View by Topic

View by Type

View by Day

To Infinity and Beyond: Innovation in Spaceflight

Douglas Hurley , Retired Astronaut , NASA

Topic(s): Aerospace Digital Transformation Leadership Strategy

Type(s): Keynote

Show more
Doug Hurley
Douglas Hurley Retired Astronaut NASA

Uniquely accomplished and decorated aerospace executive, astronaut, test pilot and engineer with over 30 years of specialized experience operating, managing and leading the most innovative aerospace and aviation technologies in service to NASA’s human spaceflight program and the U.S. Marine Corps., Doug Hurley has logged over 5,500 hours in more than 25 aircraft and two space vehicles as well as logging over three months in space.

A veteran of three spaceflights, Doug served as Pilot of the last Space Shuttle flight in 2011 and Commander of the first test flight of the SpaceX Crew Dragon in 2020. He became one of the first two astronauts in history to launch aboard a commercial orbital spacecraft. For five years before the successful launch, he served as a liaison, consultant and test pilot on behalf of NASA to the company’s operations and development teams.

In January 2023, the vice president of the United States awarded him the Congressional Space Medal of Honor for his bravery in commanding the first NASA Commercial Crew mission to the International Space Station.

Technology Demonstration: Honeywell

Type(s): Technology Demonstration

Technology Demonstration: HES

Type(s): Technology Demonstration

Automation in Theme Parks

Lauren Etta Riley , Sr. Manager, Design and Engineering , Falcon Attractions

Type(s): Conference Track

Show more
Lauren Etta Riley
Lauren Etta Riley Sr. Manager, Design and Engineering Falcon Attractions

Designing In and Designing Out: Reducing Cybersecurity Risk and Technical Debt in Critical Infrastructure

Susan Peterson Sturm , Sr. Director, Business Development and Strategic Partnerships , Wabtec

Topic(s): Cybersecurity Risk Management Industrial Control Systems (ICS)

Type(s): Conference Track

Show more

This session will explore how critical infrastructure industries can integrate cybersecurity practices into operational technology to enhance efficiency and reduce technical debt. It will focus on embedding security into system requirements from the outset, minimizing labor-intensive maintenance and avoiding costly bolt-on solutions. By drawing from examples in other industries, this presentation will highlight the importance of lifecycle planning, security automation and addressing challenges like aging systems and vendor roadmaps. Attendees will gain insight into designing resilient, secure systems that align with operational demands for sustainable and efficient outcomes. 

Susan Peterson Sturm
Susan Peterson Sturm Sr. Director, Business Development and Strategic Partnerships Wabtec

Susan is an operational technology leader with 20 years of experience scaling industrial software businesses, including cybersecurity. She has led P&Ls with over 150 million USD and excels in product management, M&A and strategic growth. 
 
She mentors early-stage cybersecurity professionals and is the champion of a diverse cybersecurity workforce. Susan leads cybersecurity strategy for a critical infrastructure technology company, serves as board chair of One Warm Coat and is a board advisor to Navigating Grey. 

Investing in a Digital Transformation Strategy

Dr. Alison Perez , Venture Capitalist , Lockheed Martin Ventures

Topic(s): Digital Transformation Strategy

Type(s): Conference Track

Show more

This session will focus on the significance of investing in a digital transformation strategy that fosters organic and inorganic growth within organizations while building an innovative ecosystem.

Allison Perez
Dr. Alison Perez Venture Capitalist Lockheed Martin Ventures

Dr. Ali Perez joined Lockheed Martin Ventures in 2021. Ali is responsible for investments in human potential, biotechnology, man-unmanned teaming, digital transformation and advanced manufacturing. Her role also supports post-deal integration and transition of technology from the Ventures portfolio into Lockheed pursuits and programs. She runs the Ventures internal research and development program that provides LM engineers with opportunities to collaborate with start-up companies that Lockheed Martin Ventures has invested in. 

Prior to joining Lockheed Martin Ventures, Ali worked to manage Lockheed’s Technology Strategy and Research (TS&R) portfolio under the VP of TS&R. She started her career at Lockheed in the Advanced Technology Laboratories running research programs in neuroscience, human and autonomy collaboration, man-unmanned teaming and artificial intelligence. Before joining Lockheed, Ali worked for the University of Texas at Dallas conducting research in neurophysiology and cognitive training for individuals with traumatic brain injury and cognitive impairments. 

Ali received an M.S and Ph.D. in Cognitive Neuroscience from the University of Texas at Dallas and her B.A in Experimental Psychology from the University of South Carolina.   

2025 US Cybersecurity and Infrastructure Security Agency (CISA) Strategy for Industrial Control Systems (ICS)

Topic(s): Cybersecurity Industrial Control Systems (ICS) Risk Management Incident Response

Type(s): Conference Track

Strawberries, Chatbots, and Lawyers: How Your Enterprise Can Deploy Real AI Solutions Effectively Without Pitfalls

Dr. Johnathan Mell , Assistant Professor , University of Central Florida

Topic(s): Artificial Intelligence (AI) Strategy

Type(s): Conference Track

Show more

Engineering teams are under increasing pressure to integrate large language models and other generative AI tools into real-world workflows as AI continues to proliferate across enterprise systems. While these systems can accelerate productivity, they can also fail in surprising and costly ways when deployed without guardrails or domain adaptation.

This talk explores the practical realities of deploying AI in human-centered domains, where ambiguity, emotion and contextual nuance dominate. I begin with a set of cautionary industry examples—including a misconfigured airline chatbot that resulted in a small claims court loss and an AI-generated legal brief
that fabricated case law—illustrating how generative systems can propagate errors that pass surface-level inspection but fail under scrutiny.
I then present two applied case studies from ongoing research: Healthcare Conflict Resolution Training: An AI-powered system used to train workers on managing emotionally sensitive caregiver conflicts, where the goal is not just information delivery but simulating de-escalation strategies.

AI for Negotiation Skills: A dialogue-based AI platform for negotiation training, where trainees engage in strategic conversations with adaptive agents to practice persuasion, signaling, and deal-making under pressure.

These systems highlight where AI succeeds: not in replacing humans, but in creating adaptive, semistructured environments that enhance learning, resilience and performance. I’ll discuss design lessons on human-AI interaction fidelity, edge-case failure handling, model interpretability, and how to think critically about when not to automate.

Attendees will leave with concrete insights into how to scope, test, and deploy AI responsibly, especially in high-stakes contexts where automation meets judgment.

 

generic head shot icon
Dr. Johnathan Mell Assistant Professor University of Central Florida

Cyber Hardening of OT/SCADA Systems: A Roadmap to Successful Implementation

Rufus Handsome , Technical Advocate , GICSP, InSource Solutions

Topic(s): Cybersecurity Industrial Control Systems (ICS) Risk Management Incident Response

Type(s): Conference Track

Show more

Securing Operational Technology (OT) and Supervisory Control and Data Acquisition (SCADA) systems is increasingly critical as they become prime targets for malicious attacks across industries. Rufus Handsome will discuss how cyber hardening, the process of fortifying systems through tailored security measures, is essential yet often challenging due to the divergence between IT-centric security protocols and the unique requirements of OT\SCADA environments.  

Rufus will discuss practical strategies for implementing effective cybersecurity measures in OT/SCADA systems without disrupting operations. He will draw on insights and experiences from InSource's work with its clients, covering the importance of cybersecurity, common vulnerabilities, consequences and a collaborative project-based approach involving various professionals.  

Rufus Handsome
Rufus Handsome Technical Advocate GICSP, InSource Solutions

How to Upgrade Your Cybersecurity, Incident Response and Training with Gamification and AI - A Practical Guide

Clint Bodungen , Founder , ThreatGEN

Topic(s): Artificial Intelligence (AI) Digital Transformation

Type(s): Conference Track

Show more

Are you not getting the expected value out of your incident response exercises? Is your cybersecurity training outdated and boring? Can gamification help? What is gamification? What about the latest trend, generative AI? Can I use it, safely and securely, to improve my cybersecurity training and even my overall OT cybersecurity program? In this presentation, Clint will answer these questions with practical advice, strategies and actionable examples of how you can use gamification and generative AI to solve some of your most pressing cybersecurity issues.

Clint Bodungen
Clint Bodungen Founder ThreatGEN

Clint is a globally recognized ICS cybersecurity professional and thought leader with 30 years of experience focusing primarily on industrial cybersecurity, red teaming and risk assessment. He is the author of two best-selling books, "Hacking Exposed: Industrial Control Systems" and “ChatGPT for Cybersecurity Cookbook.” He is a United States Air Force veteran and has worked for notable cybersecurity firms like Symantec, Booz Allen Hamilton, Kaspersky Lab and is currently the Founder/Head of Product Innovation at ThreatGEN as well as the Director of Cyber Innovation at MorganFranklin Cyber.

Renowned for his creative approach to cybersecurity education and training, Clint has been at the forefront of integrating gamification and AI applications into cybersecurity training. He created “ThreatGEN® Red vs. Blue,” the world's first online multiplayer computer designed to teach real-world cybersecurity, and “AutoTableTop,” which uses the latest generative AI technology to automate, simplify and enhance IR tabletop exercises. As AI technology continues to evolve, he hopes to help revolutionize the cybersecurity industry using gamification and generative AI. 

State of the Society Address

Topic(s): Policy Leadership Strategy

Panel Discussion: Industrial Connectivity - Successful Implementation of Wireless and 5G

Mark Kraeling , GE Transportation

Phil Tomlinson , Grundfos

Lisa Garza , Celona

John Brand , Aeronix

Topic(s): Connectivity 5G Digital Transformation

Type(s): Conference Track

Show more
Mark Kraeling - 100px
Mark Kraeling GE Transportation
generic head shot icon
Phil Tomlinson Grundfos
generic head shot icon
Lisa Garza Celona
generic head shot icon
John Brand Aeronix

Panel Discussion: IT/OT Convergence

Patrick O'Brien , Cybersecurity Team Lead , exida

Katherine Hutton , Product Manager, Cybersecurity , Fluence

Tobi Abori , Networking Engineer , Shell

Mohammed Hammouden , Aramco Chair of Cybersecurity , King Fahd University

Topic(s): Cybersecurity Threat Intelligence Risk Management

Type(s): Conference Track

Show more
Patrick Obrien - 100px
Patrick O'Brien Cybersecurity Team Lead exida
generic head shot icon
Katherine Hutton Product Manager, Cybersecurity Fluence
generic head shot icon
Tobi Abori Networking Engineer Shell
generic head shot icon
Mohammed Hammouden Aramco Chair of Cybersecurity King Fahd University

Advancing Data Democracy to Dictate Your Success: Leveraging Data Products for Enhanced Decision-Making

Berta Gutierrez Montes , Engineering Data Standardization Program Owner , Eli Lilly & Co.

Topic(s): Digital Transformation Data Management Artificial Intelligence (AI) Standards & Regulations

Type(s): Conference Track

Show more
As organizations increasingly rely on data, a fundamental shift in mindset is required to unlock its full potential. This presentation explores the evolution from traditional data management toward treating data as a product—a user-centric, structured approach that prioritizes accessibility, quality and relevance. Drawing on real-world experiences and collaborative insights, we will examine how data products—self-contained, high-quality data assets—can be designed to meet specific business needs.
Key principles such as discoverability, quality and security will be discussed, along with the critical role of data democratization in enabling broader access to trusted data. Attendees will gain practical insights into how a data product mindset can drive operational efficiency, empower teams with better data accessibility and support more informed, data-driven decision-making across the enterprise.
generic head shot icon
Berta Gutierrez Montes Engineering Data Standardization Program Owner Eli Lilly & Co.

Industrial Engineer with over a decade of experience in the pharmaceutical manufacturing sector. She currently serves as the Engineering Data Standardization Program Owner at Eli Lilly and Company, where she is part of the Digital Manufacturing Engineering (DME) team within Lilly’s Corporate Engineering Tech
Center (ETC).

In her global role, she leads efforts to define and implement standardized data products and data models across Lilly’s manufacturing sites, with a focus on transforming OT/ET/IT data into contextualized, high-value assets. Her work bridges automation systems and advanced analytics applications, supporting key
use cases such as equipment performance optimization, maintenance strategies, data integrity and accelerated troubleshooting. With a strong background in manufacturing automation and a passion for digital transformation, she is committed to advancing data democratization and engineering excellence across the enterprise. Her work plays a pivotal role in enabling consistent, trusted and actionable data to support Lilly’s broader digital manufacturing vision.

Confessions of a Dirty Hacker: Over Two Decades as a Hacking Curmudgeon

Tom Liston , Owner , Bad Wolf Security

Topic(s): Cybersecurity Threat Intelligence

Type(s): Keynote

Show more
Tom Liston secret
Tom Liston Owner Bad Wolf Security

Tom is a seasoned cybersecurity professional whose career spans over two decades and is marked by significant contributions to the field. He first gained recognition in the security community with his response to the 2001 Code Red worm, developing LaBrea, the pioneering network tarpit tool. This work led to a nomination for eWeek Magazine's Innovations In Infrastructure (Iᵌ) award, showcasing his early influence in the sector.

At the SANS Internet Storm Center, Tom was known for his engaging and educational article series, Follow the Bouncing Malware. These pieces dissected various types of malware and did so with a unique blend of humor and expertise, making a complex subject accessible and engaging.

During his 15-year tenure at InGuardians, a widely respected security firm, his contributions were multifaceted and groundbreaking. He performed hundreds of penetration tests against organizations within the government and military as well as the financial, healthcare, entertainment, manufacturing and research sectors. As the technical lead for a U.S. Department of Homeland Security-funded project, he developed the first known virtual machine escape, demonstrating a VMware escape at the SANSFire security conference in 2007. Tom also helped create advanced tools and techniques for hardening virtual machines. He played a pivotal role in developing a security testing framework for critical infrastructure, specifically focusing on Smart Grid security.

In response to a significant attack on Sony, Warner Bros recruited Mr. Liston as their Principal Information Security Architect. Here, he rearchitected their network infrastructure, fortifying it against the evolving landscape of cyber threats, demonstrating his capacity to respond to real-world security challenges with innovative solutions.

His career has also focused on cybersecurity education. He worked with a highly skilled team to develop and deliver a comprehensive Security and Penetration Testing curriculum in the United Arab Emirates. His role at Counter Hack Challenges further highlighted his versatility and creativity. At Counter Hack, he performed high-end penetration tests, developed challenges for SANS NetWars, and led Red Team operations against U.S. Army Cyber Protection Brigades in a SANS Situational Training Exercise (STX). His involvement in helping Santa and the Elves create the annual SANS Holiday Hack Challenge is a testament to his commitment to education and practical cybersecurity application.

Tom’s career is characterized by groundbreaking developments, significant educational contributions and practical responses to some of today's most pressing cybersecurity challenges. His work continues to influence and shape the field of cybersecurity.

Fireside Chat: How to Fuel Innovation in Traditionally Rigid Environments

Jeff Winter , VP, Business Strategy , Critical Manufacturing

Meaghan Ziemba , Host , Mavens of Manufacturing

Topic(s): Digital Transformation New Technology Strategy

Type(s): Conference Track

Show more
Jeff Winters - 100px
Jeff Winter VP, Business Strategy Critical Manufacturing

Jeff is a globally recognized thought leader in Industry 4.0 and manufacturing, with over 55 million views of his content and 110,000 LinkedIn followers. Honored more than 25 times as a top expert in his field, Jeff excels at simplifying and communicating complex concepts to diverse audiences, from the shop floor to the executive boardroom. With nearly 20 years of experience in industrial automation, he is a passionate advocate for digital transformation. Jeff is also highly active in the Industry 4.0 community. He serves on the Executive board for the International Society of Automation (ISA), the International Board of Directors for MESA (Manufacturing Enterprise Solutions Association), a U.S. registered expert for the IEC (International Electrotechnical Commission) as a member of TC 65 and as a Smart Manufacturing Advisor to CESMII.

Meaghan-Ziemba (1)
Meaghan Ziemba Host Mavens of Manufacturing

Meaghan is not your average industrial tech writer—she’s a storytelling powerhouse, brand champion and marketing guru for industrial manufacturers. With a B.A. and M.A. in Professional and Technical Writing from the University of Wisconsin-Milwaukee, she’s been crafting compelling content for the manufacturing sector since 2008. If it’s complex, technical or a bit gritty, Meaghan knows how to make it shine.

As the host of Mavens of Manufacturing, a live video broadcast series spotlighting women in the industry, Meaghan is on a mission to inspire the next generation to embrace careers in manufacturing and engineering. She’s not just closing the gender and skills gaps—she’s smashing stereotypes along the way.

But wait, there’s more! Meaghan is a single mom of three amazing kids, which means she’s a professional multitasker, problem-solver and master of the art of chaos management. When she’s not juggling school projects, hockey and baseball events and bedtime stories, you can find her lifting heavy at CrossFit, experimenting in the kitchen, or savoring her hard-earned moments with a strong cup of coffee or a perfectly poured glass of whiskey.

Meaghan doesn’t just write stories—she lives them, blending passion, purpose and a touch of badassery into everything she does.

Surprise Session! Stay Tuned for More Details!

Topic(s): Cybersecurity Threat Intelligence

Type(s): Conference Track

Thriving with AI - How to Benefit Not Hinder Your Career Opportunities

Wayne Butterfield , Partner - AI, Automation & Contact Center Transformation , ISG

Topic(s): Leadership Strategy

Type(s): Conference Track

Show more
Wayne Butterfield
Wayne Butterfield Partner - AI, Automation & Contact Center Transformation ISG

Upcoming Regulation for Users to Test Safety Functions – Link to Proof Test Procedures as per ISA84/IEC 61511

Michael Guilfoyle , Services & Support Manager , Pilz Ireland

Topic(s): Standards & Regulations

Type(s): Conference Track

Show more
generic head shot icon
Michael Guilfoyle Services & Support Manager Pilz Ireland

Network Defense for Close-In Cyber Attacks

Lennart Koopman , Founder , nzyme

Topic(s): Cybersecurity Threat Intelligence Risk Management

Type(s): Conference Track

Show more
Lennart Koopman
Lennart Koopman Founder nzyme

Lennart is the creator of the nzyme Network Defense System, a free and open solution that empowers organizations to protect their networks from close proximity attacks. Prior to nzyme, he founded the Graylog project in 2010 and led the development of its commercial counterpart in 2013.

The Importance of Managing Burnout

Rajen Patel , Chief Technology Officer , Metis | Radiation Cancer Specialist

Topic(s): Leadership Strategy

Type(s): Conference Track

Show more
Rajen Patel 100x100
Rajen Patel Chief Technology Officer Metis | Radiation Cancer Specialist

Theme Park Maintenance Innovation

Vijay Karthick Baskar , Sr. Partner Solutions Architect, Manufacturing AMER I&S , Amazon

Type(s): Conference Track

Show more
Vijay Karthick Baskar
Vijay Karthick Baskar Sr. Partner Solutions Architect, Manufacturing AMER I&S Amazon

Protecting the Supply Chain with Maritime Cybersecurity

Marco Ayala , President , Houston InfraGard Members Alliance

Topic(s): Maritime Cybersecurity Supply Chain

Type(s): Conference Track

Show more

As maritime operations handle 80% of global trade, the sector is essential yet increasingly vulnerable to cyber threats. This session will outline critical cybersecurity challenges in maritime, illustrating why effective protection is vital to maintaining the global supply chain.

We’ll explore the core vulnerabilities unique to maritime environments, such as outdated systems and the complexity of third-party access, while highlighting the importance of robust network segmentation and secure system interdependencies. Attendees will gain concise insights into best practices from standards like ISA/IEC 62443 and NIST to build a layered defense.

Concluding with a streamlined roadmap, this talk will cover actionable steps for advancing cybersecurity maturity across maritime operations, focusing on rapid-response strategies, effective training, and collaborative improvement. By fortifying maritime cybersecurity, we can better protect the supply chain that sustains global trade.

Marco Ayala
Marco Ayala President Houston InfraGard Members Alliance

Marco has 30 years of field experience, during which time he designed, implemented and maintained process instrumentation, automation systems, safety systems and process control networks. In his role with a large global manufacturing company, he is responsible for applications globally that are specific to plant site operations and corporate governance.  

With around two decades focused specifically on industrial cybersecurity, he has led efforts to secure the oil and gas (all streams), maritime port, offshore facilities and chemical sectors supporting federal, local and state entities in securing the private sector.   

Marco is highly active in the International Society of Automation (ISA) and is a longtime member and newly elected to the Executive Board. He is a 22-year Senior Member and a certified cyber instructor for ISA/IEC 62443 with volunteering commitments and contributor to the AMSC Gulf of America (Mexico) cybersecurity committee in a sworn-in role to the USCG as Chair of Threat Intelligence and Cybersecurity for the outer continental shelf (OCS).  

He has been an InfraGard member since 2014 and is currently serving as President of the Houston Members Alliance.  

If You're Not Building Your Brand, Someone Else Is

Meaghan Ziemba , Host , Mavens of Manufacturing

Topic(s): Leadership Strategy

Type(s): Conference Track

Show more
Meaghan-Ziemba (1)
Meaghan Ziemba Host Mavens of Manufacturing

Meaghan is not your average industrial tech writer—she’s a storytelling powerhouse, brand champion and marketing guru for industrial manufacturers. With a B.A. and M.A. in Professional and Technical Writing from the University of Wisconsin-Milwaukee, she’s been crafting compelling content for the manufacturing sector since 2008. If it’s complex, technical or a bit gritty, Meaghan knows how to make it shine.

As the host of Mavens of Manufacturing, a live video broadcast series spotlighting women in the industry, Meaghan is on a mission to inspire the next generation to embrace careers in manufacturing and engineering. She’s not just closing the gender and skills gaps—she’s smashing stereotypes along the way.

But wait, there’s more! Meaghan is a single mom of three amazing kids, which means she’s a professional multitasker, problem-solver and master of the art of chaos management. When she’s not juggling school projects, hockey and baseball events and bedtime stories, you can find her lifting heavy at CrossFit, experimenting in the kitchen, or savoring her hard-earned moments with a strong cup of coffee or a perfectly poured glass of whiskey.

Meaghan doesn’t just write stories—she lives them, blending passion, purpose and a touch of badassery into everything she does.

Technology Demonstration: Control Station

Dennis Nash , President and Chief Executive Officer , Control Station

Topic(s): Cybersecurity

Type(s): Technology Demonstration

Show more
Dennis-Nash - 100x100
Dennis Nash President and Chief Executive Officer Control Station

Revolutionizing Preventative Maintenance: Harnessing IIoT and Industry 4.0 for Reduced Downtime and Increased Efficiency

Brian Romano , Director of Technology Development , The Arthur G. Russell Co., Inc.

Dr. Ravindra Thamma , Central Connecticut State University

Topic(s): Digital Transformation

Type(s): Conference Track

Show more
Industry 4.0 is transforming the manufacturing landscape by enabling smarter, interconnected systems that enhance operational efficiency. This session explores how cutting-edge Industry 4.0 technologies—such as the Internet of Things (IoT), artificial intelligence (AI) and digital twins—are revolutionizing preventative maintenance. Attendees will learn how real-time monitoring, predictive analytics and automated decision-making can reduce unplanned downtime and improve overall equipment effectiveness. Through case studies and industry examples, this session will provide practical insights into the implementation of these technologies, addressing both their benefits and integration challenges. Participants will leave with actionable strategies to optimize maintenance processes and leverage Industry 4.0 for a more resilient and efficient operation. 
Brian Romano
Brian Romano Director of Technology Development The Arthur G. Russell Co., Inc.

Brian, currently the Director of Technology Development at The Arthur G. Russell Co., has been in the process and automation control systems industry for more than 40 years, starting as a bench technician.  After serving as president of a division for an automated machine builder, he owned a systems integration company, growing and positioning it as one with expertise in connecting the factory floor to the front office. To keep current with the ever-evolving automation industry, Brian holds an AS, BS, MS and MBA and Ph.D. in Technology and Innovation. He has been designing and implementing Industry 4.0 solutions, starting initially in 2004 connecting factory floor data systems to customer business systems.

Understanding the skills gap and workforce shortage in the control systems engineering profession, Brian leverages his academic knowledge and years of experience to teach the next generation of engineers at two local universities. He also serves as an industrial advisory board member for two technology and engineering universities, as a member of the CSIA Digital Committee and as chair of the ISA Smart Manufacturing Division IIoT committee, where he was awarded the 2022 ISA SM/IIoT Division Leader of the Year Award. Brian has been presenting at trade and professional society conferences for several years, publishes articles and has been quoted and interviewed for several automation publications.

generic head shot icon
Dr. Ravindra Thamma Central Connecticut State University

Panel Discussion: Safety and Cyber Concerns for Physical Systems

Moderator: Sunil Doddi , Senior Principal Process Controls Engineer , Air Products

Steve Mustard , President , Au2mation

Felipe Sabino Costa , Sr. Product Marketing Manager - Networking & Cybersecurity , Moxa Americas

Molly O'Brien , Senior Safety Engineer, PhD CSFP , exida Certification

Topic(s): Cybersecurity

Type(s): Conference Track

Show more
Sunil-Doddi
Moderator: Sunil Doddi Senior Principal Process Controls Engineer Air Products

Sunil Doddi currently serves as a Senior Principal Process Controls Engineer at Air Products, where he develops process control systems and leads functional safety and cybersecurity initiatives for the global Hydrogen Refueling Systems (HRS) product line.

His career highlights include leading the development of the world's first fully automated hydrogen generation plant product line, a groundbreaking achievement that has garnered significant attention in the hydrogen industry. As a respected professional in his field, Sunil regularly authors papers on cybersecurity and functional safety and is frequently invited to speak at industry events.

His expertise in cybersecurity has earned him recognition in academia, and his work is incorporated into cybersecurity courses in universities.

Sunil is deeply involved with the International Society of Automation (ISA), contributing to standards development and serving in various roles. His recent contributions include:

  • Editorial board member for ISA 84.91.03
  • Member of ISA 99 Working Group 16 white paper
  • Active contributor to ISA 106

He holds below certifications:

  • ISA Certified Automation Professional (CAP)
  • Exida Certified Functional Safety Expert (CFSE)
  • ISA Cybersecurity Fundamentals Specialist certificate

In his leisure time, he indulges in reading about ancient technologies and continues to contribute actively to the ISA community.

 

Steve Mustard - 100px
Steve Mustard President Au2mation

Steve Mustard, PE, CAP, GICSP, CMCP, has over 35 years of experience in the automation industry. He has developed embedded software and hardware for military applications and created products for industrial automation and control systems. Currently, much of his work focuses on assessing the cybersecurity readiness of organizations in critical infrastructure.

In addition to being the former 2021 ISA President, Mustard holds multiple certifications and professional engineering licenses. These include being a licensed Professional Engineer (PE), an ISA Certified Automation Professional (CAP), a UK-registered Chartered Engineer (CEng), a Fellow of the Institution of Engineering & Technology, a European-registered Engineer (EUR Ing), a Global Industrial Cyber Security Professional (GICSP), and a Certified Mission Critical Professional (CMCP).

Felipe Costa - 100px
Felipe Sabino Costa Sr. Product Marketing Manager - Networking & Cybersecurity Moxa Americas
Felipe Sabino Costa is the Cybersecurity Director and an official ISA/IEC 62443 industrial cybersecurity instructor at both ISA and EC-Council. He also serves as the Senior Product Marketing Manager at Moxa Americas, overseeing networking and cybersecurity initiatives across the U.S., Canada and LATAM. With over 20 years of experience in the industrial sector and more than 30 cybersecurity certifications—including a master’s degree in industrial cybersecurity and CISA certifications from the U.S. Department of Homeland Security—Felipe is a recognized expert in automation, cybersecurity and artificial intelligence. He has shared his expertise at global conferences across different continents, including the last two editions of NASA’s AI Congress.
generic head shot icon
Molly O'Brien Senior Safety Engineer, PhD CSFP exida Certification

The 6 Tools of Winning Managers

Jeremy Wall

Topic(s): Leadership Strategy

Type(s): Conference Track

Show more
generic head shot icon
Jeremy Wall

Panel Discussion: Data Governance

Topic(s): Data Management

Type(s): Conference Track

Attacking the Death Star While Bow-Ties Defend

Jim Gilsinn , ICS Cybersecurity Principal , MiTRE, ISA99

Topic(s): Cybersecurity

Type(s): Conference Track

Show more
generic head shot icon
Jim Gilsinn ICS Cybersecurity Principal MiTRE, ISA99

The Technical Expert vs. Business Leader Dilemma: Choosing Your Career Journey

Co-moderator: Sherry LaBonne , Rockwell Automation

Julie Robinson , Rockwell Automation

Rahul Raveendran , Blue Marvel

Topic(s): Leadership Strategy

Type(s): Conference Track

Show more
Sherry LaBonne - 100x10012
Co-moderator: Sherry LaBonne Rockwell Automation
generic head shot icon
Julie Robinson Rockwell Automation
generic head shot icon
Rahul Raveendran Blue Marvel

Introduction to ISA112 & SCADA Systems Case Study

Manoj Yegnaraman, PE , ISA112 Voting Member, Vice President and Chief Instrumentation Engineer , Carollo Engineers

Alex Rowlett , Director of Utilities , City of Odessa, TX

Topic(s): SCADA ISA112 Standards & Regulations Water/Wastewater Instrumentation

Type(s): Conference Track

Show more
generic head shot icon
Manoj Yegnaraman, PE ISA112 Voting Member, Vice President and Chief Instrumentation Engineer Carollo Engineers
generic head shot icon
Alex Rowlett Director of Utilities City of Odessa, TX

When Robots Start Acting Crazy (A Security Approach)

Jordan Bonagura , Senior Security Consultant , Secure Ideas

Topic(s): Robotics Cybersecurity Connectivity Artificial Intelligence (AI) Threat Intelligence Automation Control Data Management Incident Response Risk Management

Type(s): Conference Track

Show more

In today’s rapidly evolving technological landscape, robots are becoming integral to business operations, from Robotic Process Automation (RPA) tools streamlining workflows to Low-Code/No-Code (LCNC) platforms enabling business users to automate processes without deep programming expertise. But what happens when these robots, designed to improve efficiency and reduce human error, start to behave unpredictably? When automation goes awry, it can lead to vulnerabilities, operational disruptions and even security breaches. In this session, we will explore the intersection of automation and security, focusing on the risks posed by RPA and LCNC technologies. We'll dive into real-world scenarios where robotic automation “goes rogue” and examine the potential impact on your organization’s data, infrastructure and compliance posture. From unexpected behavior in automated workflows to security loopholes in custom-built LCNC applications, we'll cover how to recognize, mitigate and recover from these challenges.

Jordan Bonagura
Jordan Bonagura Senior Security Consultant Secure Ideas

Jordan is a Senior Security Consultant for Secure Ideas. With more than 20 years of experience in information security, he is passionate about helping companies and clients protect their data and applications from threats and vulnerabilities. As a principal security researcher, he led teams conducting vulnerability management, risk assessments, penetration tests and boundary-setting to comply with standards for companies in different segments. Jordan contributed to significant projects, such as developing an integrated GNSS positioning system and an encryption communication protocol between ground and satellite at the Brazilian National Institute of Space Research. He also has had the opportunity to speak at some of the most important security conferences around the globe, be a college professor and course coordinator, and consult for the Brazilian police in crime solving.

Failure as Fuel: Transforming Setbacks into Catalysts for Growth and Success

Leigh-Kathryn Bonner

Topic(s): Strategy Leadership

Type(s): Conference Track

Show more
generic head shot icon
Leigh-Kathryn Bonner

Using Machine Learning to Predict Highest-Risk Groundwater Sites to Improve Water Quality Monitoring

Yaroslova Yingling , Director of Materials, Science and Engineering Undergraduate Program , North Carolina State University

Topic(s): Water/Wastewater Digital Transformation Data Management

Type(s): Conference Track

Show more

Accurately assessing and managing risks associated with inorganic pollutants in groundwater is imperative. Historical water quality databases are often sparse due to rationale or financial budgets for sample collection and analysis, posing challenges in evaluating exposure or water treatment effectiveness. We utilized and compared two advanced multiple data imputation techniques, AMELIA and MICE algorithms, to fill gaps in sparse groundwater quality data sets. AMELIA outperformed MICE in handling missing values, as MICE tended to overestimate certain values, resulting in more outliers. Field data sets revealed that 75% to 80% of samples exhibited no co-occurring regulated pollutants surpassing MCL values, whereas imputed values showed only 15% to 55% of the samples posed no health risks. Imputed data unveiled a significant increase, ranging from 2 to 5 times, in the number of sampling locations predicted to potentially exceed health-based limits and identified samples where 2 to 6 co-occurring chemicals may occur and surpass health-based levels. Linking imputed data to sampling locations can pinpoint potential hotspots of elevated chemical levels and guide optimal resource allocation for additional field sampling and chemical analysis. With this approach, further analysis of complete data sets allows state agencies authorized to conduct groundwater monitoring, often with limited financial resources, to prioritize sampling locations and chemicals to be tested. Given existing data and time constraints, it is crucial to identify the most strategic use of the available resources to address data gaps effectively. This work establishes a framework to enhance the beneficial impact of funding groundwater data collection by reducing uncertainty in prioritizing future sampling locations and chemical analyses.

Yaroslava Yingling
Yaroslova Yingling Director of Materials, Science and Engineering Undergraduate Program North Carolina State University

Building Future-Ready OT Security Strategy: GenAI's Impact on the Secure Software Development Lifecycle and Secure Supply Chain Management Practices

Jessa Davis , Security Consulting Manager , Accenture

Katherine Tatom , Security Consultant , Accenture

Topic(s): Artificial Intelligence (AI) Supply Chain Cybersecurity Risk Management Strategy

Type(s): Conference Track

Show more

GenAI tools and products will serve to intensify trends associated with digital transformation and IT/OT convergence by delivering transformative opportunities alongside unprecedented cybersecurity challenges for OT security programs. As the threat landscape adjusts to the prevalence of these new technical advances, OT asset operators must begin to think differently about the role of these systems within a data-enabled enterprise architecture. This presentation will explore the critical role of a Secure Software Development Lifecycle (SSDLC) and of Secure Supply Chain Management (SSCM) practices tailored to the unique demands of OT environments. Focusing on the intersection of legacy OT systems, GenAI-enabled tools and data-driven security architectures, an application of the ISA/IEC 62443 standards to the internet of energy, smart manufacturing, maritime ecosystems and intelligent transportation systems environments will be discussed.   

Jessa Davis
Jessa Davis Security Consulting Manager Accenture

Jessa Davis (she/her) is a Security Consulting Manager at Accenture, specializing in cyber-physical systems and operational technology cybersecurity for electric utilities clients. Prior to joining Accenture, Jessa worked as an industrial controls system engineer in the oil and gas industry and as a blockchain software developer with the United Nations Office for Project Services in Kathmandu, Nepal. Her research interests include GenAI OT safety, distributed energy resources cybersecurity and cyber resilience strategies for the smart grid. She resides in Seattle, WA.

Katherine Tatom
Katherine Tatom Security Consultant Accenture

Katherine Tatom (she/her) is a Security Consultant at Accenture, where she specializes in OT security, artificial intelligence and assessments for electric utility clients. Prior to joining Accenture, Katherine graduated from Bloomsburg University with a degree in digital forensics. She also completed an internship with Revolutionary Security on their OT Assessment and Testing team, where she assisted with penetration tests for clients and designed a virtual machine to be used by team members during assessments. Her specializations and research interests include cybersecurity analytics, application security, and alternative intelligence (AI) in the grid space.

ISA Standards Overview

Topic(s): Standards & Regulations

Type(s): Conference Track

ISA Standards Forum: Regulation, Compliance, Legislation

Vince Mezzano , Chair, ISA96 & Managing Director, ISA75, Fluor Senior Fellow , Control Systems Engineering

Topic(s): Standards & Regulations Strategy Leadership

Type(s): Conference Track

Show more
generic head shot icon
Vince Mezzano Chair, ISA96 & Managing Director, ISA75, Fluor Senior Fellow Control Systems Engineering