Critical National Infrastructure Online Event

download
This year’s Critical National Infrastructure Summit will provide the updates and necessary dialogue to help drive security initiatives and maintain preparedness and resiliency.

Speakers

contributor_160px_-_160px_9f9e366712c3cc133f0a5af8dedb41f2
Dr. Reginald Brothers
Former Under Secretary
0
Antonio Villafana
Chief Information Officer
ouC2VmQUTrWv90cFSvV9hGcce7UFenFTV7i8DY5S
Samuel Visner
Director
ouC2VmQUTrWv90cFSvV9hGcce7UFenFTV7i8DY5S
Whitney Kellett
Chief Information Officer
ubV4xa6fLjNbd0WPdolBZDp1wKykVkajWCRHv0dT
Ahsan Baig
Chief Information Officer
contributor_160px_-_160px_5fdd0269853d5a98a9eb9621266ef09c
Steve Karoly
Former Acting Assistant Administrator
ubV4xa6fLjNbd0WPdolBZDp1wKykVkajWCRHv0dT
Chief W. Barnett Jones
Chief Security and Integrity Officer
ubV4xa6fLjNbd0WPdolBZDp1wKykVkajWCRHv0dT
Thomas Kuczynski
Chief Information Officer
Kp1Njc85TP1i25hnX2W2z3dXZrUaHhzf0J2rPPc2
Lewann Belton
Chief Information Officer
sHcbuskUqD19nqca3cA8Eoko6ub8UlroTGWNLgKm
Scott Aaronson
Vice President
page (3)
John Childers
Director of Information Security
dZSIVZt2lo5dQueq7Yg1HXvvS30l3P2q8riZI7gQ
Ivelisse Cassas
Director of Security
Tq5eucLoFtnKX1ptTrcFydkeNKKBBp30NZDk3ZNp
Bill Nelson
Chief Executive Officer
1UR2uQz9QnIEOi3dlCEA9Uy5auryYHV29tSpBFZ8
Jonathan Arnold
Chief Information Officer
SiJigAn4w7p3jXTiDugv2R1a18thxUVmX49NUFea
Douglas DeLancey
Chief, Counter-Improvised Explosive Device Strategy, Integration and Communications Section
DgZkWV67LOU9B6N95hLjlfrYwY0nhNZsMZEt5nHY
Scott Breor
Deputy Assistant Director
CJi5b9797Cs0lI2DQ1VszgGEpIOvL6Paq9IPJZtS
Ron Fisher
Director

Start

September 15, 2020

End

September 17, 2020

Address

Online Event   View map

Keeping Interoperability at the Core

We are living during times of growing advancements in drones, automation and IoT that couple with an advanced evolving threat landscape to create great uncertainty and need for diligence. This year’s Critical National Infrastructure Summit from September 15th -17th will provide the updates and necessary dialogue to help drive security initiatives and maintain preparedness and resiliency.

When we discuss critical infrastructure (CI), a myriad of questions come to mind, but two questions stand out; Are we safe and how can we be better prepared? The 2020 Critical National Infrastructure summit is bringing together 100+ C-Suites, Vice Presidents, and Directors across industry and government to cross-pollinate how we can best navigate the critical challenges within the community and address these core questions:

Connect OT to IT- Anything of value that is connected can be compromised and put the entire network at risk. Learn critical parameters to evaluate when procuring IOT equipment to support your facilities’ operations. Join us as we focus on physical and virtual convergence within our operating environments.

Drones and Critical Infrastructure Protection – As more CIP professionals have to do more with less, many are leveraging drones to patrol and surveil large or remote assets to save time and manage resources more effectively. Investigating alerts with drones first before committing security personal to the site. Join to learn about the best course of action to deter, detract and mitigate these threats.

Insider Threats – We are seeing an increasing rise to the number of breaches caused by insider threats but discovery of Insider threats can take months and cost organizations upwards of $8.76 million. We have dedicated panels and workshops set up to share the most cutting edge techniques and tools to counter insider threats.

It is with ongoing learning, development and information sharing that you can prepare and take every precaution necessary against these unwarranted threats. Join our Critical National Infrastructure summit for the unique opportunity to participate in our roundtables, training and panel discussions.

End User vs. Vendor Attendance Qualifications

All attendees will be evaluated based on the below qualifications.
End User An individual responsible for evaluating, purchasing or managing resources, products and/or services for their organization’s internal usage. An end user organization does not offer products, services or solutions associated with the domain of cyber security. No restrictions based on title, seniority, experience, company, or industry.
Vendor An individual from a company that offers cyber or physical security products or solutions regardless of the role, responsibility, or job title of the executive considering attendance. This includes but is not limited to Cybersecurity Technology, Consulting Services, and Cyber or Physical Security Hardware or Software. It is at sole discretion of the Automotive IQ staff to determine eligibility by considering these guidelines.