11:00 am ET - Remote Best Practices: People, Process, Platform and Place (Cary Moretti, Co-Founder of Proximuto Inc.)
2020 started dramatically with a pandemic that left offices empty of all but stained coffee cups and empty chairs. In March, ready or not, infected or not, physical distancing arrived and the global work from home experiment began. Despite easing restrictions and an opening economy, many offices remain empty as we begin navigating towards the “new normal” and a workplace that may have far fewer workers.
The overnight WFH shift exposed gaps in critical processes such as onboarding, mentorship and management, team communications and collaboration. Success in the new workplace has been defined by the ability to adapt and readiness to implement the remote best practices of highly performant distributed teams without losing the culture and values they have worked so hard to establish.
In this session we will contrast the current WFH environment with remote best practices through the lenses of Proximuto’s 4 Pillars: People, Process, Platform, and Place. We will discuss tactics for successfully transitioning to a new workplace norm with a focus on maintaining the flexibility necessary to deal with changing restrictions.
12:00 pm ET - Blurred Lines on Cybersecurity – A View From the Front On Enterprise and Control Systems Cybersecurity (Joe Cummins, CTO of CYBERNETIQ)
In Canada, and around the world, the intersection between OT, IT, and (I)IOT has continued to converge across multiple merged and with it has come the exploding evolution of the business layers and policy enforcement, organizations have been unable to meet the demands that are placed to create safe, secure, and resilient networks.
With the erosion of the Enterprise network’s proximity to the ICS world, the conventional wisdom on the architecture and design has been fraught with challenges. As a result the corporations' inability to ensure that business functions and supporting rationale and alignment with operational goals that require a deep understanding of the networks that they’re charged with protecting, and find unique ways to manage the finite resources.
Through repeatable threat modeling of Enterprise, ICS, and IOT networks, organizations can not only visualize the underlying network security deployment from the ground up, but also recoup much of the investments from the technology by cross-mapping and overlaying each dataset to enrich the full picture of the corporate environment. This method gives way to further align the operations “stack” of people, process, and technology from a grassroots level. From the link level to gateway and beyond, organizations need to see the entire environment, overlay the security dimensions and build solid architecture models to better address the critical risks within the organization.
In this session, we will use real-world examples of organizations that operated within the Canadian ecosystem. We will share what is occurring at a “wire” level, and how this affects the gaps and overlaps of the security program. Dissect the existing traffic to spot malware proliferation, DNS queries, and other security issues that may go unnoticed.