Program – Day Two



9:00am-10:30am – Session 2a:
Emerging Threats For Critical Infrastructure

The ever changing nature of threats, whether natural, through climate change, or man-made through terrorism activities and insider threats, means the need to continually review and update policies, practices and technologies to meet these growing demands. But what are those emerging threats and how can we identify, monitor and manage their levels of potential damage?

Steve Zeringue, WMD Co-ordinator, FBI

Ruth Christensen, Analyst, NCTC

Daniel Bell, Martime Terrorism Analyst, National Counterterrorism Center and Kelly Moss, Analyst, Threats to Critical Infrastructure

Lauren Nash, Warning Coordination Meteorologist, National Weather Service/NOAA

10:30am-11:15am – Networking Coffee Break

11:15am-12:30pm – Session 3a: Countering the Emerging Threats – Security, Risk & Disaster Mitigation
Being prepared for the changing threat environment can benefit greatly in mitigating its impact on infrastructure or crowded places, ensuring resilience, safety and security. How can we counter these emerging threats to minimising loss of service and financial impact?

Protecting Your Critical Infrastructure from Improvised Explosive Device Threats – Douglas DeLancey, Branch Chief, Counter IED Strategy, Integration & Comms, Department of Homeland Security, Office for Bombing Prevention

Responding to multiple threat streams while facilitating the largest spike in cargo volume – Drew Schneider, Assistant Director of Security, Port of Long Beach

Countering UAS Threats – George Rey (InfraGard Louisiana BoD / Aviation Sector Chief)

Richard Engelhom, Business Development Manager, Weibel

12:30pm-2:00pm – Delegate Networking Lunch

2:00pm-3:30pm – Session 4a:
Methodology, Simulation & Machine Learning

Predicting how threats can impact business continuity of critical assets can be of major benefit for planning resiliency or emergency response. This affects both financial and resource planning. So what are the latest roles and assessments in modelling and methodology? What role can machine learning play in building more accurate simulation? And how does human intelligence and machine learning identify threats, risks and assessments?

Multi-Hazard Early Warning Systems and Building Community Resilience – Ollie Gagnon Chief Strategist, Director, Infrastructure Assurance and Analysis Division, Idaho National Laboratory

John Byrk, Cyber And Physical Threat Intelligence Analyst, DNG-ISAC

The Emerging Role of Modeling and Simulation in Security Assessments and Design – Ben Eazzetta, CEO , ARES Security Corporation

Ross J. Bourgeois, Director, Public Safety Support Services

3:30pm-4:15pm – Networking Coffee Break

4:15pm-5:30pm – Session 5a:
Securing the Physical CI Asset

The physical infrastructure asset requires just as much focus from natural disasters, terrorist or man-made threats. Ensuring our assets are protected and resilient ensures continuity of supply and service, so what technologies are emerging to secure physical environments?

An Inside Job: Protecting Chemical Facilities from Insider Exploitation – Todd Klessman, Deputy Associate Director, CISA

The Importance of Embedding Security into the Design of CNI Facilities – Sarah-Jane Prew, Security Consultant, Arup

Preparation and prevention of physical attack on your CI – Roy Smith, President, Viking Tactical Security

Low-cost, Short-range Radar’s Role in a Safer, More Secure Critical Infrastructure Environment – Joe Morgan, Business Development Manager-Critical Infrastructure, North America, Axis Communications


9:00am-10:30am – Session 2b:
Cybersecurity Legislation, Standards & Best Practice

As the threat of cyber-attacks by state actors grows ever higher and attacks by criminals and malicious rogue players continues unabated the need to put in place robust legislation and standards and best practice becomes all the more urgent.

Starting the Journey: Cyber Incident Management Planning – Deron T. McElroy, Chief of Cybersecurity Services, CISA

Deborah Kobza, President, ISAOs

Michael A. Echols CISSP, MBA CEO, Max Cybersecurity LLC.

Improving Cybersecurity Posture using the UFC 4-010-06 – Dr Jeffrey (Jeff) Struik, Cyber Strike Solutions LLC

10:30am-11:15am – Networking Coffee Break

11:15am-12:30pm – Session 3b: The Developing Cyber Threat Environment
The ability to monitor the cyber threats to CNI can greatly assist the operators and agencies better prepare their defences against cyber attacks on systems and information/data. What is the latest strategic perspective on cyber monitoring and cyber defences for enhancing CIIP?

Ronald Pavlik, Deputy Assistant Administrator, Security Operations, Surface Operations, TSA

China Threat against proprietary information – Malcolm Bezet, FBI

Securing Transportation’s Critical Infrastructure – Guerry Bruner, Assa Abloy

Bill Healy, Director of Operations, City of New Orleans, Information, Technology and Innovation, Homeland Security & Emergency Preparedness

12:30pm-2:00pm – Delegate Networking Lunch

2:00pm-3:30pm – Session 4b:
Strategies and Collaboration in Cyber Defence

To prevent catastrophic disruption or collapse of critical infrastructure CNI operators must develop the strategies, procedures, controls and co-operation to ensure resilience against cyber threats and attacks.

Cyber Resilience: Keys to Protecting & Sustaining Critical Services – Deron T. McElroy, Chief, Cybersecurity Services, Region VI, CISA

A Case Study in Hacking Critical Infrastructure – Steve Povolny, Principal Engineer, Head of Advanced Threat Research, Trellix

Jim Stratton, Lead Business Partnership Manager, Purdue University

Modeling and Spatial-Temporal Analysis of Cyber-Physical Impacts Tim Klett, Cybersecurity Researcher, Idaho National Laboratory

3:30pm-4:15pm – Networking Coffee Break

4:15pm-5:30pm – Session 5b:
AI, Machine Learning and Augmented Reality in Cybersecurity

How can we use AI, quantum computing capabilities, augmented reality and machine learning to create resilience in our infrastructure? How can it affect the environment, transport, smart cities, etc? What are the emerging technologies and how can they assist in disrupting threats?

When Worlds Collide: Securing Cyber-Physical Systems – Glenda Snodgrass, President, The Net Effect

Proactive OT Cyber Maintenance – Act Before the Breach – Marty Edwards, VP, Operational Technology Security, Tenable

A vision for tomorrow’s critical infrastructure security – Stephen Homrighaus, Account Executive, Enterprise, Genetec