Eaton is inviting you to attend an event aimed at helping utilities to secure their organisation's critical infrastructure, at 15h00 (South African time) on Tuesday 18 October 2022.
This virtual event will begin with a keynote address by Michael Regelski, Eaton’s senior vice president and chief technology officer followed by a ‘fireside chat’ featuring Shane Benting, Microsoft’s senior security architect.
Energy systems are transforming and becoming more complex with the increase in renewable and distributed energy resources. Organisations are optimising operations to achieve digital transformation and sustainability goals amidst this ever-changing power landscape. And, while new tools are essential to managing change, they can also expose vulnerabilities for organisations. Cybersecurity is a critical enabler to creating trusted and secure connected environments.
Join Eaton for its keynote, fireside chat and panel discussions including cybersecurity insights from industry experts in leading-edge organisations where you'll learn how to build a foundation of security and safety in an increasingly connected world.
The event will also include four panel discussions:
- The role of cybersecurity in the energy transition
- Securing IoT solutions
- Understanding the regulatory landscape
- The importance of codes and standards in the product and cybersecurity lifecycle
Don't miss critical cybersecurity insights and solutions, and in-depth industry expert discussions about securing critical infrastructure through energy transition, digitalization, changing regulations, and understanding codes and standards. All in one event.
Date: Tuesday 18 October 2022
Time: 15h00 (South African time)
Keynote kickoff address: Michael Regelski, Senior vice president and chief technology officer, Eaton
Fireside chat: Host: Michael Regelski, Eaton with featured guest Shane Benting, Senior security architect, Microsoft.
- Panel discussion: The role of cybersecurity in the energy transition
As companies embrace the shift to renewables, energy storage and distributed energy resource management solutions (DERMS), it's vital to protect these systems from new threats and vulnerabilities.
David Lawrence, Duke Energy; Scott Longheyer, Microsoft; Rich Farrell, Eaton; Eric Rueda, Eaton
- Panel discussion: Securing IoT solutions
Protecting assets, data and privacy within an IoT ecosystem is critical to building trust in IoT solutions. We'll dive deeper into the three essential elements of IoT cybersecurity — hardware, software and connectivity — the benefits of leveraging the cloud for security and the role that businesses and consumers play in securing an IoT ecosystem.
Joe Peichel, Xcel Energy; Andre Weimerskirch, Lear Corp; Ruben Chacon, Eaton; Kevin Chung, Eaton; Max Wandera, Eaton
- Panel discussion: Understanding the regulatory landscape
Critical infrastructure and industrial manufacturers are adapting to an ever-changing regulatory environment. Get up to speed on the latest industry-specific cyber regulations, cyber insurance markets and contractual negotiations, as well as their practical implications.
Cynthia J. Cole, Baker Mckenzie; Kate Macmillan, Herbert Smith Freehills; Farah F. Cook, Kilpatrick, Townsend & Stockton LLP; Eric B. Gyasi, Stroz Friedberg, an Aon company; Malisheia Douglas, Eaton
- Panel discussion: The importance of codes and standards in the product and cybersecurity lifecycle
For critical infrastructure to be secure, cybersecurity must be woven into an organisation's culture, just as safety is. We'll explore the impact of codes and standards throughout a product's lifecycle and why built-in cybersecurity is critical.
Chris Bonebrake, PNNL; Rahul Gupta, UL; Jason Potterf, Cisco; Thomas Domitrovich, Eaton