info@securemicro.com +1 602-989-4355

Event Program

Time Session Speaker Description
8:00AM – 8:30AM
Arrival & Check-In
-
Front reception desk check-in (Government-issued ID required). Please arrive early to ensure a prompt start.
8:30AM – 9:00AM
Breakfast & Networking
-
Light breakfast served. Informal networking among participants and speakers.
9:00AM – 9:15AM
Opening Remarks & Introduction
Heather Kinsy
President & CEO
Secure Micro Technologies
Welcome and overview of the workshop theme: IT/OT Convergence. Introduction of speakers and agenda.
9:15AM – 9:40AM
Motivation, Context & Importance
Dr. Michael AK
Senior R&D Lead
Driving factors, operational context, and strategic relevance of cybersecurity in critical infrastructure, supported by recent IT/OT incidents.
9:40AM – 10:10AM
Hardware-Based Security Solutions
Truman Padgett
Hardware Engineer
Secure Micro Technologies
Outline effective hardware defenses, e.g., secure microcontrollers, microsegmentation, e-fuses, data diodes, TPMs, and tamper-resistant modules, to protect IT/OT systems through monitoring, advanced encryption, and attack resistance.
10:10AM – 10:20AM
Coffee Break
-
-
10:20AM – 10:35AM
People-in-the-Loop (PiL)
Susan Morris
VP Client Partnerships of CyberTRUE
Cultural and organizational aspects of IT/OT convergence. Human factors in cybersecurity.
10:35AM – 10:50AM
PiL Centered Cybersecurity
Ralph F. Ley
CEO of Cyber Workforce Center
President of OctoTRUE
Cultivating a culture of vigilance, accountability, and continuous learning across all levels of the organization.
10:50AM – 11:05AM
PiL - Workforce & Training
Dr. Shane D. Stailey, DCS-IA
CEO of OctoTRUE
President of Cyber Workforce Center
Building integrated IT/OT cyber-aware teams. Training for secure operations in converged environments.
11:05AM – 11:30AM
Software Tools for Infrastructure Security
Yash Mehta
Head of Software Engineering
Secure Micro Technologies
Effective software tools to secure and manage critical infrastructure across the full lifecycle, from asset discovery and monitoring to threat detection and mitigation.
11:30AM – 12:00PM
Hands-On Technical Labs
Yash Mehta & Truman Padgett
Technical Team
Secure Micro Technologies
Opportunity to engage in hands-on exercises including secure boot verification, PUF-based authentication, data diode simulation, network segmentation, and a Kyber-AES cryptographic bridge demo.
12:00PM – 1:00PM
Boxed Lunch & Interactive Engagement
-
Lunch served. Continued hands-on activities and informal discussions. Opportunity to engage with Secure Micro engineers and presenters.
1:00PM – 1:15PM
Q&A & Follow-Up Engagements
-
Open floor for questions. Information on follow-up resources and collaboration opportunities.
1:15PM – 1:30PM
Closing Remarks
Heather Kinsy
President & CEO
Secure Micro Technologies
Summary of key takeaways. Final thoughts on securing critical infrastructure.