Delivering next-level cybersecurity and cyber-resilience to the power grid to enable the acceleration of the energy transition

Date: 15th-19th May 2023

Format: In-Person

Venue: Park Plaza, Amsterdam

Group Booking Discount –  10% discount for 3+ delegates, 30% discount for 5+ delegates and 50% discount for 10+ delegates booked from the same organisation at the same time!

IT-OT Cybersecurity Conference & Exhibition

Tuesday 16th - Thursday 18th May 2023

The main conference is comprised of morning plenary sessions where all participants are in one room, addressing macro issues such as regulation, workforce development and data management, and afternoon technical tracks focused on the specific implementation issues impacting IT cybersecurity and OT cybersecurity teams. A combined programme of facilitated networking activities enable IT and OT colleagues to come together and share experiences, expertise, and gain insights into each other’s priorities. Running alongside the conference is an Exhibition area with a focused display of IT and OT cybersecurity solutions proven in the power grid environment.

Big Audience Shot-3

3-Day Conference Programme

Tuesday 16th May 2023 - IT-OT Cybersecurity Conference Day One


Registration and Refreshments


Welcome from the Chair - Ryan Bradetich, Senior Vice President of Research & Development, Schweitzer Engineering Laborotories


Information Sharing - Creating robust and trusted information sharing mechanisms to support responsible disclosure and real-time threat intelligence across the entire grid ecosystem

  • Proactively leading your organisation’s information sharing regionally and globally to create aligned, and responsive threat intelligence and disclosure program
  • Striking the correct balance between managing risk, and compliance to data privacy regulations with the benefits of improved and expanded information sharing across the grid supply chain
  • Establishing trusted and effective information sharing mechanisms to help drive end-to-end grid security and become more responsive to active threats
Massimo Rocca

Massimo Rocca

Board Member



NIS 2 Directive - Developing a cybersecurity programme change management strategy to meet the technical requirements of asset owner compliance to the NIS 2 Directive

• Getting a detailed technical understanding of how to approach asset management, access control, risk management, network segmentation, and logging & monitoring compliance under NIS 2
• Establishing the governance needed to manage the increased focus on risk management and incident reporting to the European Cyber Crises Liaison Organisation Network
• Overcoming organisational resistance to enable SecOps technology that can facilitate cost-effective, automated processes to meet the new regulatory requirements
• Adopting a collaborative approach with suppliers to develop cybersecurity platforms and solutions that can enable compliance and collective security

Antoine dHaussy picture (1)

Antoine D’Haussy

OT Security Practice Head EMEA



Morning Refreshments


Regulatory Compliance - Developing an integrated view of data privacy and information security regulations to support a holistic approach to compliance

  • Obtaining oversight of European and domestic regulation and operational need to strike the correct balance between effective information flow and regulatory requirements around the sharing of information
  • Overcoming the complexity of meeting physical security, safety, data privacy and cybersecurity requirements to develop an efficient approach to compliance in line with operational need
  • Employing a holistic approach beyond the requirements of individual authorities to reduce the risk of being impacted by cyber attacks
Janne Merete Hagen-3

Janne Hagen

Special Adviser Contingency Planning



Network Code on Cybersecurity - Preparing to implement the Network Code on Cybersecurity as part of a consolidated approach with critical infrastructure regulations to achieving sector-wide operational resilience

  • Understanding the overlap between the requirements for information sharing in NIS 2 and the NCCS to take a coherent approach to compliance
  • Improving the flow of information between Utilities, National CSIRTs and European institutions to create active feedback and responsiveness across all entities
  • Raising the level of maturity across all European utilities to develop a more resilient grid ecosystem that is responsive to evolving threats
Anjos Nijk-2

Anjos Nijk

Managing Director


Barry Coatesworth-4

Barry Coatesworth

Director and Cybersecurity Leader



Jeff Montagne




Live Demo Lab Session - SUBNET Solutions Inc.

web subnet logo


Lunch, Exhibition and Networking

IT Track - Vulnerabilities

OT Track - Vulnerabilities

Chair: Ryan Bradetich, Senior Vice President of Research & Development, Schweitzer Engineering Laborotories


Ghost in the Wires - An attacker can do stealthy lateral movement around the network, exploiting misconfigurations and even IOT-devices, doing reconnaissance, privilege escalation and gathering credentials, all by executing simple commands/scripts and using built-in tools; and without being detected

  • Demonstrating system vulnerabilities and the limitations of compliance, through a series of technical demos, to raise awareness of threat actors’ methodologies and capabilities
  • Developing scripts to bypass detection systems, conducting reconnaissance, and looking for credentials to show practical paths that can be used to exploit vulnerabilities
  • Understanding how configuration need to be improved, and detection algorithms hardened to mitigate threat
Tom Jøran Sønstebyseter Rønning

Tom Jøran Sønstebyseter Rønning

Team Leader of Operational Security


OT Cybersecurity Innovation Panel - Leveraging the latest advances in OT cybersecurity to support the deployment of the smart grid

During this session 3-4 suppliers of next generation OT cybersecurity solutions will share the results of their recent implementations and future product development roadmap. Formal presentations will be followed by Q&A and panel discussion, providing you with the opportunity to quiz the tech experts and determine how best to integrate future solutions into your deployment plans.


Ozan Dayanc

Product Specialist, Power Grid Cybersecurity




Antoine Thomas

Product Line Manager, Automotive and IoT Solutions



Jerome Arnaud-3

Jérôme Arnaud

Product Manager




Roy Braha

Roy Braha

Business Development Director

Israel Electric Corporation

logo Israel Electric small-1-1



Resilient EV charging infrastructure - Preparing the EV charging infrastructure for resilience against current and future cybersecurity risks

Understanding how the EV charging infrastructure is evolving into a critical infrastructure
Exploring current and future cyber security risks in the EV charging infrastructure
Preparing for resilience using global standards like ISO/IEC-62443 and ISA/IEC-62443 and apply them on real-life use cases

Carlos 2

Carlos Montes Portela

OT Security Manager



Harm van den Brink

Cyber Security specialist EV infrastructure





Afternoon Refreshments, Exhibition and Networking

Afternoon Refreshments, Exhibition and Networking


Threats and Vulnerabilities - Highlighting threats to and vulnerabilities of cyberphysical systems to ensure reliability, security and privacy of the smart grid

• Gaining an understanding of the overlapping demands of reliability, security and privacy in cyberphysical systems as a basis for a coherent strategy
• Developing safety, security, and privacy systems that can resist machine learning attacks and optimize performance levels
• Integrating advanced computing, networking, and communication techniques and capabilities into the smart grid to improve reliability and productivity

Leandros Maglaras

Leandros Maglaras

Professor of Cybersecurity

De Montfort University

Asset Vulnerability Management - Understanding OT asset vulnerabilities to develop more effective asset management practices

  • Demonstrating examples of attacks affecting OT systems to raise awareness of vulnerabilities in SCADA systems and common attack vectors
  • Deepening knowledge of OT infrastructure to overcome the complexities of patching and updating
  • Increasing resilience to minimize the impact of attacks on business IT infrastructure on critical assets
Dmytro Cherkashyn

Dmytro Cherkashyn

Head of Cybersecurity Development



Attack Paths - Modelling the path of attacks to understand vulnerabilities and become more resilient

  • Building a special Hardware in the Loop Digital Substation environment a spart of the CybWin power grid research project in order to test different offensive and defensive security actions
  • Implementing 14 different cyber-attacks against the target substation to cover the general steps of offensive actions against power substations, such as reconnaissance activities, operation failure attacks by spoofed commands or denial of service type of attacks
  • Raising awareness of IEC 60870-5-104 Scada protocol attacks against power grid substationsfor grid asset owners to better protect their infrastructures.  
László Erdődi

Laszlo Erdodi

Associate Professor


Threat Modelling - Correlating vulnerabilities against threat to create an integrated continuous risk and vendor management process

  • Mapping the threat landscape and emulating OT attacks in a controlled substation environment to understand the full capabilities of threat actors
  • Understanding how vendor vulnerabilities from the enterprise network, lack of firmware updates, lack of updates on SCADA systems can be exploited by advanced, persistent threat actors to overcome the weaknesses and limitations of your systems
  • Modelling threat from the point of view of how an attacker may exploit your systems to identify, mitigate and proactively defend against attack
Siv Hilde Houmb-4

Siv Houmb

Senior Adviser



Roundtable Discussions - during this session the audience breaks out into several smaller working groups, each focused on a specific theme that arose during the day’s presentations. Each working group will comprise of representatives of the entire smart grid cybersecurity community to ensure a well-rounded and holistic discussion


Roundtable Summaries - during this session each working group leader will provide a 5-min summary back to the wider group, highlighting the issues raised, the solutions discussed, and the recommendations made to take the matter to the next level


Networking Evening Reception - time to relax after an intensive day of presentations and discussions! All participants are invited to join this networking reception where you will have the opportunity to enjoy the company of colleagues from across the European power grid cybersecurity community, in a relaxed and informal setting


Close of Conference Day One

Wednesday 17th May 2023: IT-OT Cybersecurity Conference Day Two


Registration and Refreshments


Welcome from the Chair - Antoine D’Haussy, OT Security Practice Head EMEA, Fortinet


Cybersecurity Culture - Developing a cybersecurity ambassadorship programme to embed sustainable cyber-awareness across the organisation

  • Identifying and training office leaders to embed cyber-awareness in every area of the business through an effective communication campaign
  • Maintaining the level of engagement among ambassadors needed to create a sustainable, reliable long-term program
  • A cost-effective approach to achieving demonstrable resilience to phishing and DDoS attacks and improving reaction times to active threats
Erki Guhse-1

Erki Guhse




Win-Win-Win - How cybersecurity can unite IT and OT teams, make power grids more resilient, and save you time in the process

• Understanding and preparing for the current organizational challenges and threat landscape
• Defining risk in terms of business continuity: cybersecurity vs. operational needs
• Leveraging cybersecurity solutions and automation to mitigate risk, get daily operational value and streamline efforts and communication among IT and OT teams

Christina Hoefer

VP of Global Industrial Enterprises




Morning Refreshments


Skills Development - Striking the optimal balance in bilateral training of IT and OT experts to develop the capability needed to achieve secure grid modernization and operational resilience

  • Overcoming resource scarcity to embed the level of capability needed to meet the increased need for managing virtualised applications in the OT environment
  • Establishing a dedicated OT security team within the IT business unit to provide focused expertise for OT specific requirements while maintaining continuity with enterprise IT functions
  • Creating a bridge between IT and OT to ensure security, availability and reliability of substation systems
Michael Knuchel-2

Michael Knuchel

Head of SAS Engineering



Cybersecurity Awareness Training - Integrating security training into existing cultural frameworks to enable organisation-wide cyber-awareness

  • Preparing internal and public-facing teams to work collaboratively towards mitigating cyber-threat
  • Developing metrics to demonstrably measure the success of training
  • Fostering a culture of positive communication in combination with greater awareness of attack vectors and vulnerabilities to improve preparedness for and responsiveness to cyber incidents
Isabell Neise-1

Isabell Neise

Head of Business Development



Lunch, Exhibition and Networking

IT Track - Solutions

OT Security Track - Solutions

Chair: Antoine D’Haussy, OT Security Practice Head EMEA, Fortinet


Threat Management - Using automation for effective threat management

  • Automating threat indicator identification, validation and escalation to reduce time and improve confidence
  • Migrating OT data into SOC and SIEM to correlate threats across IT and OT environments and establishing confidence levels against each threat
  • Creating reliable and robust threat information sharing mechanisms between TSOs, DSOs, Generation, ISACs and Government bodies to drive sector wide security

Shawn McBurnie

Head of IT/OT Security & Compliance

Northland Power

OT Security in Procurement Projects - Moving targets: Covering OT-Security requirements for Amprion Offshore HVDC projects in a changing regulatory landscape

  • Covering OT Security requirements for offshore HVDC projects in the critical infrastructure domain
  • Challenges of changing regulatory OT security requirements in long-running and complex projects
  • Lessons learned from large procurement projects over the past ten years and how to avoid common mistakes
  • Conducting technical security pre-tests and acceptance testing to meet the need for accelerated system design and project delivery

Stephan Beirer

Team Manager ICS/OT Security

GAI NetConsult


Simon Gustafson

Project Engineer Offshore Grid Connection Systems

Amprion Offshore


Systems Configuration - Automating virtualised substation configuration management to improve confidence and reduce complexity

  • Determining the optimal way of managing the complexity and volume of configuration requirements across your assets’ lifecycle
  • Overcoming difficulties with virtualised automation of backups across multi-vendor systems including legacy technology to improve systems availability
  • Reducing manual configuration and limiting the possibility of human error to improve confidence in system backups
Sampo Turunen-3

Sampo Turunen

Secondary Systems Specialist


Remote Control - Leveraging IEC 62443 to future-proof remote control of medium and low voltage substation automation

  • Using IEC 62443 principles to support secure data flows and remote access
  • Overcoming resource scarcity, legacy technology and the need to use public communication networks to ensure the secure communication between the control centre and LV/MV substations
  • Making the RTU in secondary substations a secure gateway to provide observable data in LV/MV substations in support of advanced analytical, predictive and IIoT applications, grid stability and flexibility for future upgrades
Luka Mocnik-2

Luka Mocnik

ICT Infrastructure Architect

Elektro Gorenjska



Afternoon Refreshments, Exhibition and Networking

Afternoon Refreshments, Exhibition and Networking


Smart Meter Security - Hacking, Defending, and Developing Secure Smart Meter Systems

• Hacking: highlights from spending 3 months on hacking into the external part of a real-world smart meter system (with authorization from the utility)

• Defending: observations from the operational security side

• Developing: challenges in developing secure smart meter systems

Emil Gurevitch

Emil Gurevitch

Chairman of the Security Committee


Remote Management - Deploying an advanced remote management platform to enable remote, automated configuration, password management, and log management for OT devices in substations

  • Establishing a universal solution to overcome the scale and complexity of current management processes
  • Assessing implementation risks and project timeframes to develop fit-for-purpose specifications and procurement requirements for a solution that can effectively manage configuration and password automation across the majority of devices in the substation environment
  • Simplifying and accelerating backups, updates, and upgrades of switches, routers, relays and IEDs to drive operational efficiency
Indrek Kunnapuu-2

Indrek Kunapuu




Cloud Implementation - Implementing trusted cloud architecture to optimise storage and processing of data

  • Accelerating cloud adoption to reach the maturity needed to support energy system and utility business model change
  • Tackling technical limitations of legacy OT and achieving the mindset shift needed to support the necessary shift to cloud-based systems
  • Reducing cost of traditional on-prem solutions and facilitating the management of the volumes of data needed to operate increasingly distributed grid infrastructure
Kristian Alsing-3

Kristian Alsing

Cybersecurity Executive


AMI Security - Mitigating threats to advanced metering infrastructure to secure data flow in OT environments

  • Getting visibility of the key weaknesses of Advanced Metering Infrastructure and how threat actors may attempt to exploit them
  • Conducting penetration tests to verify the resistance of Advanced Metering Infrastructure to cyber threats
  • Identifying and eliminating weak points of AMI infrastructure and its elements to increase its cybersecurity resilience
Tomasz Wysztygiel-1

Tomasz Wysztygiel

Cybersecurity Manager



Close of Conference Day Two

Close of Conference Day Two

Thursday 18th May 2023: IT-OT Cybersecurity Conference Day Three


Registration and Refreshments


Welcome from the Chair: Anthony Eshpeter, CTO, SUBNET


Systems Resilience - Implementing a systemic security classification of assets to optimise confidentiality, integrity and availability of critical systems

  • Employing a mutual strategy across IT and OT to enable offline operation of the most critical systems in the event of a major attack or catastrophic failure
  • Overcoming resource scarcity in a remote island location and reliance on remote vendor access and expertise to ensure secure, reliable operation
  • Gaining in depth knowledge of systems and applications to efficiently communicate criticality and prioritise remediation plans
Annilisa Arge Klevang-1

Annilisa Arge Klevang




Integrated IT/OT SOC - Developing an integrated IT and OT SOC capable of a holistic response to threats across converged environments

  • Overcoming cultural and technical barriers to deploying security monitoring solutions in the OT environment
  • Gaining full visibility of OT dependencies and vulnerabilities, and modelling use cases to effectively and automatically reduce logged events (false positives) without missing any real OT relevant security events
  • Preparing effective substation and supply chain security measures, incident response plans and playbooks to counter combined threats to your IT and OT systems
Ivo Maritz-1

Ivo Maritz

Senior Adviser Cybersecurity

Monti Stampa Furrer & Partners Ltd


Design zero-trust architecture on your OT network with software-defined networking

• Analyze common requirements of an OT network
• Discuss why SDN fits perfectly with the OT environment
• Review how to quickly deploy SDN infrastructure 


Giorgio Vielmini

Regional Technical Manager




Morning Refreshments


Cyber-informed Engineering - Establishing a national cyber-informed engineering strategy to embed security in clean energy system transformation

  • Harnessing expertise and insight from energy companies, energy systems and cybersecurity manufacturers, standards bodies, researchers, DOE National Laboratories, and Federal partners in the cybersecurity and engineering mission space to adopt a national strategy towards increasing the security, reliability, and resilience of the US’s energy sector
  • Leveraging CIA to address gaps in how we train engineers and technicians to provide them with the means to build in security from the ground up
  • Establishing the framework to embed cybersecurity into energy systems and avoid the need to retrospectively secure critical systems
Andy Bochman-2

Andy Bochman

Senior Grid Strategist

Idaho National Laboratory


Systems Resilience - Using AI and computational intelligence to detect, prevent, respond, and recover from attacks on cyber-physical power systems

  • Hardware in the loop simulations with power grid digital twins, digital substations, Control Room of the Future (CRoF) and IT-OT cyber range to develop strategies for detection and mitigation of cyber attacks on OT systems and prevent cascading failures
  • Developing AI-based incident response and recovery strategies from cyber attacks on CRoF and digital substations
  • Allowing utilities to stress OT systems, technology and processes using a digital twin of the end-to-end power grid to ensure cyber resilience and support cyber security innovation
Alex Stefanov-4

Alex Stefanov


Control Room of the Future


Lunch, Exhibition, and Networking

IT Security Track - Implementation

OT Security Track - Implementation

Chair: Kelly Stich, Chief Cybersecurity Architect, Subnet 


Network Re-segmentation - From critical infrastructure security design to IT architecture and processes transformation

• Leveraging standards and best practices to improve the separation of the IT and OT networks, while supporting the business’s smart grid transformation
• Realignment of the security and infrastructure services for the re-designed network
• Using the opportunity to transform the architecture processes and enforce the secure-by-design paradigm

Jeremi Gryka-3

Jeremi Gryka

ICT Security Director


Incident Response - Establishing an incident response and recovery playbook for OT engineers to ensure ongoing operability and resilience of OT networks in the event of a cyber incident

  • Equipping OT engineers with tools and training to enable speedy first response to the incident
  • Creating an incident and recovery playbook which is understood and respected by OT engineers
  • Maintaining availability while responding to suspicious activity
Lukasz Kisielewski-1

Lukasz Kisielewski

OT Security Delivery & Senior Manager



ISO 27001 ­- Mapping new ISO 27000 requirements and normative changes to the ISMS of electricity grid providers

  • Understanding how regulatory and normative changes will be transposed into national law to obtain clear guidance on the impact to your management systems
  • Mapping and applying new requirements to inform your change management strategy
  • Reorganizing your ISMS in line with new norms to reduce complexity
Michael Ring-1

Michael Ring

Information Security Officer (ISO) GFO


OT Modernization - Opening the OT mindset towards IT agility and innovation to enable transformation, achieve cost savings, and drive efficiency

  • Prioritising education to align people, process and technology across all levels of the organisation
  • Establishing and developing an integrated framework to map governance, risk, compliance, technical security controls and audit and establish a common language
  • Defining effective KPIs for management, budget holders, engineers, and IT to support tangible security
Deniz Tugcu-3

Deniz Tugcu,

Lead Senior OT Cybersecurity Specialist



Afternoon Refreshments, Exhibition and Networking

Afternoon Refreshments, Exhibition and Networking


Risk Management - Implementing a risk management strategy under an ISO 27000 certified ISMS

  • Using section 5 of ISO 27001 to determine and prevent risk in a cycle of continual improvement
  • Developing documentation for identification, assessment, and treatment of risk on an ongoing basis to demonstrate risk tolerance, termination or transfer and to deploy effective controls
  • Establishing processes to demonstrate compliance to cybersecurity regulations and become more resilient to cyberattacks
Photo Rúben CV

Ruben Figueiredo

Cyber Security GRC Manager


OT Supplier Security Assessment - Taking a criticality-based assessment approach to establish a secure and resilient OT-Supplier pool

  • Implementing standards and procedures to provide transparent requirements for OT-suppliers
  • Collaborating with suppliers on a continuous basis to develop trust and collectively ensure control of risk
  • Applying best practice for grid operators to proactively optimize cyber security resilience, and ensure a reliable level of trust in components of OT systems and services
Salim Bouramman-4

Salim Bouramman

Expert OT Cyber Resilience and Cyber Range



Close of Conference Day Three

Close of Conference Day Three