI Will Boost Federal Workforce ProductivityWhen, Where & How AI Will Boost Federal Workforce Productivity
When, Where & How AI Will Boost Federal Workforce Productivity
 
Trash The Rulebook
Trash The RulebookTrash The Rulebook
Trash The Rulebook
 
Future Ready Enterprise Systems | Accenture
Future Ready Enterprise Systems | AccentureFuture Ready Enterprise Systems | Accenture
Future Ready Enterprise Systems | Accenture
 
Growth-Driving Enterprise Innovation Model | Accenture
Growth-Driving Enterprise Innovation Model | AccentureGrowth-Driving Enterprise Innovation Model | Accenture
Growth-Driving Enterprise Innovation Model | Accenture
 
Perspectives on the Future of Remote Work for States
Perspectives on the Future of Remote Work for StatesPerspectives on the Future of Remote Work for States
Perspectives on the Future of Remote Work for States
 
DARQ power driving value for the Communications Industry
DARQ power driving value for the Communications Industry DARQ power driving value for the Communications Industry
DARQ power driving value for the Communications Industry
 
CIO Cloud Champion Checklist
CIO Cloud Champion ChecklistCIO Cloud Champion Checklist
CIO Cloud Champion Checklist
 
Oracle Technology Vision 2021
Oracle Technology Vision 2021Oracle Technology Vision 2021
Oracle Technology Vision 2021
 
Accenture Program Project and Service Management
Accenture Program Project and Service ManagementAccenture Program Project and Service Management
Accenture Program Project and Service Management
 
Leading in the New
Leading in the New Leading in the New
Leading in the New
 
Transforming the industry that transformed the world
Transforming the industry that transformed the worldTransforming the industry that transformed the world
Transforming the industry that transformed the world
 
Accenture Communications Industry 2021 - Connectivity Optimizer
Accenture Communications Industry 2021 - Connectivity OptimizerAccenture Communications Industry 2021 - Connectivity Optimizer
Accenture Communications Industry 2021 - Connectivity Optimizer
 
Unleashing Competitiveness on the Cloud Continuum | Accenture
Unleashing Competitiveness on the Cloud Continuum | AccentureUnleashing Competitiveness on the Cloud Continuum | Accenture
Unleashing Competitiveness on the Cloud Continuum | Accenture
 
Tactivesoft - Construction ERP
Tactivesoft - Construction ERPTactivesoft - Construction ERP
Tactivesoft - Construction ERP
 
Accenture Public Sector Emerging Technologies Research - Smart Nation Workforce
Accenture Public Sector Emerging Technologies Research - Smart Nation WorkforceAccenture Public Sector Emerging Technologies Research - Smart Nation Workforce
Accenture Public Sector Emerging Technologies Research - Smart Nation Workforce
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilience
 
Digitally Enabled Grid 2017: Toward a more digital, distributed and resilient...
Digitally Enabled Grid 2017: Toward a more digital, distributed and resilient...Digitally Enabled Grid 2017: Toward a more digital, distributed and resilient...
Digitally Enabled Grid 2017: Toward a more digital, distributed and resilient...
 
The Human+ Worker in Public Service | Accenture
The Human+ Worker in Public Service | AccentureThe Human+ Worker in Public Service | Accenture
The Human+ Worker in Public Service | Accenture
 
Evolving Role of System z in the Application Economy
 Evolving Role of System z in the Application Economy Evolving Role of System z in the Application Economy
Evolving Role of System z in the Application Economy
 

Semelhante a Operation: Next Summit Takeaways

Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Downaccenture
 
End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to GreatEnd-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Greataccenture
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonPatricia M Watson
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityKaryl Scott
 
10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITYRazorpoint Security
 
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJNIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJSherry Jones
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App DeliveryMighty Guides, Inc.
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Matthew Rosenquist
 
111.pptx
111.pptx111.pptx
111.pptxJESUNPK
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Troy Marshall
 
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...IT Network marcus evans
 
The path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journeyThe path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journeyThe Economist Media Businesses
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...NRBsanv
 

Semelhante a Operation: Next Summit Takeaways (20)

Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to GreatEnd-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Great
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
16231
1623116231
16231
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY
 
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJNIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
111.pptx
111.pptx111.pptx
111.pptx
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
 
The path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journeyThe path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journey
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
 

Mais de accenture

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024accenture
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileaccenture
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial Systemaccenture
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyaccenture
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023accenture
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operationsaccenture
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Studyaccenture
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023accenture
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented changeaccenture
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% meaccenture
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023accenture
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoaccenture
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industryaccenture
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023accenture
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accentureaccenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accentureaccenture
 

Mais de accenture (20)

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 

Último

Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 

Último (20)

Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 

Operation: Next Summit Takeaways

  • 2. | Advance today, accelerate tomorrow During this unparalleled time of physical distancing, traditional collaboration has been a challenge. It’s created a void and we felt it. Why? That’s the first question my team asked when I said we were hosting a summit. It’s a fair question. Knowledge sharing is a hallmark of the OT/ICS community. During this unparalleled time of physical distancing, traditional collaboration has been a challenge. It’s created a void and we felt it. In talking with our clients, our alliance partners, and even some of our competitors, the sentiment was echoed back, loudly. My response to my team was, why not? Our mission was to bring together people from the critical infrastructure space and provide a forum that offers: • candid peer-to-peer cross-industry discussions • real-world experiences from the field to the boardroom • scalable security solutions for future success • tangible next steps for building an OT/ICS security roadmap What follows are key takeaways from each session. Bold statements from OT cybersecurity practitioners based on real- world experience advancing programs and surmounting the same challenges facing your organization. Review the notes. Share the on-demand content. And reach out if you’re looking for a sounding board. Always happy to collaborate to advance today and accelerate tomorrow. Cheers Jim Guinn, II Accenture Global Managing Director LinkedIn: @Jim Guinn, II Twitter: @jimmy_guinn —Jim Guinn II
  • 4. How do you build an OT security program that is threat-justified and business-aligned? Should OT monitoring be centralized in an IT or an OT SOC? What factors should inform your decision-making process? Listen in to a discussion on navigating—and conquering—complex challenges from program inception to SOC design, build and implementation including; • enterprise-wide configuration and asset management • foundational program elements and structure • critical criteria for scoping technology • measuring success metrics that align to the business Conquering Complexities from OT Program to OT SOC OT Security Program with Jason Holcomb, Accenture Tony Souza Duke Energy Director of Cyber Architecture, IT/OT Integration and TVM | Advance today, accelerate tomorrow Contact to learn more
  • 5. Conquering Complexities from OT Program to OT SOC OT Security Program | Advance today, accelerate tomorrow Stop manual asset management. You can’t protect things you don’t know exist and you can’t protect systems being changed in a vacuum. If the goal is to build good, see bad, take action, you’ll never get there manually. Continue operational excellence. Build relationships, foster synergies, and collaborate between operators and cyber defenders. Start building an OT security program. It’s a heavy lift no matter the size of the company, but it’s important. Important things are hard and hard things are necessary. Key session takeaways: View session on-demand
  • 6. Once sacrilege to the OT/ICS cybersecurity “secure by isolation” ethos, cloud and edge technologies are steadily making their way into operational use cases with plenty of business drivers to support the shift. This session will examine the use cases, drivers, and lessons learned for using cloud in OT from the perspectives of current state as well as what is coming next. Evolving IT/OT Security Architecture OT Cloud with Doug Wylie, Accenture Darren Highfill Norfolk Southern Chief Information Security Officer | Advance today, accelerate tomorrow Contact to learn more
  • 7. Evolving IT/OT Security Architecture OT Cloud | Advance today, accelerate tomorrow Stop fighting the inevitable. OT is progressively moving in the direction of IT. As OT environments become increasingly more technology- enabled, it’s imperative to employ a measured risk evaluation process to make deliberate, case-by-case decisions along the way. Continue sharpening your problem statements. In light of recent supply chain headlines and evolving technology opportunities, you need to continue tuning your action plans. Start tightening alignment between your contracts and your projects. Treat it as an API at the business level with defined responsibilities on both sides. Key session takeaways: View session on-demand
  • 8. Aligning risk management to the business while effectively addressing the security needs of both IT and OT environments requires balance. Join Sam Linares as he leads a lively panel discussion with three security- specialist contributors ready to share their real-world insights. • How can risk be categorized —if at all? • What factors contribute to building a resilient infrastructure and business processes? • Can cyber risk be engineered out of the defense equation? • Are new methodologies and approaches (like CCE) bringing additional light or additional noise to the cybersecurity control room? IT/OT Risk Alignment Risk Management with Samuel Linares, Accenture Andrew Bochman Idaho National Laboratory Senior Cyber & Energy Security Strategist Agustin Valencia Iberdrola Head of OT Global Security | Advance today, accelerate tomorrow Contact to learn more
  • 9. IT/OT Risk Alignment Risk Management | Advance today, accelerate tomorrow Stop trusting. Don't assume something (people, process, technology) is trustworthy because others are using it or you're told to trust it. Always question what you're doing: is it the right thing to do and are we doing enough of it. Continue collaborating. IT and OT need to continue to work together. When you work in silos you create weaknesses in your organization. Adversaries will exploit those weaknesses. Start empowering your people. Empower them to adopt IT technology in the OT environment, and hold them accountable for the security systems they use and manage. View session on-demand Key session takeaways:
  • 10. When cyber incidents, such as ransomware, compromise industrial control systems the impacts are significant and protracted. Companies are being attacked repeatedly and post- incident action plans are falling short of meaningful mitigations. Bryan Singer reveals the lessons learned and insights gained during his time working on hundreds of incident response engagements across various industries. Hear about: • What companies can do to prepare for security breach impacts • What common pitfalls to avoid when recovering from an incident • What benefits are gained from proactive and reactive incident response activities Proactive and Reactive IR Incident Response Bryan Singer Accenture Principal Director, Security Innovation | Advance today, accelerate tomorrow Contact to learn more
  • 11. Proactive and Reactive IR Incident Response | Advance today, accelerate tomorrow Stop ignoring past lessons. Continue working to improve detection and alignment. Start improving– or creating– an incident response strategy today. Key session takeaways: View session on-demand
  • 12. Intermission Houston OT Cyber Fusion Center I challenge you to think about a pressing OT security concern in your organization and then let us collaborate with you to solve it jointly. —Jim Guinn II
  • 14. Rich Mahler talks with leaders from electricity supply company Southern California Edison about what it takes to pull a formal governance program together—from conception and design to approval and implementation. Find out how the team took a fresh approach to OT governance with the buy-in of every stakeholder involved; cybersecurity, distribution, operations and IT. OT Governance Structure with Rich Mahler, Accenture Paul J. Grigaux Southern California Edison Vice President, Asset Management, Strategy & Engineering Puesh Kumar Southern California Edison Principal Manager for Cybersecurity and Risk Management | Advance today, accelerate tomorrow OT Cybersecurity Contact to learn more
  • 15. OT Governance Structure | Advance today, accelerate tomorrow OT Cybersecurity View session on-demand Stop fighting the last battle. Focus on improvements versus fighting over what went wrong and what led you to consider building in cybersecurity. Continue discussing reliability and safety as the bedrock of the electric industry. Fold in security as a key element to ensure that safety and reliability. Start confirming you have executive buy-in at the highest levels (C-suite). Key session takeaways:
  • 16. Dan Mellen will moderate a deep-dive discussion focused on how OT stakeholders are meeting the challenge to deploy and secure next- gen cloud architectures. Participants will speak to key components for success based on their experience securing an environment where cyber incidents can have kinetic impact. Tune in as they reveal pro tips to enabling new technology at the intersection of IT and OT: • determining the right fundamentals to drive a secure cloud foundation from the start • harnessing standardization and automation to build consistent and repeatable outcomes • articulating noteworthy business outcomes to gain—and keep— momentum Cloud and IoT Integration Next-Gen Cloud with Dan Mellen, Accenture Gretchen Myers Chevron Principal Architect IT/OT | Advance today, accelerate tomorrow Contact to learn more
  • 17. Cloud and IoT Integration Next-Gen Cloud | Advance today, accelerate tomorrow Stop using IT compliance as a barrier to innovation. Don’t create blockers where they don’t need to be; innovate the conversation around risk. Continue learning, tinkering, and exploring new technology. Push to uncover new data models and new ways to use IIoT by bringing engineers and software engineers together to collaborate. Start building cross functional teams. Get key business SMEs in the same room with IT so they can work together to build the prototype of what good looks like. Key session takeaways: View session on-demand
  • 18. Prioritization is the name of the game when it comes to managing risk—and expectations. Luis Luque is the host for a conversation between two OT security stakeholders, each with a different constituency—IT and OT. They will explore why context matters when it comes to prioritizing investments and implementing program metrics and will reveal how to: • deal with cyber risk specific to operations • negotiate road map timelines to support successful outcomes • answer the toughest question you’re likely to get from the board Priority Investments and Program Metrics Risk Management with Luis Luque, Accenture Ruud Gal DSM Global Project Director Cyber Security in Operations Giancarlo Mirtelli ENI Head of Cyber Security for Foreign Subsidiaries and Industrial Sites | Advance today, accelerate tomorrow Contact to learn more
  • 19. Priority Investments and Program Metrics Risk Management | Advance today, accelerate tomorrow Stop postponing upgrades. Upgrade cycle is only going to become more frequent as technology advances and virtualization makes its way to the plant floor. Continue to align with the overall enterprise risk management (ERM). Engage the broader group of stakeholders to elevate internal visibility of the program and ensure the scale of the priority is given the appropriate ranking. Start thinking of change management as the critical success factor on which communication, customer satisfaction and confidence can be built. Key session takeaways: View session on-demand
  • 20. Negotiating Risk, Security and Spending Across the Board Executive Roundtable with Michael Krauss, Accenture Cybersecurity Forum Kelly Bissel Accenture Senior Managing Director What are the challenges and leading practices necessary for effective security, efficient operations, proper risk management, sensible spending and suitable governance? During this roundtable discussion, an executive panel of senior leaders from cyber defense, business operations, finance and the board will weigh-in on the challenges. Under scrutiny will be how to align diverse business functions to achieve the right levels of risk management, while limiting cost and optimizing enterprise outcomes. Adam Lee Dominion Energy Vice President, Chief Security Officer Frank Modruson First Midwest Bank Board Member | Advance today, accelerate tomorrow Contact to learn more
  • 21. Negotiating Risk, Security and Spending Across the Board Executive Roundtable | Advance today, accelerate tomorrow Stop working in silos and focusing solely on through-put and efficiency. Continue executing on a balanced enterprise vision that considers operational effectiveness and risk management. Start a deeper dialogue between operations, security, risk management, the C-suite, and the Board. Key session takeaways: View session on-demand
  • 22. Thank you to our sponsors: Thank you