Control Systems
Cyber Conference

November 17 2020

The Event

We are hosting a Control Systems Cybersecurity Virtual Conference as a part of our Hack the Building event.

At the conference businesses will present their solutions for addressing critical infrastructure cyber challenges.

Hack the Building is a cyber exercise and technology showcase that includes a conglomerate of offensive and defensive teams from across the military, government, academia and industry.

For the conference event, there will be presentations on a broad range of ICS/SCADA topics including security of SCADA systems, building automation systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other field control system devices. 

Presentations on cyber standards that address building automation and facilities cyber as critical infrastructure are important to our audience to include ideas on how facilities architecture and construction, including  manufacturing facilities can be designed with cybersecurity in mind and not an after thought.  

SIGN UP BELOW TO attend the conference

Thanks to the generosity of our sponsors, the Control Systems Cyber Conference will be free to all attending!

Our Presenters

Dr. Ron Martin

Professor of Practice : Critical Infrastructure, Industrial Control Systems Security

Katie Arrington

CISO A&S, United States Department of Defense

Dr. Howard Grimes

Chief Executive Officer, The Cybersecurity Manufacturing Innovation Institute - CyManII

Robert Albach

Sr. Product Line, CISCO

Dr. Heinz Willebrand

Chief Evangelist LiFi Systems, Signify

Chris Grove

Product Evangelist, Nozomi Networks

Brian Romansky

Chief Innovation Officer, Owl Cyber Defense

Jesse Gallo

Ava Federal

Yogan Patel

Ava Federal

Dr. Austin Murdock

CEO & Founder, SixMap

Phil Owen

Director of Information Assurance & Cybersecurity, MC Dean Inc

Conference Panels

Protect This Manufacturer

A panel discussion between DoD, CMMC-AB, Manufacturing Extension Partnerships (MEP), and Industry moderated by MISI


Chris Newborn

Department of Defense (DoD) Acquisition and Cybersecurity Workforce

Shannon Jackson

Deputy Director, Department of Defense (DoD) Office of Small Business Programs

Katie Arrington

CISO A&S, United States Department of Defense (DoD)

Regan Edans

Director, Board of Directors the CMMC-AB and Founder and Chief - Transformation, Security and Compliance for DTC Global

Dr. Tony Lopez

Vice President IT, INDUS Technology, Inc.​

Jennifer Kurtz

Cyber Program Director

Cyberspace Solarium Commission

Dr. Scott Dade

Deputy Director, United States Cyber Command

Shannon Jackson

Deputy Director, Department of Defense (DoD) Office of Small Business Programs

Diane Janosek

National Security Agency's Deputy Commandant, The National Cryptologic School

Philip Niedermair

CEO, the National Cyber Group

Mark Loepker

Education Director, National Cryptologic Museum Foundation

Dawn Marie Yankeelov

President, Aspectx & Executive Director, Technology Association of Louisville Kentucky

Brian Kesecker

National Security Business Development for Sayari Labs.

Women in Cybersecurity Critical Infrastructure

This panel will discuss how groups such as The Women in Cybersecurity are putting the work to close the gaps in getting more women into the field of critical infrastructure cybersecurity.

(More panelists soon to be announced)

Moderator: Diane Janosek

National Security Agency's Deputy Commandant, The National Cryptologic School

Megan Samford

VP Chief Product Security Officer, Schneider Electric

Securing Government and Military Installation Critical Infrastructure Against Cyber Attacks

Control Systems technology are part of DoD facilities and defense industrial base supply chain commercial facilities. This panel is designed to discuss what types of solutions DoD is seeking to help architects, engineers, contractors, owners, facility managers, maintenance engineers, physical security specialists,—essentially anyone involved with implementing cybersecurity for facilities. What is Government and DoD doing to increase awareness and improve standards and what can industry do to accelerate solutions in support of the need to increase the cyber resilience of control systems and vulnerabilities that can impact government and commercial supply chain facilities.

More Panelists soon to be announced

Daryl Haegley, GICSP, OCP

Director, Mission Assurance & Cyber Deterrence Office of the Principal Cyber Advisor

A Critical Infrastructure Cyber Challenge

Buildings are critical infrastructure.  Assessing vulnerabilities in crucial government and commercial facilities is a labor intensive and often filled with gaps due to the expansive nature of some facilities and the myriad of IoT and control systems technologies that are involved in the building’s management and safety and security.  Reducing the labor involved in conducting assessments while yet increasing the visibility of assets and their configurations continues to be a challenge.  In addition there remains a mostly legitimate fear that and challenge encountered  that some of the facility related control cyber systems (FRCS) cannot not be scanned for known vulnerabilities because the FRCS cannot support the scanning, as it would lead to the FRCS malfunctioning and result in an impact to the facility that could also introduce a safety risk.

IoT Cybersecurity threats are increasing – many of the technologies available today, cannot detect or defend against vulnerabilities and attacks that leverage the lack of IoT cyber defenses.  A typical facility has its installed base of IoT,  but the tenants in a facility also install and operate IoT devices that could pose a threat to the facility and its tenants. 

Detecting and defending against malicious AI based cyber attacks.  While AI has many positive capabilities and continues to evolve, there is a trend line developing that indicates AI cyber based attacks could be devastating and there is little in the way of tools.

Counterfeit  technology continues to be an active threat to US critical infrastructure, detecting vulnerabilities in devices and verifying their true origin could provide some degree of fidelity to facilities infrastructure.  A methodology or solution that provides best practices and solutions for ensuring that as a building’s critical systems are being selected and prior to installation as part of the design and construction process, could reduce vulnerabilities facilities cyber threats.