Program – Day Two



9:00am-10:30am – Session 2a:
Emerging Threats For Critical Infrastructure

The ever changing nature of threats, whether natural, through climate change, or man-made through terrorism activities and insider threats, means the need to continually review and update policies, practices and technologies to meet these growing demands. But what are those emerging threats and how can we identify, monitor and manage their levels of potential damage?

Ruth Christensen, Analyst, NCTC

Steve Zeringue, WMD Co-ordinator, FBI

Terrorism: Impact of Global Pandemic Heightening Risk Factors for Insider Threats – Andrew McLaughlin, Analyst, National Counterterrorism Center & Andrew Andell, Analyst, National Counterterrorism Center (NCTC)

Lauren Nash, Warning Coordination Meteorologist, National Weather Service/NOAA

10:30am-11:15am – Networking Coffee Break

11:15am-12:30pm – Session 3a: Countering the Emerging Threats – Security, Risk & Disaster Mitigation
Being prepared for the changing threat environment can benefit greatly in mitigating its impact on infrastructure or crowded places, ensuring resilience, safety and security. How can we counter these emerging threats to minimising loss of service and financial impact?

Protecting Your Critical Infrastructure from Improvised Explosive Device Threats – Doug Delancey, Branch Chief, Counter IED Strategy, Integration & Comms, Office For Bombing Prevention, CISA

Countering UAS Threats – George Rey (InfraGard Louisiana BoD / Aviation Sector Chief)

HUMINT threats to organizational cybersecurity – John Bryk, Downstream Natural Gas ISAC

Responding to multiple threat streams while facilitating the largest spike in cargo volume – Drew Schneider, Assistant Director of Security, Port of Long Beach

12:30pm-2:00pm – Delegate Networking Lunch

2:00pm-3:30pm – Session 4a:
Methodology, Modelling, Simulation & Machine Learning

Predicting how threats can impact business continuity of critical assets can be of major benefit for planning resiliency or emergency response. This affects both financial and resource planning. So what are the latest roles and assessments in modelling and methodology? What role can machine learning play in building more accurate simulation?

The Emerging Role of Modeling and Simulation in Security Assessments and Design – Ben Eazzetta, CEO , ARES Security Corporation

Multi-Asset and System Assessment – David Dickinson, Infrastructure Assurance Program Manager, Argonne National Lab.

Use of GIS Capabilities and Huff Modeling to Estimate the Geographic Extent of Infrastructure Cascading Failures – Scott Schlueter, GIS Analyst, Argonne National Lab.

Multi-Hazard Early Warning Systems and Building Community Resilience – Ron Fisher, Director, Infrastructure Assurance and Analysis Division, Idaho National Lab.

3:30pm-4:15pm – Networking Coffee Break

4:15pm-5:30pm – Session 5a:
Securing the Physical CI Asset

The physical infrastructure asset requires just as much focus from natural disasters, terrorist or man-made threats. Ensuring our assets are protected and resilient ensures continuity of supply and service, so what technologies are emerging to secure physical environments?

An Inside Job: Protecting Chemical Facilities from Insider Exploitation – Todd Klessman, Deputy Associate Director, CISA

The Importance of Embedding Security into the Design of CNI Facilities – Sarah-Jane Prew, Security Consultant, Arup

Low-cost, Short-range Radar’s Role in a Safer, More Secure Critical Infrastructure Environment – Joe Morgan, Business Development Manager-Critical Infrastructure, North America, Axis Communications

Preparation and prevention of physical attack on your CI – Roy Smith, President, Viking Tactical Security


9:00am-10:30am – Session 2b:
Cybersecurity Legislation, Standards & Best Practice

As the threat of cyber-attacks by state actors grows ever higher and attacks by criminals and malicious rogue players continues unabated the need to put in place robust legislation and standards and best practice becomes all the more urgent.

Starting the Journey: Cyber Incident Management Planning – Deron T. McElroy, Chief of Cybersecurity Services, CISA

Debra Kobza, President, ISAOs

Improving Cybersecurity Posture Using the UFC 4-010-06 – Dr. Jeffrey (Jeff) Struik, Cyber Strike Solutions, LLC

Col Kenny Donnolly – Louisiana Cyber Commission*

10:30am-11:15am – Networking Coffee Break

11:15am-12:30pm – Session 3b: The Developing Cyber Threat Environment
The ability to monitor the cyber threats to CNI can greatly assist the operators and agencies better prepare their defences against cyber attacks on systems and information/data. What is the latest strategic perspective on cyber monitoring and cyber defences for enhancing CIIP?

Robert Thibault, Supervisory Special Agent, FBI / Infragard Louisiana*

Securing Transportation’s Critical Infrastructure – Guerry Bruner, Assa Abloy

Defending Against OT Red Button Capabilities In Critical Infrastructure – Barak Perelman, CEO, Indegy

Adam Brickeen, IT & Security Chief, City of New Orleans Office of Homeland Security & Emergency Preparedness*

12:30pm-2:00pm – Delegate Networking Lunch

2:00pm-3:30pm – Session 4b:
Strategies and Collaboration in Cyber Defence

To prevent catastrophic disruption or collapse of critical infrastructure CNI operators must develop the strategies, procedures, controls and co-operation to ensure resilience against cyber threats and attacks.

Cyber Resilience: Keys to Protecting & Sustaining Critical Services – Deron T. McElroy, Chief, Cybersecurity Services, Region VI, CISA

A Case Study in Hacking Critical Infrastructure – Steve Povolny, Head of Advanced Threat Research, McAfee

Modeling and Spatial-Temporal Analysis of Cyber-Physical Impacts – Tim Klett, Cybersecurity Researcher, Idaho National Laboratory

Harnessing the Power of Apprenticeship to Bridge the Cybersecurity Workforce Gap – Brad Bently, President, FASTPORT

3:30pm-4:15pm – Networking Coffee Break

4:15pm-5:30pm – Session 5b:
AI, Machine Learning and Augmented Reality in Cybersecurity

How can we use AI, quantum computing capabilities, augmented reality and machine learning to create resilience in our infrastructure? How can it affect the environment, transport, smart cities, etc? What are the emerging technologies and how can they assist in disrupting threats?

Time FireWall – securing Critical Infrastructures against GPS Jamming and Spoofing attacks – Jacob Kaplan, VP International Sales, AccuBeat

Proactive OT Cyber Maintenance – Act Before the Breach – Marty Edwards, VP, Operational Technology Security, Tenable

Why Device-Level Security is the Surest Way to Safeguard Critical Infrastructures – Yanir Laubshtein, VP, Cybersecurity & Industry, NanoLock Security

A vision for tomorrow’s critical infrastructure security – Stephen Homrighaus, Account Executive, Enterprise, Genetec