cybersecurity smart

Cyber Smart Series

Gain a holistic understanding of cyber risks, threats, response and best practices in maturing your cybersecurity strategy.
Welcome to the Industry Cyber Smart Series

Avoid your factory becoming the latest headline

Manufacturing is clearly in the crosshairs of cyberattacks. Factories are humming along and making money - and so are the hackers. Cyberattacks are up 250%. Manufacturing accounted for one-third of cyber incidents and 65% of all ransomware attacks. Experts are urging industry to increase knowledge of OT cybersecurity and the people, processes, factories and facilities to get cyber smart - and get there fast.

Who should attend?

  • Executives responsible for developing strategy and managing risk
  • IT and OT professionals that manage networks
  • Engineers that design and specify equipment
Cyber Smart Series - Session 1

Panel Discussion: Industrial Cybersecurity – Protecting Industrial Control Systems from Cyber Threats

April 13, 2022 | 2:00 PM Eastern

Our expert speakers provide insight from years of experience working with industrial cybersecurity.

Industrial cybersecurity requires a culture change for most organizations to survive. The ramifications of a cyberattack to any organization, large or small, are too much to ignore. Many organizations find themselves in a situation where they don’t know where to start, so they choose to ignore the need.


Join Siemens during a live in-depth panel discussion as we expose the concerns of Industrial Cybersecurity and what measures can be taken to limit exposure.

Cyber Smart Series - Session 2

OT Cybersecurity "Kernels of Truth" That Many Cyber-Responsible Leaders May Not Know!

May 10, 2022 | 2:00 PM Eastern

OT cybersecurity truths learned - often the hard way - by operators and engineers.

Cybersecurity is a large and complex set of issues. Operational Technology (OT) is the life blood of a manufacturing company and OT has enabled increased efficiencies, higher quality, extreme flexibility, and faster time to market. Yet, the OT networks are often neglected or underserved when it comes to cybersecurity.  


There is nothing static about cybersecurity in an OT environment. We can’t sit still.


As operational leaders we must pivot to encourage IT/OT collaboration to quickly gain visibility into the OT networks and systems. This is so we can shore up the technical controls while building an OT Cyber Program, which can guide us to  achieve a sustainable, continuous improvement mindset. 


This session will lay the foundation for OT leaders to understand the issues while learning that there are many OT-specific tools to help solve them.

  • It’s not IF, but WHEN!
  • Blackhole networks: Why most companies have little to no visibility into their manufacturing networks and systems.
  • Insurance can be a PARTIAL answer, but it will not and cannot cover all risks!
  • There are many ways that OT systems can be improved. Be aware, It’s a journey, not a destination.
Cyber Smart Series - Session 3

Operational Security:  The Threat and Legal Landscape

June 7, 2022 | 2:00 PM Eastern

Can you afford to be out of business for weeks? 

When you mix people in a business of any size with data processing, it is a matter of WHEN (not IF) you will have a security incident to manage.  Whether that incident is merely a hiccup or escalates into a reputational and legal blow to your business all comes down to your diligence and planning.  Your organization’s ability to properly assess the impact of any incident, mitigate any harm, and properly resume or maintain business operations (all the while maintaining your customers’ and employees’ trust) is directly tied to your data governance planning.  Lastly, it is not all about legal or compliance risks.  Expanding international, federal and state regulations make having an information security plan (and executing it) a priority to even compete in certain marketplaces, be eligible for certain business opportunities, and sometimes stay in business.  


In this interactive session, Scot Ganow, Taft Partner and Chair of the firm’s Privacy and Data Security Practice, will leverage real-world experience to walk you through:

  • The current threat and legal landscape of data governance and security.
  • Understanding the current and developing regulations governing the processing of personal and sensitive information.
  • Best practices to reduce risk to your enterprise and increase the likelihood of a (timely) recovery from a security incident.
  • The do’s and don’ts of incident response management.
  • Dealing with a ransomware attack impacting not only the confidentiality of data but also ACCESS to your information systems.