About the Symposium
This event is brought to you by:
The manufacturing sector is the backbone of economies worldwide, providing jobs, innovation, and essential goods. However, as technology advances, so do the threats that can disrupt this vital industry. To address these challenges and develop proactive strategies, we invite you to this (CS)²AI Online™ Symposium on Securing the Manufacturing Sector.
Event Agenda
Session 1 :
Securing the Core: NIS2 Compliance for Multi-National Manufacturing Organizations
Featuring Hamish Wishart (Senior Consultant Cyber Security at KPMG)
In the increasingly vulnerable cybersecurity landscape, the manufacturing sector stands as a key target for security incidents. Upholding NIS2 compliance is not just a necessity— it's a strategic advantage. This talk offers exclusive insights into driving NIS2 compliance in a multi-national manufacturing environment where organizations must manage facilities in multiple EU Member States.
You will learn tailored collaboration strategies with site personnel for comprehensive risk ownership and effective incident detection and response. We will delve into 'quick wins' for immediate security boosts and outline a strategic long-term roadmap. This session aims to equip attendees with the tools needed to bolster OT security and transform what we see as the common pain points into areas of strength.
Session 2:
Asset Owners Panel Discussion
Featuring Yosef Beck (VP, Cyber Security at CRH), Jonas Rendahl (CISO at Aurobay)
Acquire valuable insights from cybersecurity leaders who serve asset owner operations in the manufacturing sector.
Session 3:
Tales from the Crypt
Featuring Aamir Lakhani (Global Security Strategist and Researcher at Fortinet)
Attacks on operational technology (OT) — the systems controlling industrial equipment, processes, and events —have leaped from Hollywood screens into reality. What once seemed like special-effects fiction in disaster movies about nuclear meltdowns, power grid collapses, and poisoned water systems is now a genuine threat. OT and manufacturing attacks are not new, but their impact on modern life is more significant than ever.
Session 4:
A Random Walk Through a Million Billion IoT/OT Things
A conversation with millions of researched Cyber-Physical Systems…
Featuring John Terrill (CISO at Phosphorus Cybersecurity)
With billions of IoT and OT devices powering manufacturing and industrial operations today, the xTended Internet of Things (xIoT) now surpasses traditional endpoints by an order of magnitude. Despite their critical roles, many of these IoT and OT Cyber-Physical Systems (CPS) remain overlooked and unsecured—operating with default or weak credentials, outdated firmware, insecure configurations, and an end-of-life state. This creates a vast and vulnerable attack surface that threat actors increasingly target to disrupt operations, exfiltrate data, or stage sophisticated ransomware attacks.
In this session, we’ll take a comprehensive journey through the world of IoT and OT/ICS devices, uncovering what we’ve learned over the years about the vulnerabilities and risks associated with the immense benefits of connected devices. From outdated security hygiene to device-specific weaknesses across diverse environments, we’ll explore key insights and real-world examples that highlight the unique challenges of securing these systems.
The session will also delve into the anatomy of OT and OT-adjacent IoT cyberattacks, detailing how attackers exploit these devices to achieve malicious goals. A live hacking demonstration will showcase the methods used to compromise common, yet mission-critical, devices — emphasizing the importance of proactive security measures to disappoint bad actors.
Attendees will leave with a deeper understanding of the scope and state of this attack surface, the critical role IoT and OT security plays in protecting the modern industrial landscape, and actionable steps that can be taken to strengthen their xIoT security posture.