View by Topic
View by Type
View by Day
Monday
October 6, 2025
08:00-08:45
Stage 1
To Infinity and Beyond: Innovation in Spaceflight
Douglas Hurley , Retired Astronaut , NASA
Topic(s): Aerospace Digital Transformation Leadership Strategy
Type(s): Keynote

Uniquely accomplished and decorated aerospace executive, astronaut, test pilot and engineer with over 30 years of specialized experience operating, managing and leading the most innovative aerospace and aviation technologies in service to NASA’s human spaceflight program and the U.S. Marine Corps., Doug Hurley has logged over 5,500 hours in more than 25 aircraft and two space vehicles as well as logging over three months in space.
A veteran of three spaceflights, Doug served as Pilot of the last Space Shuttle flight in 2011 and Commander of the first test flight of the SpaceX Crew Dragon in 2020. He became one of the first two astronauts in history to launch aboard a commercial orbital spacecraft. For five years before the successful launch, he served as a liaison, consultant and test pilot on behalf of NASA to the company’s operations and development teams.
In January 2023, the vice president of the United States awarded him the Congressional Space Medal of Honor for his bravery in commanding the first NASA Commercial Crew mission to the International Space Station.
Monday
October 6, 2025
09:00-09:30
Stage 2
Technology Demonstration: Honeywell
Type(s): Technology Demonstration
Monday
October 6, 2025
09:00-09:30
Stage 1
Technology Demonstration: HES
Type(s): Technology Demonstration
Monday
October 6, 2025
09:30-10:00
Stage 2
Automation in Theme Parks
Lauren Etta Riley , Sr. Manager, Design and Engineering , Falcon Attractions
Type(s): Conference Track

Monday
October 6, 2025
09:30-10:00
Stage 1
Designing In and Designing Out: Reducing Cybersecurity Risk and Technical Debt in Critical Infrastructure
Susan Peterson Sturm , Sr. Director, Business Development and Strategic Partnerships , Wabtec
Topic(s): Cybersecurity Risk Management Industrial Control Systems (ICS)
Type(s): Conference Track
This session will explore how critical infrastructure industries can integrate cybersecurity practices into operational technology to enhance efficiency and reduce technical debt. It will focus on embedding security into system requirements from the outset, minimizing labor-intensive maintenance and avoiding costly bolt-on solutions. By drawing from examples in other industries, this presentation will highlight the importance of lifecycle planning, security automation and addressing challenges like aging systems and vendor roadmaps. Attendees will gain insight into designing resilient, secure systems that align with operational demands for sustainable and efficient outcomes.

Susan is an operational technology leader with 20 years of experience scaling industrial software businesses, including cybersecurity. She has led P&Ls with over 150 million USD and excels in product management, M&A and strategic growth.
She mentors early-stage cybersecurity professionals and is the champion of a diverse cybersecurity workforce. Susan leads cybersecurity strategy for a critical infrastructure technology company, serves as board chair of One Warm Coat and is a board advisor to Navigating Grey.
Monday
October 6, 2025
10:15-10:45
Stage 2
Investing in a Digital Transformation Strategy
Dr. Alison Perez , Venture Capitalist , Lockheed Martin Ventures
Topic(s): Digital Transformation Strategy
Type(s): Conference Track
This session will focus on the significance of investing in a digital transformation strategy that fosters organic and inorganic growth within organizations while building an innovative ecosystem.

Dr. Ali Perez joined Lockheed Martin Ventures in 2021. Ali is responsible for investments in human potential, biotechnology, man-unmanned teaming, digital transformation and advanced manufacturing. Her role also supports post-deal integration and transition of technology from the Ventures portfolio into Lockheed pursuits and programs. She runs the Ventures internal research and development program that provides LM engineers with opportunities to collaborate with start-up companies that Lockheed Martin Ventures has invested in.
Prior to joining Lockheed Martin Ventures, Ali worked to manage Lockheed’s Technology Strategy and Research (TS&R) portfolio under the VP of TS&R. She started her career at Lockheed in the Advanced Technology Laboratories running research programs in neuroscience, human and autonomy collaboration, man-unmanned teaming and artificial intelligence. Before joining Lockheed, Ali worked for the University of Texas at Dallas conducting research in neurophysiology and cognitive training for individuals with traumatic brain injury and cognitive impairments.
Ali received an M.S and Ph.D. in Cognitive Neuroscience from the University of Texas at Dallas and her B.A in Experimental Psychology from the University of South Carolina.
Monday
October 6, 2025
10:15-10:45
Stage 1
2025 US Cybersecurity and Infrastructure Security Agency (CISA) Strategy for Industrial Control Systems (ICS)
Topic(s): Cybersecurity Industrial Control Systems (ICS) Risk Management Incident Response
Type(s): Conference Track
Monday
October 6, 2025
11:00-11:30
Stage 2
Strawberries, Chatbots, and Lawyers: How Your Enterprise Can Deploy Real AI Solutions Effectively Without Pitfalls
Dr. Johnathan Mell , Assistant Professor , University of Central Florida
Topic(s): Artificial Intelligence (AI) Strategy
Type(s): Conference Track
Engineering teams are under increasing pressure to integrate large language models and other generative AI tools into real-world workflows as AI continues to proliferate across enterprise systems. While these systems can accelerate productivity, they can also fail in surprising and costly ways when deployed without guardrails or domain adaptation.
This talk explores the practical realities of deploying AI in human-centered domains, where ambiguity, emotion and contextual nuance dominate. I begin with a set of cautionary industry examples—including a misconfigured airline chatbot that resulted in a small claims court loss and an AI-generated legal brief
that fabricated case law—illustrating how generative systems can propagate errors that pass surface-level inspection but fail under scrutiny.
I then present two applied case studies from ongoing research: Healthcare Conflict Resolution Training: An AI-powered system used to train workers on managing emotionally sensitive caregiver conflicts, where the goal is not just information delivery but simulating de-escalation strategies.
AI for Negotiation Skills: A dialogue-based AI platform for negotiation training, where trainees engage in strategic conversations with adaptive agents to practice persuasion, signaling, and deal-making under pressure.
These systems highlight where AI succeeds: not in replacing humans, but in creating adaptive, semistructured environments that enhance learning, resilience and performance. I’ll discuss design lessons on human-AI interaction fidelity, edge-case failure handling, model interpretability, and how to think critically about when not to automate.
Attendees will leave with concrete insights into how to scope, test, and deploy AI responsibly, especially in high-stakes contexts where automation meets judgment.

Monday
October 6, 2025
11:00-11:30
Stage 1
Cyber Hardening of OT/SCADA Systems: A Roadmap to Successful Implementation
Rufus Handsome , Technical Advocate , GICSP, InSource Solutions
Topic(s): Cybersecurity Industrial Control Systems (ICS) Risk Management Incident Response
Type(s): Conference Track
Securing Operational Technology (OT) and Supervisory Control and Data Acquisition (SCADA) systems is increasingly critical as they become prime targets for malicious attacks across industries. Rufus Handsome will discuss how cyber hardening, the process of fortifying systems through tailored security measures, is essential yet often challenging due to the divergence between IT-centric security protocols and the unique requirements of OT\SCADA environments.
Rufus will discuss practical strategies for implementing effective cybersecurity measures in OT/SCADA systems without disrupting operations. He will draw on insights and experiences from InSource's work with its clients, covering the importance of cybersecurity, common vulnerabilities, consequences and a collaborative project-based approach involving various professionals.

Monday
October 6, 2025
11:30-12:00
Stage 1
How to Upgrade Your Cybersecurity, Incident Response and Training with Gamification and AI - A Practical Guide
Clint Bodungen , Founder , ThreatGEN
Topic(s): Artificial Intelligence (AI) Digital Transformation
Type(s): Conference Track
Are you not getting the expected value out of your incident response exercises? Is your cybersecurity training outdated and boring? Can gamification help? What is gamification? What about the latest trend, generative AI? Can I use it, safely and securely, to improve my cybersecurity training and even my overall OT cybersecurity program? In this presentation, Clint will answer these questions with practical advice, strategies and actionable examples of how you can use gamification and generative AI to solve some of your most pressing cybersecurity issues.

Clint is a globally recognized ICS cybersecurity professional and thought leader with 30 years of experience focusing primarily on industrial cybersecurity, red teaming and risk assessment. He is the author of two best-selling books, "Hacking Exposed: Industrial Control Systems" and “ChatGPT for Cybersecurity Cookbook.” He is a United States Air Force veteran and has worked for notable cybersecurity firms like Symantec, Booz Allen Hamilton, Kaspersky Lab and is currently the Founder/Head of Product Innovation at ThreatGEN as well as the Director of Cyber Innovation at MorganFranklin Cyber.
Renowned for his creative approach to cybersecurity education and training, Clint has been at the forefront of integrating gamification and AI applications into cybersecurity training. He created “ThreatGEN® Red vs. Blue,” the world's first online multiplayer computer designed to teach real-world cybersecurity, and “AutoTableTop,” which uses the latest generative AI technology to automate, simplify and enhance IR tabletop exercises. As AI technology continues to evolve, he hopes to help revolutionize the cybersecurity industry using gamification and generative AI.
Monday
October 6, 2025
12:30-13:00
Stage 1
State of the Society Address
Topic(s): Policy Leadership Strategy
Monday
October 6, 2025
13:15-14:00
Stage 2
Panel Discussion: Industrial Connectivity - Successful Implementation of Wireless and 5G
Mark Kraeling , GE Transportation
Phil Tomlinson , Grundfos
Lisa Garza , Celona
John Brand , Aeronix
Topic(s): Connectivity 5G Digital Transformation
Type(s): Conference Track




Monday
October 6, 2025
13:15-14:00
Stage 1
Panel Discussion: IT/OT Convergence
Patrick O'Brien , Cybersecurity Team Lead , exida
Katherine Hutton , Product Manager, Cybersecurity , Fluence
Tobi Abori , Networking Engineer , Shell
Mohammed Hammouden , Aramco Chair of Cybersecurity , King Fahd University
Topic(s): Cybersecurity Threat Intelligence Risk Management
Type(s): Conference Track




Monday
October 6, 2025
14:30-15:00
Stage 2
Advancing Data Democracy to Dictate Your Success: Leveraging Data Products for Enhanced Decision-Making
Berta Gutierrez Montes , Engineering Data Standardization Program Owner , Eli Lilly & Co.
Topic(s): Digital Transformation Data Management Artificial Intelligence (AI) Standards & Regulations
Type(s): Conference Track
Key principles such as discoverability, quality and security will be discussed, along with the critical role of data democratization in enabling broader access to trusted data. Attendees will gain practical insights into how a data product mindset can drive operational efficiency, empower teams with better data accessibility and support more informed, data-driven decision-making across the enterprise.

Industrial Engineer with over a decade of experience in the pharmaceutical manufacturing sector. She currently serves as the Engineering Data Standardization Program Owner at Eli Lilly and Company, where she is part of the Digital Manufacturing Engineering (DME) team within Lilly’s Corporate Engineering Tech
Center (ETC).
In her global role, she leads efforts to define and implement standardized data products and data models across Lilly’s manufacturing sites, with a focus on transforming OT/ET/IT data into contextualized, high-value assets. Her work bridges automation systems and advanced analytics applications, supporting key
use cases such as equipment performance optimization, maintenance strategies, data integrity and accelerated troubleshooting. With a strong background in manufacturing automation and a passion for digital transformation, she is committed to advancing data democratization and engineering excellence across the enterprise. Her work plays a pivotal role in enabling consistent, trusted and actionable data to support Lilly’s broader digital manufacturing vision.
Tuesday
October 7, 2025
08:00-8:45
Stage 1
Confessions of a Dirty Hacker: Over Two Decades as a Hacking Curmudgeon
Tom Liston , Owner , Bad Wolf Security
Topic(s): Cybersecurity Threat Intelligence
Type(s): Keynote

Tom is a seasoned cybersecurity professional whose career spans over two decades and is marked by significant contributions to the field. He first gained recognition in the security community with his response to the 2001 Code Red worm, developing LaBrea, the pioneering network tarpit tool. This work led to a nomination for eWeek Magazine's Innovations In Infrastructure (Iᵌ) award, showcasing his early influence in the sector.
At the SANS Internet Storm Center, Tom was known for his engaging and educational article series, Follow the Bouncing Malware. These pieces dissected various types of malware and did so with a unique blend of humor and expertise, making a complex subject accessible and engaging.
During his 15-year tenure at InGuardians, a widely respected security firm, his contributions were multifaceted and groundbreaking. He performed hundreds of penetration tests against organizations within the government and military as well as the financial, healthcare, entertainment, manufacturing and research sectors. As the technical lead for a U.S. Department of Homeland Security-funded project, he developed the first known virtual machine escape, demonstrating a VMware escape at the SANSFire security conference in 2007. Tom also helped create advanced tools and techniques for hardening virtual machines. He played a pivotal role in developing a security testing framework for critical infrastructure, specifically focusing on Smart Grid security.
In response to a significant attack on Sony, Warner Bros recruited Mr. Liston as their Principal Information Security Architect. Here, he rearchitected their network infrastructure, fortifying it against the evolving landscape of cyber threats, demonstrating his capacity to respond to real-world security challenges with innovative solutions.
His career has also focused on cybersecurity education. He worked with a highly skilled team to develop and deliver a comprehensive Security and Penetration Testing curriculum in the United Arab Emirates. His role at Counter Hack Challenges further highlighted his versatility and creativity. At Counter Hack, he performed high-end penetration tests, developed challenges for SANS NetWars, and led Red Team operations against U.S. Army Cyber Protection Brigades in a SANS Situational Training Exercise (STX). His involvement in helping Santa and the Elves create the annual SANS Holiday Hack Challenge is a testament to his commitment to education and practical cybersecurity application.
Tom’s career is characterized by groundbreaking developments, significant educational contributions and practical responses to some of today's most pressing cybersecurity challenges. His work continues to influence and shape the field of cybersecurity.
Tuesday
October 7, 2025
09:30-10:00
Stage 2
Fireside Chat: How to Fuel Innovation in Traditionally Rigid Environments
Jeff Winter , VP, Business Strategy , Critical Manufacturing
Meaghan Ziemba , Host , Mavens of Manufacturing
Topic(s): Digital Transformation New Technology Strategy
Type(s): Conference Track

Jeff is a globally recognized thought leader in Industry 4.0 and manufacturing, with over 55 million views of his content and 110,000 LinkedIn followers. Honored more than 25 times as a top expert in his field, Jeff excels at simplifying and communicating complex concepts to diverse audiences, from the shop floor to the executive boardroom. With nearly 20 years of experience in industrial automation, he is a passionate advocate for digital transformation. Jeff is also highly active in the Industry 4.0 community. He serves on the Executive board for the International Society of Automation (ISA), the International Board of Directors for MESA (Manufacturing Enterprise Solutions Association), a U.S. registered expert for the IEC (International Electrotechnical Commission) as a member of TC 65 and as a Smart Manufacturing Advisor to CESMII.
.jpg?width=417&height=417&name=Meaghan-Ziemba%20(1).jpg)
Meaghan is not your average industrial tech writer—she’s a storytelling powerhouse, brand champion and marketing guru for industrial manufacturers. With a B.A. and M.A. in Professional and Technical Writing from the University of Wisconsin-Milwaukee, she’s been crafting compelling content for the manufacturing sector since 2008. If it’s complex, technical or a bit gritty, Meaghan knows how to make it shine.
As the host of Mavens of Manufacturing, a live video broadcast series spotlighting women in the industry, Meaghan is on a mission to inspire the next generation to embrace careers in manufacturing and engineering. She’s not just closing the gender and skills gaps—she’s smashing stereotypes along the way.
But wait, there’s more! Meaghan is a single mom of three amazing kids, which means she’s a professional multitasker, problem-solver and master of the art of chaos management. When she’s not juggling school projects, hockey and baseball events and bedtime stories, you can find her lifting heavy at CrossFit, experimenting in the kitchen, or savoring her hard-earned moments with a strong cup of coffee or a perfectly poured glass of whiskey.
Meaghan doesn’t just write stories—she lives them, blending passion, purpose and a touch of badassery into everything she does.
Tuesday
October 7, 2025
09:30-10:00
Stage 1
Surprise Session! Stay Tuned for More Details!
Topic(s): Cybersecurity Threat Intelligence
Type(s): Conference Track
Tuesday
October 7, 2025
09:30-10:00
Stage 3
Thriving with AI - How to Benefit Not Hinder Your Career Opportunities
Wayne Butterfield , Partner - AI, Automation & Contact Center Transformation , ISG
Topic(s): Leadership Strategy
Type(s): Conference Track

Tuesday
October 7, 2025
10:15-10:45
Stage 2
Upcoming Regulation for Users to Test Safety Functions – Link to Proof Test Procedures as per ISA84/IEC 61511
Michael Guilfoyle , Services & Support Manager , Pilz Ireland
Topic(s): Standards & Regulations
Type(s): Conference Track

Tuesday
October 7, 2025
10:15-10:45
Stage 1
Network Defense for Close-In Cyber Attacks
Lennart Koopman , Founder , nzyme
Topic(s): Cybersecurity Threat Intelligence Risk Management
Type(s): Conference Track

Lennart is the creator of the nzyme Network Defense System, a free and open solution that empowers organizations to protect their networks from close proximity attacks. Prior to nzyme, he founded the Graylog project in 2010 and led the development of its commercial counterpart in 2013.
Tuesday
October 7, 2025
10:15-10:45
Stage 3
The Importance of Managing Burnout
Rajen Patel , Chief Technology Officer , Metis | Radiation Cancer Specialist
Topic(s): Leadership Strategy
Type(s): Conference Track

Tuesday
October 7, 2025
11:00-11:30
Stage 2
Theme Park Maintenance Innovation
Vijay Karthick Baskar , Sr. Partner Solutions Architect, Manufacturing AMER I&S , Amazon
Type(s): Conference Track

Tuesday
October 7, 2025
11:00-11:30
Stage 1
Protecting the Supply Chain with Maritime Cybersecurity
Marco Ayala , President , Houston InfraGard Members Alliance
Topic(s): Maritime Cybersecurity Supply Chain
Type(s): Conference Track
As maritime operations handle 80% of global trade, the sector is essential yet increasingly vulnerable to cyber threats. This session will outline critical cybersecurity challenges in maritime, illustrating why effective protection is vital to maintaining the global supply chain.
We’ll explore the core vulnerabilities unique to maritime environments, such as outdated systems and the complexity of third-party access, while highlighting the importance of robust network segmentation and secure system interdependencies. Attendees will gain concise insights into best practices from standards like ISA/IEC 62443 and NIST to build a layered defense.
Concluding with a streamlined roadmap, this talk will cover actionable steps for advancing cybersecurity maturity across maritime operations, focusing on rapid-response strategies, effective training, and collaborative improvement. By fortifying maritime cybersecurity, we can better protect the supply chain that sustains global trade.

Marco has 30 years of field experience, during which time he designed, implemented and maintained process instrumentation, automation systems, safety systems and process control networks. In his role with a large global manufacturing company, he is responsible for applications globally that are specific to plant site operations and corporate governance.
With around two decades focused specifically on industrial cybersecurity, he has led efforts to secure the oil and gas (all streams), maritime port, offshore facilities and chemical sectors supporting federal, local and state entities in securing the private sector.
Marco is highly active in the International Society of Automation (ISA) and is a longtime member and newly elected to the Executive Board. He is a 22-year Senior Member and a certified cyber instructor for ISA/IEC 62443 with volunteering commitments and contributor to the AMSC Gulf of America (Mexico) cybersecurity committee in a sworn-in role to the USCG as Chair of Threat Intelligence and Cybersecurity for the outer continental shelf (OCS).
He has been an InfraGard member since 2014 and is currently serving as President of the Houston Members Alliance.
Tuesday
October 7, 2025
11:00-11:30
Stage 3
If You're Not Building Your Brand, Someone Else Is
Meaghan Ziemba , Host , Mavens of Manufacturing
Topic(s): Leadership Strategy
Type(s): Conference Track
.jpg?width=417&height=417&name=Meaghan-Ziemba%20(1).jpg)
Meaghan is not your average industrial tech writer—she’s a storytelling powerhouse, brand champion and marketing guru for industrial manufacturers. With a B.A. and M.A. in Professional and Technical Writing from the University of Wisconsin-Milwaukee, she’s been crafting compelling content for the manufacturing sector since 2008. If it’s complex, technical or a bit gritty, Meaghan knows how to make it shine.
As the host of Mavens of Manufacturing, a live video broadcast series spotlighting women in the industry, Meaghan is on a mission to inspire the next generation to embrace careers in manufacturing and engineering. She’s not just closing the gender and skills gaps—she’s smashing stereotypes along the way.
But wait, there’s more! Meaghan is a single mom of three amazing kids, which means she’s a professional multitasker, problem-solver and master of the art of chaos management. When she’s not juggling school projects, hockey and baseball events and bedtime stories, you can find her lifting heavy at CrossFit, experimenting in the kitchen, or savoring her hard-earned moments with a strong cup of coffee or a perfectly poured glass of whiskey.
Meaghan doesn’t just write stories—she lives them, blending passion, purpose and a touch of badassery into everything she does.
Tuesday
October 7, 2025
11:30-12:00
Stage 1
Technology Demonstration: Control Station
Dennis Nash , President and Chief Executive Officer , Control Station
Topic(s): Cybersecurity
Type(s): Technology Demonstration

Tuesday
October 7, 2025
12:30-13:00
Stage 2
Revolutionizing Preventative Maintenance: Harnessing IIoT and Industry 4.0 for Reduced Downtime and Increased Efficiency
Brian Romano , Director of Technology Development , The Arthur G. Russell Co., Inc.
Dr. Ravindra Thamma , Central Connecticut State University
Topic(s): Digital Transformation
Type(s): Conference Track

Brian, currently the Director of Technology Development at The Arthur G. Russell Co., has been in the process and automation control systems industry for more than 40 years, starting as a bench technician. After serving as president of a division for an automated machine builder, he owned a systems integration company, growing and positioning it as one with expertise in connecting the factory floor to the front office. To keep current with the ever-evolving automation industry, Brian holds an AS, BS, MS and MBA and Ph.D. in Technology and Innovation. He has been designing and implementing Industry 4.0 solutions, starting initially in 2004 connecting factory floor data systems to customer business systems.
Understanding the skills gap and workforce shortage in the control systems engineering profession, Brian leverages his academic knowledge and years of experience to teach the next generation of engineers at two local universities. He also serves as an industrial advisory board member for two technology and engineering universities, as a member of the CSIA Digital Committee and as chair of the ISA Smart Manufacturing Division IIoT committee, where he was awarded the 2022 ISA SM/IIoT Division Leader of the Year Award. Brian has been presenting at trade and professional society conferences for several years, publishes articles and has been quoted and interviewed for several automation publications.

Tuesday
October 7, 2025
12:30-13:00
Stage 1
Panel Discussion: Safety and Cyber Concerns for Physical Systems
Moderator: Sunil Doddi , Senior Principal Process Controls Engineer , Air Products
Steve Mustard , President , Au2mation
Felipe Sabino Costa , Sr. Product Marketing Manager - Networking & Cybersecurity , Moxa Americas
Molly O'Brien , Senior Safety Engineer, PhD CSFP , exida Certification
Topic(s): Cybersecurity
Type(s): Conference Track

Sunil Doddi currently serves as a Senior Principal Process Controls Engineer at Air Products, where he develops process control systems and leads functional safety and cybersecurity initiatives for the global Hydrogen Refueling Systems (HRS) product line.
His career highlights include leading the development of the world's first fully automated hydrogen generation plant product line, a groundbreaking achievement that has garnered significant attention in the hydrogen industry. As a respected professional in his field, Sunil regularly authors papers on cybersecurity and functional safety and is frequently invited to speak at industry events.
His expertise in cybersecurity has earned him recognition in academia, and his work is incorporated into cybersecurity courses in universities.
Sunil is deeply involved with the International Society of Automation (ISA), contributing to standards development and serving in various roles. His recent contributions include:
- Editorial board member for ISA 84.91.03
- Member of ISA 99 Working Group 16 white paper
- Active contributor to ISA 106
He holds below certifications:
- ISA Certified Automation Professional (CAP)
- Exida Certified Functional Safety Expert (CFSE)
- ISA Cybersecurity Fundamentals Specialist certificate
In his leisure time, he indulges in reading about ancient technologies and continues to contribute actively to the ISA community.

Steve Mustard, PE, CAP, GICSP, CMCP, has over 35 years of experience in the automation industry. He has developed embedded software and hardware for military applications and created products for industrial automation and control systems. Currently, much of his work focuses on assessing the cybersecurity readiness of organizations in critical infrastructure.
In addition to being the former 2021 ISA President, Mustard holds multiple certifications and professional engineering licenses. These include being a licensed Professional Engineer (PE), an ISA Certified Automation Professional (CAP), a UK-registered Chartered Engineer (CEng), a Fellow of the Institution of Engineering & Technology, a European-registered Engineer (EUR Ing), a Global Industrial Cyber Security Professional (GICSP), and a Certified Mission Critical Professional (CMCP).


Tuesday
October 7, 2025
12:30-13:00
Stage 3
The 6 Tools of Winning Managers
Jeremy Wall
Topic(s): Leadership Strategy
Type(s): Conference Track

Tuesday
October 7, 2025
13:00-13:45
Stage 2
Panel Discussion: Data Governance
Topic(s): Data Management
Type(s): Conference Track
Tuesday
October 7, 2025
13:00-13:45
Stage 1
Attacking the Death Star While Bow-Ties Defend
Jim Gilsinn , ICS Cybersecurity Principal , MiTRE, ISA99
Topic(s): Cybersecurity
Type(s): Conference Track

Tuesday
October 7, 2025
13:00-13:45
Stage 3
The Technical Expert vs. Business Leader Dilemma: Choosing Your Career Journey
Co-moderator: Sherry LaBonne , Rockwell Automation
Julie Robinson , Rockwell Automation
Rahul Raveendran , Blue Marvel
Topic(s): Leadership Strategy
Type(s): Conference Track



Tuesday
October 7, 2025
14:30-15:00
Stage 2
Introduction to ISA112 & SCADA Systems Case Study
Manoj Yegnaraman, PE , ISA112 Voting Member, Vice President and Chief Instrumentation Engineer , Carollo Engineers
Alex Rowlett , Director of Utilities , City of Odessa, TX
Topic(s): SCADA ISA112 Standards & Regulations Water/Wastewater Instrumentation
Type(s): Conference Track


Tuesday
October 7, 2025
14:30-15:00
Stage 1
When Robots Start Acting Crazy (A Security Approach)
Jordan Bonagura , Senior Security Consultant , Secure Ideas
Topic(s): Robotics Cybersecurity Connectivity Artificial Intelligence (AI) Threat Intelligence Automation Control Data Management Incident Response Risk Management
Type(s): Conference Track
In today’s rapidly evolving technological landscape, robots are becoming integral to business operations, from Robotic Process Automation (RPA) tools streamlining workflows to Low-Code/No-Code (LCNC) platforms enabling business users to automate processes without deep programming expertise. But what happens when these robots, designed to improve efficiency and reduce human error, start to behave unpredictably? When automation goes awry, it can lead to vulnerabilities, operational disruptions and even security breaches. In this session, we will explore the intersection of automation and security, focusing on the risks posed by RPA and LCNC technologies. We'll dive into real-world scenarios where robotic automation “goes rogue” and examine the potential impact on your organization’s data, infrastructure and compliance posture. From unexpected behavior in automated workflows to security loopholes in custom-built LCNC applications, we'll cover how to recognize, mitigate and recover from these challenges.

Jordan is a Senior Security Consultant for Secure Ideas. With more than 20 years of experience in information security, he is passionate about helping companies and clients protect their data and applications from threats and vulnerabilities. As a principal security researcher, he led teams conducting vulnerability management, risk assessments, penetration tests and boundary-setting to comply with standards for companies in different segments. Jordan contributed to significant projects, such as developing an integrated GNSS positioning system and an encryption communication protocol between ground and satellite at the Brazilian National Institute of Space Research. He also has had the opportunity to speak at some of the most important security conferences around the globe, be a college professor and course coordinator, and consult for the Brazilian police in crime solving.
Tuesday
October 7, 2025
14:30-15:00
Stage 3
Failure as Fuel: Transforming Setbacks into Catalysts for Growth and Success
Leigh-Kathryn Bonner
Topic(s): Strategy Leadership
Type(s): Conference Track

Tuesday
October 7, 2025
15:15-15:45
Stage 2
Using Machine Learning to Predict Highest-Risk Groundwater Sites to Improve Water Quality Monitoring
Yaroslova Yingling , Director of Materials, Science and Engineering Undergraduate Program , North Carolina State University
Topic(s): Water/Wastewater Digital Transformation Data Management
Type(s): Conference Track
Accurately assessing and managing risks associated with inorganic pollutants in groundwater is imperative. Historical water quality databases are often sparse due to rationale or financial budgets for sample collection and analysis, posing challenges in evaluating exposure or water treatment effectiveness. We utilized and compared two advanced multiple data imputation techniques, AMELIA and MICE algorithms, to fill gaps in sparse groundwater quality data sets. AMELIA outperformed MICE in handling missing values, as MICE tended to overestimate certain values, resulting in more outliers. Field data sets revealed that 75% to 80% of samples exhibited no co-occurring regulated pollutants surpassing MCL values, whereas imputed values showed only 15% to 55% of the samples posed no health risks. Imputed data unveiled a significant increase, ranging from 2 to 5 times, in the number of sampling locations predicted to potentially exceed health-based limits and identified samples where 2 to 6 co-occurring chemicals may occur and surpass health-based levels. Linking imputed data to sampling locations can pinpoint potential hotspots of elevated chemical levels and guide optimal resource allocation for additional field sampling and chemical analysis. With this approach, further analysis of complete data sets allows state agencies authorized to conduct groundwater monitoring, often with limited financial resources, to prioritize sampling locations and chemicals to be tested. Given existing data and time constraints, it is crucial to identify the most strategic use of the available resources to address data gaps effectively. This work establishes a framework to enhance the beneficial impact of funding groundwater data collection by reducing uncertainty in prioritizing future sampling locations and chemical analyses.

Tuesday
October 7, 2025
15:15-15:45
Stage 1
Building Future-Ready OT Security Strategy: GenAI's Impact on the Secure Software Development Lifecycle and Secure Supply Chain Management Practices
Jessa Davis , Security Consulting Manager , Accenture
Katherine Tatom , Security Consultant , Accenture
Topic(s): Artificial Intelligence (AI) Supply Chain Cybersecurity Risk Management Strategy
Type(s): Conference Track
GenAI tools and products will serve to intensify trends associated with digital transformation and IT/OT convergence by delivering transformative opportunities alongside unprecedented cybersecurity challenges for OT security programs. As the threat landscape adjusts to the prevalence of these new technical advances, OT asset operators must begin to think differently about the role of these systems within a data-enabled enterprise architecture. This presentation will explore the critical role of a Secure Software Development Lifecycle (SSDLC) and of Secure Supply Chain Management (SSCM) practices tailored to the unique demands of OT environments. Focusing on the intersection of legacy OT systems, GenAI-enabled tools and data-driven security architectures, an application of the ISA/IEC 62443 standards to the internet of energy, smart manufacturing, maritime ecosystems and intelligent transportation systems environments will be discussed.

Jessa Davis (she/her) is a Security Consulting Manager at Accenture, specializing in cyber-physical systems and operational technology cybersecurity for electric utilities clients. Prior to joining Accenture, Jessa worked as an industrial controls system engineer in the oil and gas industry and as a blockchain software developer with the United Nations Office for Project Services in Kathmandu, Nepal. Her research interests include GenAI OT safety, distributed energy resources cybersecurity and cyber resilience strategies for the smart grid. She resides in Seattle, WA.
.jpg?width=417&height=417&name=Katherine%20Tatom%20(1).jpg)
Katherine Tatom (she/her) is a Security Consultant at Accenture, where she specializes in OT security, artificial intelligence and assessments for electric utility clients. Prior to joining Accenture, Katherine graduated from Bloomsburg University with a degree in digital forensics. She also completed an internship with Revolutionary Security on their OT Assessment and Testing team, where she assisted with penetration tests for clients and designed a virtual machine to be used by team members during assessments. Her specializations and research interests include cybersecurity analytics, application security, and alternative intelligence (AI) in the grid space.
Tuesday
October 7, 2025
15:45-16:00
Stage 1
ISA Standards Overview
Topic(s): Standards & Regulations
Type(s): Conference Track
Tuesday
October 7, 2025
16:15-16:45
Stage 1
ISA Standards Forum: Regulation, Compliance, Legislation
Vince Mezzano , Chair, ISA96 & Managing Director, ISA75, Fluor Senior Fellow , Control Systems Engineering
Topic(s): Standards & Regulations Strategy Leadership
Type(s): Conference Track
