View by Topic
View by Type
View by Day
Monday
October 6, 2025
08:00-08:45
Stage 1
To Infinity and Beyond: Innovation in Spaceflight
Douglas Hurley , Retired Astronaut , NASA
Topic(s): Aerospace Digital Transformation Leadership Strategy
Type(s): Keynote

Uniquely accomplished and decorated aerospace executive, astronaut, test pilot and engineer with over 30 years of specialized experience operating, managing and leading the most innovative aerospace and aviation technologies in service to NASA’s human spaceflight program and the U.S. Marine Corps., Doug Hurley has logged over 5,500 hours in more than 25 aircraft and two space vehicles as well as logging over three months in space.
A veteran of three spaceflights, Doug served as Pilot of the last Space Shuttle flight in 2011 and Commander of the first test flight of the SpaceX Crew Dragon in 2020. He became one of the first two astronauts in history to launch aboard a commercial orbital spacecraft. For five years before the successful launch, he served as a liaison, consultant and test pilot on behalf of NASA to the company’s operations and development teams.
In January 2023, the vice president of the United States awarded him the Congressional Space Medal of Honor for his bravery in commanding the first NASA Commercial Crew mission to the International Space Station.
Monday
October 6, 2025
09:00-09:30
Stage 2
Technology Demonstration: Honeywell
Type(s): Technology Demonstration
Monday
October 6, 2025
09:00-09:30
Stage 1
Technology Demonstration: HES
Type(s): Technology Demonstration
Monday
October 6, 2025
09:30-10:00
Stage 1
Designing In and Designing Out: Reducing Cybersecurity Risk and Technical Debt in Critical Infrastructure
Susan Peterson Sturm , Sr. Director, Business Development and Strategic Partnerships , Wabtec
Topic(s): Cybersecurity Risk Management Industrial Control Systems (ICS)
Type(s): Conference Track
This session will explore how critical infrastructure industries can integrate cybersecurity practices into operational technology to enhance efficiency and reduce technical debt. It will focus on embedding security into system requirements from the outset, minimizing labor-intensive maintenance and avoiding costly bolt-on solutions. By drawing from examples in other industries, this presentation will highlight the importance of lifecycle planning, security automation and addressing challenges like aging systems and vendor roadmaps. Attendees will gain insight into designing resilient, secure systems that align with operational demands for sustainable and efficient outcomes.

Susan is an operational technology leader with 20 years of experience scaling industrial software businesses, including cybersecurity. She has led P&Ls with over 150 million USD and excels in product management, M&A and strategic growth.
She mentors early-stage cybersecurity professionals and is the champion of a diverse cybersecurity workforce. Susan leads cybersecurity strategy for a critical infrastructure technology company, serves as board chair of One Warm Coat and is a board advisor to Navigating Grey.
Monday
October 6, 2025
10:15-10:45
Stage 1
2025 US Cybersecurity and Infrastructure Security Agency (CISA) Strategy for Industrial Control Systems (ICS)
Topic(s): Cybersecurity Industrial Control Systems (ICS) Risk Management Incident Response
Type(s): Conference Track
Monday
October 6, 2025
10:15-10:45
Stage 2
Navigating the Future of Automation: Real-World Insights from Bayer on Robotics Process Automation and Generative AI
Topic(s): Digital Transformation Artificial Intelligence (AI)
Type(s): Conference Track
Monday
October 6, 2025
11:00-11:30
Stage 1
Cyber Hardening of OT/SCADA Systems: A Roadmap to Successful Implementation
Rufus Handsome , Technical Advocate , GICSP, InSource Solutions
Topic(s): Cybersecurity Industrial Control Systems (ICS) Risk Management Incident Response
Type(s): Conference Track
Securing Operational Technology (OT) and Supervisory Control and Data Acquisition (SCADA) systems is increasingly critical as they become prime targets for malicious attacks across industries. Rufus Handsome will discuss how cyber hardening, the process of fortifying systems through tailored security measures, is essential yet often challenging due to the divergence between IT-centric security protocols and the unique requirements of OT\SCADA environments.
Rufus will discuss practical strategies for implementing effective cybersecurity measures in OT/SCADA systems without disrupting operations. He will draw on insights and experiences from InSource's work with its clients, covering the importance of cybersecurity, common vulnerabilities, consequences and a collaborative project-based approach involving various professionals.

Monday
October 6, 2025
11:00-11:30
Stage 2
X-Former: Using Contrastive Reconstruction Learning for MLLMs using Computer Vision
Swetha Sirnam , University of Central Florida
Topic(s): Digital Transformation Computer Vision Large Language Models (LLMs)
Type(s): Conference Track

Monday
October 6, 2025
11:30-12:00
Stage 2
How to Upgrade Your Cybersecurity, Incident Response and Training with Gamification and AI - A Practical Guide
Clint Bodungen , Founder , ThreatGEN
Topic(s): Artificial Intelligence (AI) Digital Transformation
Type(s): Conference Track
Are you not getting the expected value out of your incident response exercises? Is your cybersecurity training outdated and boring? Can gamification help? What is gamification? What about the latest trend, generative AI? Can I use it, safely and securely, to improve my cybersecurity training and even my overall OT cybersecurity program? In this presentation, Clint will answer these questions with practical advice, strategies and actionable examples of how you can use gamification and generative AI to solve some of your most pressing cybersecurity issues.

Clint is a globally recognized ICS cybersecurity professional and thought leader with 30 years of experience focusing primarily on industrial cybersecurity, red teaming and risk assessment. He is the author of two best-selling books, "Hacking Exposed: Industrial Control Systems" and “ChatGPT for Cybersecurity Cookbook.” He is a United States Air Force veteran and has worked for notable cybersecurity firms like Symantec, Booz Allen Hamilton, Kaspersky Lab and is currently the Founder/Head of Product Innovation at ThreatGEN as well as the Director of Cyber Innovation at MorganFranklin Cyber.
Renowned for his creative approach to cybersecurity education and training, Clint has been at the forefront of integrating gamification and AI applications into cybersecurity training. He created “ThreatGEN® Red vs. Blue,” the world's first online multiplayer computer designed to teach real-world cybersecurity, and “AutoTableTop,” which uses the latest generative AI technology to automate, simplify and enhance IR tabletop exercises. As AI technology continues to evolve, he hopes to help revolutionize the cybersecurity industry using gamification and generative AI.
Monday
October 6, 2025
11:30-12:00
Stage 1
Network Defense for Close-In Cyber Attacks
Lennart Koopman , Founder , nzyme
Topic(s): Cybersecurity Threat Intelligence Risk Management
Type(s): Conference Track

Lennart is the creator of the nzyme Network Defense System, a free and open solution that empowers organizations to protect their networks from close proximity attacks. Prior to nzyme, he founded the Graylog project in 2010 and led the development of its commercial counterpart in 2013.
Monday
October 6, 2025
12:30-13:00
Stage 1
State of the Society Address
Topic(s): Policy Leadership Strategy
Monday
October 6, 2025
13:15-14:00
Stage 1
Panel Discussion: IT/OT Convergence
Patrick O'Brien , Cybersecurity Team Lead , exida
Katherine Hutton , Product Manager, Cybersecurity , Fluence
Tobi Abori , Networking Engineer , Shell
Mohammed Hammouden , Aramco Chair of Cybersecurity , King Fahd University
Topic(s): Cybersecurity Threat Intelligence Risk Management
Type(s): Conference Track




Monday
October 6, 2025
13:15-14:00
Stage 2
Panel Discussion: Industrial Connectivity - Successful Implementation of 5G
Mark Kraeling , GE Transportation
Phil Tomlinson , Grundfos
Topic(s): Connectivity 5G Digital Transformation
Type(s): Conference Track


Monday
October 6, 2025
14:30-15:00
Stage 2
Advancing Data Quality to Dictate Your Success: Considerations of Enterprise Date Integration and Use
Topic(s): Digital Transformation Data Management
Type(s): Conference Track
Tuesday
October 7, 2025
09:30-10:00
Stage 2
Fireside Chat: How to Fuel Innovation in Traditionally Rigid Environments
Jeff Winter , VP, Business Strategy , Critical Manufacturing
Meaghan Ziemba , Host , Mavens of Manufacturing
Topic(s): Digital Transformation New Technology Strategy
Type(s): Conference Track

Jeff is a globally recognized thought leader in Industry 4.0 and manufacturing, with over 55 million views of his content and 110,000 LinkedIn followers. Honored more than 25 times as a top expert in his field, Jeff excels at simplifying and communicating complex concepts to diverse audiences, from the shop floor to the executive boardroom. With nearly 20 years of experience in industrial automation, he is a passionate advocate for digital transformation. Jeff is also highly active in the Industry 4.0 community. He serves on the Executive board for the International Society of Automation (ISA), the International Board of Directors for MESA (Manufacturing Enterprise Solutions Association), a U.S. registered expert for the IEC (International Electrotechnical Commission) as a member of TC 65 and as a Smart Manufacturing Advisor to CESMII.
.jpg?width=417&height=417&name=Meaghan-Ziemba%20(1).jpg)
Meaghan is not your average industrial tech writer—she’s a storytelling powerhouse, brand champion and marketing guru for industrial manufacturers. With a B.A. and M.A. in Professional and Technical Writing from the University of Wisconsin-Milwaukee, she’s been crafting compelling content for the manufacturing sector since 2008. If it’s complex, technical or a bit gritty, Meaghan knows how to make it shine.
As the host of Mavens of Manufacturing, a live video broadcast series spotlighting women in the industry, Meaghan is on a mission to inspire the next generation to embrace careers in manufacturing and engineering. She’s not just closing the gender and skills gaps—she’s smashing stereotypes along the way.
But wait, there’s more! Meaghan is a single mom of three amazing kids, which means she’s a professional multitasker, problem-solver and master of the art of chaos management. When she’s not juggling school projects, hockey and baseball events and bedtime stories, you can find her lifting heavy at CrossFit, experimenting in the kitchen, or savoring her hard-earned moments with a strong cup of coffee or a perfectly poured glass of whiskey.
Meaghan doesn’t just write stories—she lives them, blending passion, purpose and a touch of badassery into everything she does.
Tuesday
October 7, 2025
09:30-10:00
Stage 3
Thriving with AI - How to Benefit Not Hinder Your Career Opportunities
Wayne Butterfield , Partner - AI, Automation & Contact Center Transformation , ISG
Topic(s): Leadership Strategy
Type(s): Conference Track

Tuesday
October 7, 2025
09:30-10:00
Stage 1
Surprise Session! Stay Tuned for More Details!
Topic(s): Cybersecurity Threat Intelligence
Type(s): Conference Track
Tuesday
October 7, 2025
10:15-10:45
Stage 2
Upcoming Regulation for Users to Test Safety Functions—Link to Proof Test Procedures
Michael Guilfoyle , Services & Support Manager , Pilz Ireland
Type(s): Conference Track

Tuesday
October 7, 2025
10:15-10:45
Stage 1
Maturing Your OT Cybersecurity Process: TSA Regulations
Topic(s): Cybersecurity Aerospace Standards & Regulations
Type(s): Conference Track
Tuesday
October 7, 2025
10:15-10:45
Stage 3
The Importance of Managing Burnout
Rajen Patel , Chief Technology Officer , Metis | Radiation Cancer Specialist
Topic(s): Leadership Strategy
Type(s): Conference Track

Tuesday
October 7, 2025
11:00-11:30
Stage 1
Protecting the Supply Chain with Maritime Cybersecurity
Marco Ayala , President , Houston InfraGard Members Alliance
Topic(s): Maritime Cybersecurity Supply Chain
Type(s): Conference Track
As maritime operations handle 80% of global trade, the sector is essential yet increasingly vulnerable to cyber threats. This session will outline critical cybersecurity challenges in maritime, illustrating why effective protection is vital to maintaining the global supply chain.
We’ll explore the core vulnerabilities unique to maritime environments, such as outdated systems and the complexity of third-party access, while highlighting the importance of robust network segmentation and secure system interdependencies. Attendees will gain concise insights into best practices from standards like ISA/IEC 62443 and NIST to build a layered defense.
Concluding with a streamlined roadmap, this talk will cover actionable steps for advancing cybersecurity maturity across maritime operations, focusing on rapid-response strategies, effective training, and collaborative improvement. By fortifying maritime cybersecurity, we can better protect the supply chain that sustains global trade.

Marco has 30 years of field experience, during which time he designed, implemented and maintained process instrumentation, automation systems, safety systems and process control networks. In his role with a large global manufacturing company, he is responsible for applications globally that are specific to plant site operations and corporate governance.
With around two decades focused specifically on industrial cybersecurity, he has led efforts to secure the oil and gas (all streams), maritime port, offshore facilities and chemical sectors supporting federal, local and state entities in securing the private sector.
Marco is highly active in the International Society of Automation (ISA) and is a longtime member and newly elected to the Executive Board. He is a 22-year Senior Member and a certified cyber instructor for ISA/IEC 62443 with volunteering commitments and contributor to the AMSC Gulf of America (Mexico) cybersecurity committee in a sworn-in role to the USCG as Chair of Threat Intelligence and Cybersecurity for the outer continental shelf (OCS).
He has been an InfraGard member since 2014 and is currently serving as President of the Houston Members Alliance.
Tuesday
October 7, 2025
11:00-11:30
Stage 2
Investing in a Digital Transformation Strategy
Dr. Alison Perez , Venture Capitalist , Lockheed Martin Ventures
Topic(s): Digital Transformation Strategy
Type(s): Conference Track
This session will focus on the significance of investing in a digital transformation strategy that fosters organic and inorganic growth within organizations while building an innovative ecosystem.

Dr. Ali Perez joined Lockheed Martin Ventures in 2021. Ali is responsible for investments in human potential, biotechnology, man-unmanned teaming, digital transformation and advanced manufacturing. Her role also supports post-deal integration and transition of technology from the Ventures portfolio into Lockheed pursuits and programs. She runs the Ventures internal research and development program that provides LM engineers with opportunities to collaborate with start-up companies that Lockheed Martin Ventures has invested in.
Prior to joining Lockheed Martin Ventures, Ali worked to manage Lockheed’s Technology Strategy and Research (TS&R) portfolio under the VP of TS&R. She started her career at Lockheed in the Advanced Technology Laboratories running research programs in neuroscience, human and autonomy collaboration, man-unmanned teaming and artificial intelligence. Before joining Lockheed, Ali worked for the University of Texas at Dallas conducting research in neurophysiology and cognitive training for individuals with traumatic brain injury and cognitive impairments.
Ali received an M.S and Ph.D. in Cognitive Neuroscience from the University of Texas at Dallas and her B.A in Experimental Psychology from the University of South Carolina.
Tuesday
October 7, 2025
11:00-11:30
Stage 3
If You're Not Building Your Brand, Someone Else Is
Meaghan Ziemba , Host , Mavens of Manufacturing
Topic(s): Leadership Strategy
Type(s): Conference Track
.jpg?width=417&height=417&name=Meaghan-Ziemba%20(1).jpg)
Meaghan is not your average industrial tech writer—she’s a storytelling powerhouse, brand champion and marketing guru for industrial manufacturers. With a B.A. and M.A. in Professional and Technical Writing from the University of Wisconsin-Milwaukee, she’s been crafting compelling content for the manufacturing sector since 2008. If it’s complex, technical or a bit gritty, Meaghan knows how to make it shine.
As the host of Mavens of Manufacturing, a live video broadcast series spotlighting women in the industry, Meaghan is on a mission to inspire the next generation to embrace careers in manufacturing and engineering. She’s not just closing the gender and skills gaps—she’s smashing stereotypes along the way.
But wait, there’s more! Meaghan is a single mom of three amazing kids, which means she’s a professional multitasker, problem-solver and master of the art of chaos management. When she’s not juggling school projects, hockey and baseball events and bedtime stories, you can find her lifting heavy at CrossFit, experimenting in the kitchen, or savoring her hard-earned moments with a strong cup of coffee or a perfectly poured glass of whiskey.
Meaghan doesn’t just write stories—she lives them, blending passion, purpose and a touch of badassery into everything she does.
Tuesday
October 7, 2025
11:30-12:00
Stage 1
Technology Demonstration: Control Station
Dennis Nash , President and Chief Executive Officer , Control Station
Topic(s): Cybersecurity
Type(s): Technology Demonstration

Tuesday
October 7, 2025
12:30-13:00
Stage 1
Panel Discussion: Safety and Cyber Concerns for Physical Systems
Molly O'Brien , Senior Safety Engineer, PhD CSFP , exida Certification
Moderator: Sunil Doddi
Steve Mustard , President , Au2mation
Felipe Costa , Senior Product Marketing Manager - Networking & Cybersecurity , Moxa Americas
Topic(s): Cybersecurity
Type(s): Conference Track



Steve Mustard, PE, CAP, GICSP, CMCP, has over 35 years of experience in the automation industry. He has developed embedded software and hardware for military applications and created products for industrial automation and control systems. Currently, much of his work focuses on assessing the cybersecurity readiness of organizations in critical infrastructure.
In addition to being the former 2021 ISA President, Mustard holds multiple certifications and professional engineering licenses. These include being a licensed Professional Engineer (PE), an ISA Certified Automation Professional (CAP), a UK-registered Chartered Engineer (CEng), a Fellow of the Institution of Engineering & Technology, a European-registered Engineer (EUR Ing), a Global Industrial Cyber Security Professional (GICSP), and a Certified Mission Critical Professional (CMCP).

Tuesday
October 7, 2025
12:30-13:00
Stage 2
IIoT for Use in Predictive Maintenance
Brian Romano , Director of Technology Development , The Arthur G. Russell Co., Inc.
Dr. Ravindra Thamma , Central Connecticut State University
Topic(s): Digital Transformation
Type(s): Conference Track

Brian, currently the Director of Technology Development at The Arthur G. Russell Co., has been in the process and automation control systems industry for more than 40 years, starting as a bench technician. After serving as president of a division for an automated machine builder, he owned a systems integration company, growing and positioning it as one with expertise in connecting the factory floor to the front office. To keep current with the ever-evolving automation industry, Brian holds an AS, BS, MS and MBA and Ph.D. in Technology and Innovation. He has been designing and implementing Industry 4.0 solutions, starting initially in 2004 connecting factory floor data systems to customer business systems.
Understanding the skills gap and workforce shortage in the control systems engineering profession, Brian leverages his academic knowledge and years of experience to teach the next generation of engineers at two local universities. He also serves as an industrial advisory board member for two technology and engineering universities, as a member of the CSIA Digital Committee and as chair of the ISA Smart Manufacturing Division IIoT committee, where he was awarded the 2022 ISA SM/IIoT Division Leader of the Year Award. Brian has been presenting at trade and professional society conferences for several years, publishes articles and has been quoted and interviewed for several automation publications.

Tuesday
October 7, 2025
12:30-13:00
Stage 3
Failure as Fuel: Transforming Setbacks into Catalysts for Growth and Success
Leigh-Kathryn Bonner
Topic(s): Strategy Leadership
Type(s): Conference Track

Tuesday
October 7, 2025
13:00-13:45
Stage 2
Panel Discussion: Data Governance
Topic(s): Data Management
Type(s): Conference Track
Tuesday
October 7, 2025
13:00-13:45
Stage 3
The Technical Expert vs. Business Leader Dilemma: Choosing Your Career Journey
Rahul Raveendran , Blue Marvel
Topic(s): Leadership Strategy
Type(s): Conference Track

Tuesday
October 7, 2025
14:30-15:00
Stage 1
When Robots Start Acting Crazy (A Security Approach)
Jordan Bonagura , Senior Security Consultant , Secure Ideas
Topic(s): Robotics Cybersecurity Connectivity Artificial Intelligence (AI) Threat Intelligence Automation Control Data Management Incident Response Risk Management
Type(s): Conference Track
In today’s rapidly evolving technological landscape, robots are becoming integral to business operations, from Robotic Process Automation (RPA) tools streamlining workflows to Low-Code/No-Code (LCNC) platforms enabling business users to automate processes without deep programming expertise. But what happens when these robots, designed to improve efficiency and reduce human error, start to behave unpredictably? When automation goes awry, it can lead to vulnerabilities, operational disruptions and even security breaches. In this session, we will explore the intersection of automation and security, focusing on the risks posed by RPA and LCNC technologies. We'll dive into real-world scenarios where robotic automation “goes rogue” and examine the potential impact on your organization’s data, infrastructure and compliance posture. From unexpected behavior in automated workflows to security loopholes in custom-built LCNC applications, we'll cover how to recognize, mitigate and recover from these challenges.

Jordan is a Senior Security Consultant for Secure Ideas. With more than 20 years of experience in information security, he is passionate about helping companies and clients protect their data and applications from threats and vulnerabilities. As a principal security researcher, he led teams conducting vulnerability management, risk assessments, penetration tests and boundary-setting to comply with standards for companies in different segments. Jordan contributed to significant projects, such as developing an integrated GNSS positioning system and an encryption communication protocol between ground and satellite at the Brazilian National Institute of Space Research. He also has had the opportunity to speak at some of the most important security conferences around the globe, be a college professor and course coordinator, and consult for the Brazilian police in crime solving.
Tuesday
October 7, 2025
14:30-15:00
Stage 2
Introduction to ISA112 & SCADA Systems Case Study
Topic(s): SCADA ISA112 Standards & Regulations Water/Wastewater
Type(s): Conference Track
Tuesday
October 7, 2025
14:30-15:00
Stage 3
Failure as Fuel: Transforming Setbacks into Catalysts for Growth and Success
Topic(s): Leadership Strategy
Type(s): Conference Track
Tuesday
October 7, 2025
15:15-15:45
Stage 2
Using Machine Learning to Predict Highest-Risk Groundwater Sites to Improve Water Quality Monitoring
Yaroslova Yingling , Director of Materials, Science and Engineering Undergraduate Program , North Carolina State University
Topic(s): Water/Wastewater Digital Transformation Data Management
Type(s): Conference Track
Accurately assessing and managing risks associated with inorganic pollutants in groundwater is imperative. Historical water quality databases are often sparse due to rationale or financial budgets for sample collection and analysis, posing challenges in evaluating exposure or water treatment effectiveness. We utilized and compared two advanced multiple data imputation techniques, AMELIA and MICE algorithms, to fill gaps in sparse groundwater quality data sets. AMELIA outperformed MICE in handling missing values, as MICE tended to overestimate certain values, resulting in more outliers. Field data sets revealed that 75% to 80% of samples exhibited no co-occurring regulated pollutants surpassing MCL values, whereas imputed values showed only 15% to 55% of the samples posed no health risks. Imputed data unveiled a significant increase, ranging from 2 to 5 times, in the number of sampling locations predicted to potentially exceed health-based limits and identified samples where 2 to 6 co-occurring chemicals may occur and surpass health-based levels. Linking imputed data to sampling locations can pinpoint potential hotspots of elevated chemical levels and guide optimal resource allocation for additional field sampling and chemical analysis. With this approach, further analysis of complete data sets allows state agencies authorized to conduct groundwater monitoring, often with limited financial resources, to prioritize sampling locations and chemicals to be tested. Given existing data and time constraints, it is crucial to identify the most strategic use of the available resources to address data gaps effectively. This work establishes a framework to enhance the beneficial impact of funding groundwater data collection by reducing uncertainty in prioritizing future sampling locations and chemical analyses.

Tuesday
October 7, 2025
15:15-15:45
Stage 1
Building Future-Ready OT Security Strategy: GenAI's Impact on the Secure Software Development Lifecycle and Secure Supply Chain Management Practices
Jessa Davis , Security Consulting Manager , Accenture
Katherine Tatom , Security Consultant , Accenture
Topic(s): Artificial Intelligence (AI) Supply Chain Cybersecurity Risk Management Strategy
Type(s): Conference Track
GenAI tools and products will serve to intensify trends associated with digital transformation and IT/OT convergence by delivering transformative opportunities alongside unprecedented cybersecurity challenges for OT security programs. As the threat landscape adjusts to the prevalence of these new technical advances, OT asset operators must begin to think differently about the role of these systems within a data-enabled enterprise architecture. This presentation will explore the critical role of a Secure Software Development Lifecycle (SSDLC) and of Secure Supply Chain Management (SSCM) practices tailored to the unique demands of OT environments. Focusing on the intersection of legacy OT systems, GenAI-enabled tools and data-driven security architectures, an application of the ISA/IEC 62443 standards to the internet of energy, smart manufacturing, maritime ecosystems and intelligent transportation systems environments will be discussed.

Jessa Davis (she/her) is a Security Consulting Manager at Accenture, specializing in cyber-physical systems and operational technology cybersecurity for electric utilities clients. Prior to joining Accenture, Jessa worked as an industrial controls system engineer in the oil and gas industry and as a blockchain software developer with the United Nations Office for Project Services in Kathmandu, Nepal. Her research interests include GenAI OT safety, distributed energy resources cybersecurity and cyber resilience strategies for the smart grid. She resides in Seattle, WA.
.jpg?width=417&height=417&name=Katherine%20Tatom%20(1).jpg)
Katherine Tatom (she/her) is a Security Consultant at Accenture, where she specializes in OT security, artificial intelligence and assessments for electric utility clients. Prior to joining Accenture, Katherine graduated from Bloomsburg University with a degree in digital forensics. She also completed an internship with Revolutionary Security on their OT Assessment and Testing team, where she assisted with penetration tests for clients and designed a virtual machine to be used by team members during assessments. Her specializations and research interests include cybersecurity analytics, application security, and alternative intelligence (AI) in the grid space.
Tuesday
October 7, 2025
15:15-15:45
Stage 3
The 6 Tools of Winning Managers
Jeremy Wall
Topic(s): Leadership Strategy
Type(s): Conference Track

Tuesday
October 7, 2025
15:45-16:00
Stage 1
ISA Standards Overview
Topic(s): Standards & Regulations
Type(s): Conference Track
Tuesday
October 7, 2025
16:15-16:45
Stage 1
ISA Standards Forum: Regulation, Compliance, Legislation
Topic(s): Standards & Regulations Strategy Leadership
Type(s): Conference Track