Event Program
| Time | Session | Speaker | Description |
|---|---|---|---|
8:00AM – 8:30AM |
Arrival & Check-In |
- |
Front reception desk check-in (Government-issued ID required). Please arrive early to ensure a prompt start. |
8:30AM – 9:00AM |
Breakfast & Networking
|
- |
Light breakfast served. Informal networking among participants and speakers. |
9:00AM – 9:15AM |
Opening Remarks & Introduction
|
Heather Kinsy
President & CEO
Secure Micro Technologies
|
Welcome and overview of the workshop theme: IT/OT Convergence. Introduction of speakers and agenda. |
9:15AM – 9:40AM |
Motivation, Context & Importance
|
Dr. Michael AK
Senior R&D Lead
|
Driving factors, operational context, and strategic relevance of cybersecurity in critical infrastructure, supported by recent IT/OT incidents. |
9:40AM – 10:10AM |
Hardware-Based Security Solutions
|
Truman Padgett
Hardware Engineer
Secure Micro Technologies
|
Outline effective hardware defenses, e.g., secure microcontrollers, microsegmentation, e-fuses, data diodes, TPMs, and tamper-resistant modules, to protect IT/OT systems through monitoring, advanced encryption, and attack resistance. |
10:10AM – 10:20AM |
Coffee Break
|
-
|
- |
10:20AM – 10:35AM |
People-in-the-Loop (PiL)
|
Susan Morris
VP Client Partnerships of CyberTRUE
|
Cultural and organizational aspects of IT/OT convergence. Human factors in cybersecurity. |
10:35AM – 10:50AM |
PiL Centered Cybersecurity
|
Ralph F. Ley
CEO of Cyber Workforce Center
President of OctoTRUE
|
Cultivating a culture of vigilance, accountability, and continuous learning across all levels of the organization. |
10:50AM – 11:05AM |
PiL - Workforce & Training
|
Dr. Shane D. Stailey, DCS-IA
CEO of OctoTRUE
President of Cyber Workforce Center
|
Building integrated IT/OT cyber-aware teams. Training for secure operations in converged environments. |
11:05AM – 11:30AM |
Software Tools for Infrastructure Security
|
Yash Mehta
Head of Software Engineering
Secure Micro Technologies
|
Effective software tools to secure and manage critical infrastructure across the full lifecycle, from asset discovery and monitoring to threat detection and mitigation. |
11:30AM – 12:00PM |
Hands-On Technical Labs
|
Yash Mehta & Truman Padgett
Technical Team
Secure Micro Technologies
|
Opportunity to engage in hands-on exercises including secure boot verification, PUF-based authentication, data diode simulation, network segmentation, and a Kyber-AES cryptographic bridge demo. |
12:00PM – 1:00PM |
Boxed Lunch & Interactive Engagement
|
-
|
Lunch served. Continued hands-on activities and informal discussions. Opportunity to engage with Secure Micro engineers and presenters. |
1:00PM – 1:15PM |
Q&A & Follow-Up Engagements
|
-
|
Open floor for questions. Information on follow-up resources and collaboration opportunities. |
1:15PM – 1:30PM |
Closing Remarks
|
Heather Kinsy
President & CEO
Secure Micro Technologies
|
Summary of key takeaways. Final thoughts on securing critical infrastructure. |
