{"id":339,"date":"2022-11-16T18:00:34","date_gmt":"2022-11-16T17:00:34","guid":{"rendered":"https:\/\/industrial-cybersec.com\/?page_id=339"},"modified":"2023-11-30T14:11:38","modified_gmt":"2023-11-30T13:11:38","slug":"conferenties-worden","status":"publish","type":"page","link":"https:\/\/industrial-cybersec.com\/nl\/conferences-be\/","title":{"rendered":"Conferenties"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"339\" class=\"elementor elementor-339\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f48567d elementor-section-full_width elementor-section-height-min-height elementor-section-items-stretch elementor-section-height-default\" data-id=\"f48567d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a7d8f61\" data-id=\"a7d8f61\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4b235c3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4b235c3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d04bc47 elementor-invisible\" data-id=\"d04bc47\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2534e37 elementor-hidden-mobile elementor-widget elementor-widget-image\" data-id=\"2534e37\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_mouse&quot;:&quot;yes&quot;,&quot;motion_fx_mouseTrack_effect&quot;:&quot;yes&quot;,&quot;motion_fx_mouseTrack_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0.1,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"422\" height=\"495\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/MicrosoftTeams-image-9.png\" class=\"attachment-large size-large wp-image-186\" alt=\"Favicon ICF\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3e55039 elementor-invisible\" data-id=\"3e55039\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-713d30d elementor-widget elementor-widget-heading\" data-id=\"713d30d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Industrial Cybersec Forum<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b05c8bf elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b05c8bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a2625d elementor-widget elementor-widget-heading\" data-id=\"2a2625d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conferenties<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1177811 elementor-widget elementor-widget-button\" data-id=\"1177811\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/mcevent.mark-com.com\/IndustrialCyberSecForum2023\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Inschrijvingen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3dd295c3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3dd295c3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2862f444\" data-id=\"2862f444\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1e9243e9 elementor-widget elementor-widget-heading\" data-id=\"1e9243e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">CONFERENTIES 2023 - INDUSTRIAL CYBERSEC FORUM<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3fd1e5ac elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3fd1e5ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17d6647f elementor-widget elementor-widget-text-editor\" data-id=\"17d6647f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Hieronder vindt u het programma van de conferentie, dat regelmatig zal worden bijgewerkt.<\/p><p>Vous trouverez ci-dessous, le programme des conf\u00e9rences qui sera r\u00e9guli\u00e8rement mis \u00e0 jour.<br><\/p>\n<p>Here below, you can find the program of the conferences that will regularly be updated.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-707033a3 elementor-widget elementor-widget-heading\" data-id=\"707033a3\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"conference-1\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conferenties <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12f6cd4b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"12f6cd4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1aa31778 elementor-widget elementor-widget-accordion\" data-id=\"1aa31778\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4461\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-4461\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-vert\"><p class=\"heure-titre\">8:00 - 9:00 uur<\/p><p class=\"texte-titre\">Welkom koffie<\/p><p class=\"pause\">PAUZE<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4461\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-4461\"><h3 class=\"vert\">Welkom koffie<\/h3>\n<p class=\"heure\">8:30 - 9:00 uur<\/p>\n<p class=\"texte\">Kom bij ons op de koffie!<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4462\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-4462\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">9:00 - 9:30 uur<\/p><p class=\"texte-titre\">Opening session - Cyber Security Obsolete ? Speak about Cyber Resilience now <\/p><p class=\"pause\">AGORIA<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4462\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-4462\"><h3 class=\"bleu\">Opening Session \u2013<b>Cyber Security Obsolete ? Speak about Cyber Resilience now !\u00a0<\/b><\/h3><p class=\"heure\">9:00 - 9:30 uur<\/p><p class=\"heure\">Eric Van Cangh - Agoria<\/p><p><span style=\"font-weight: 400;\">\u201cWe live in a world where digital transformation brings its share of advantages for our economy but also for our everyday life.<\/span><\/p><p><span style=\"font-weight: 400;\">The other side of the coin, it also increases the exposure of our company (including our data) to the outside world.<\/span><\/p><p><span style=\"font-weight: 400;\">Just look at what is happening in Belgium with the impacts on big cities, hospitals, multinational companies\u2026<\/span><\/p><p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Cybersecurity the set of means to protect our information at the level of people, processes and technology is on the table of most of our leaders.However, with the number of attacks, the sophistication of the attacks and the increasingly growing impact, <\/span><b>Cyber Security alone is becoming almost obsolete<\/b><span style=\"font-weight: 400;\"> (World economic forum April 2022)<\/span><\/p><p><span style=\"font-weight: 400;\">We are now talking about <\/span><b>Cyber weerbaarheid,<\/b><span style=\"font-weight: 400;\"> this ability to resist to a change\u2019s\u00a0 effect like floods, fires and cyber-attacks.<\/span><\/p><p><span style=\"font-weight: 400;\">During this conference, the socio-economic state of cyber security in Belgium will be discussed (Agoria study Nov 2022) but also some notions on how to increase this cyber resilience for our industries and our public<\/span><\/p><p><span style=\"font-weight: 400;\">At the end we will convince to you : Cyber resilience is a mindset to adopt.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4463\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-4463\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">9:30 - 10:00 uur<\/p><p class=\"texte-titre\">De-mystifying Active Query in OT networks<\/p><p class=\"pause\">Tenable<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4463\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-4463\"><h3 class=\"bleu\"><strong>De-mystifying Active Query in OT networks<\/strong><b> \u00a0<\/b><\/h3><p class=\"heure\">9:30 - 10:00 uur<\/p><p class=\"heure\">Dominic Storey - Tenable<\/p><p><span style=\"font-weight: 400;\">Mention \u201cnetwork scanning\u201d and \u201cOT network\u201d in the same sentence and you will hear the cry \u2013 \u201cIt\u2019s not safe!\u201d. Yet OT vulnerability management deployments increasingly point to the inconvenient truth that passive discovery alone simply does not get the asset data necessary for security practitioners to do their jobs. How can security organisations safely resolve this paradox? This session explains how you can use active query methods safely and effectively in the OT environment and lays out a roadmap for getting buy-in from your concerned colleagues. We will also discuss real-world hybrid query scenarios and their benefits in reducing deployment costs and optimising time-to-value of the deployed solution.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4464\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-4464\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">10:00 - 10:30 uur<\/p><p class=\"texte-titre\">Business Continuity and Cyber Security: a mandatory collaboration to reach operational resilience<\/p><p class=\"pause\">SYNERGIT<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4464\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-4464\"><h3 class=\"bleu\"><strong>Business Continuity and Cyber Security: a mandatory collaboration to reach operational resilience<\/strong><\/h3><p class=\"heure\">10:00 - 10:30 uur<\/p><p class=\"heure\">Christian De Boeck - SYNERGIT<\/p><p>The \u00ab\u00a0NIST\u00a0\u00bb cybersecurity framework (currently in version 1.1 released in 2018) has undertaken an update to version 2.0. The basic concept consisting of five functions (Identify, Protect, Detect, Respond and Recover) remains relevant, and so does, until now, the lack of enthusiasm of many cybersecurity teams to address this \u00ab\u00a0Recover\u00a0\u00bb part, which they believe should be covered \u00ab\u00a0elsewhere\u00a0\u00bb.<\/p><p>The challenge is indeed a major one: while most companies have developed Business Continuity Plans (BCP) which (hopefully) can build on their counterparts within IT departments (DRP plans), these initiatives are often not or only loosely coupled with cyber security, giving a false sense of security, especially when it comes to cyber threats.<\/p><p>Met de snelle convergentie van de IT- en OT-omgeving neemt het industri\u00eble risico als gevolg van een cyberaanval alleen maar toe en kan het veel meer in gevaar brengen dan alleen het bedrijf dat het doelwit is.<\/p><p>At Synergit, we are committed to co-creating proven enterprise resilience. In this presentation, we will propose our approach in which CISOs \/ CISOs and security teams are uniquely positioned to federate all of these initiatives into a cross-functional approach that will provide robustness and resilience to improve business performance and ultimately survival<strong>.<\/strong><\/p><p class=\"texte\">\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4465\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-4465\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-vert\"><p class=\"heure-titre\">10:30 - 11:00 uur<\/p><p class=\"texte-titre\">Koffiepauze<\/p><p class=\"pause\">PAUZE<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4465\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-4465\"><h3 class=\"vert\">Koffiepauze<\/h3>\n<p class=\"heure\">10:30 - 11:00 uur<\/p>\n<p class=\"texte\">Ruimte voor netwerken<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4466\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-4466\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">11:00 - 11:30 uur<\/p><p class=\"texte-titre\">Best practices for securing OT\/IT Convergence <\/p><p class=\"pause\">THALES<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4466\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-4466\"><h3><strong>Best practices for securing OT\/IT Convergence<\/strong><\/h3><p class=\"heure\">11:00 - 11:30 uur<\/p><p class=\"heure\">Soultana Ellinidou &amp; St\u00e9phanie Tonneau - THALES<\/p><p>With the fast evolvement in digital technologies and the drive towards remote and data-driven operations, the two environments of\u00a0Operational Technology (OT) and Information Technology (IT) have begun to converge.\u00a0\u00a0Technological advances such as the Internet of Things (IoT) and big data analytics have allowed the information world to better understand and influence the physical operational world. As OT grows increasingly similar to IT, the increased connectivity and criticality of the OT systems creates significant challenges for their adaptability, resilience, safety, and cyber security. Hence, change is critical to pursue a secure combined centralized IT-OT organization model. This change should happen by applying a set of best practices, which rely on international standards as IEC 62 443, helping to improve the cybersecurity posture to comply with the NIS2 Directive. These best practices will be extensively presented during the conference.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4467\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-4467\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">11:30 - 12:00 uur<\/p><p class=\"texte-titre\">ISA-62443-3-3 Standard, lessons learn from the plant floor.<\/p><p class=\"pause\">CYBERIUM<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4467\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-4467\"><h3><strong>\u00ab\u00a0ISA-62443-3-3 Standard, lessons learn from the plant floor.\u201d<\/strong><\/h3><p class=\"heure\">11:30 - 12:00 uur<\/p><p class=\"heure\">Gilles Loridon - Cyberium<\/p><p><span style=\"font-weight: 400;\">In this presentation, in the first part, we will introduce the audience to IEC\/ISA 62443 series of standards. Then we will focus on ISA-62443-3-3, which is System security requirements and security levels. In this standard, the security controls requirements depend of the Targeted Security level of the system in consideration. For Example, a Safety Injection System may have a higher Security Level than an Historian system, depending on their impact. We will briefly explain the concept of Zone &amp; conduits, cardinal to the Security Level, SL, and illustrate the all process with Foundational Requirement\u00a0 No5, FR5, Restricted Data Flow.<\/span><\/p><p><span style=\"font-weight: 400;\">In the second part of this presentation, we will look at lessons we learn on the plan floor while implementing FR5 Restricted Data Flow and we will focus on SL-Target, SL-Capability and SL-Achieved across two real-life examples.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4468\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-4468\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">12:00 - 12:30 uur<\/p><p class=\"texte-titre\">Defense in Depth<\/p><p class=\"pause\">SIEMENS<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4468\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-4468\"><h3 class=\"bleu\"><strong>Defense in Depth<\/strong><\/h3><p class=\"heure\">12:00 - 12:30 uur<\/p><p class=\"heure\">Amaury Poncin - SIEMENS<\/p><p><b><i>Veilige communicatie in industri\u00eble netwerken<\/i><\/b><\/p><p><span style=\"font-weight: 400;\">Een aanpak die alle niveaus tegelijk bestrijkt, is essentieel om industri\u00eble faciliteiten zowel intern als extern volledig te beschermen - van operationeel tot veldniveau, van toegangscontrole tot kopieerbeveiliging. Daartoe gebruiken wij een strategie die op alle niveaus voor verdediging zorgt: \"Defense in Depth\" is een alomvattend beveiligingsconcept dat gebaseerd is op fabrieksbeveiliging, netwerkbeveiliging en systeemintegriteit. Wij laten ons leiden door de IEC 62443-norm, de toonaangevende norm voor beveiliging in industri\u00eble automatisering.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4469\" class=\"elementor-tab-title\" data-tab=\"9\" role=\"button\" aria-controls=\"elementor-tab-content-4469\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">12:30 - 13:00 uur<\/p><p class=\"texte-titre\">Cybersecurity for Space as a critical infrastructure <\/p><p class=\"pause\">RHEA<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-4469\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"9\" role=\"region\" aria-labelledby=\"elementor-tab-title-4469\"><h3 class=\"bleu\"><strong>Cybersecurity for Space as a critical infrastructure\u00a0<\/strong><\/h3><p class=\"heure\">12:30 - 13:00 uur<\/p><p class=\"heure\"><em>Pascal Rogiest<\/em> - RHEA<\/p><p>Space Systems have evolved over the last decade from simple communication bent-pipes, to complex data networks integrating satellite and ground communications and data-storage infrastructure. That has transformed space-systems into IT systems, rendering them potentially vulnerable to cyber-attacks. Moreover, the large increase of financial investments into Space, often coming from New Space entrepreneurs, have made Space Systems attractive from a monetary perspective. With high value and critical-services at stake, Space Systems have become prime targets to malicious stakeholders. Today, major cybersecurity systems are being deployed by EU and ESA in order to secure European space assets &amp; services. RHEA is the trusted partner of those organizations in so-called \u00ab\u00a0Cybersecurity for Space\u00a0\u00bb.\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-44610\" class=\"elementor-tab-title\" data-tab=\"10\" role=\"button\" aria-controls=\"elementor-tab-content-44610\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-vert\"><p class=\"heure-titre\">13:00 - 14:00 uur<\/p><p class=\"texte-titre\">Lunchpauze<\/p><p class=\"pause\">PAUZE<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-44610\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"10\" role=\"region\" aria-labelledby=\"elementor-tab-title-44610\"><h3 class=\"vert\">Lunchpauze<\/h3>\n<p class=\"heure\">13:00 - 14:00 uur<\/p>\n<p class=\"texte\">Ruimte voor netwerken<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-44611\" class=\"elementor-tab-title\" data-tab=\"11\" role=\"button\" aria-controls=\"elementor-tab-content-44611\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">14.00 - 14.30 uur<\/p><p class=\"texte-titre\">Reveal the invisible! : You can't protect what you can't see<\/p><p class=\"pause\">NET MEASURE<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-44611\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"11\" role=\"region\" aria-labelledby=\"elementor-tab-title-44611\"><h3 class=\"bleu\"><strong>Reveal the invisible! : You can\u2019t protect what you can\u2019t see<\/strong><\/h3><p class=\"heure\">14.00 - 14.30 uur<\/p><p class=\"heure\"><em>Marc Foulon<\/em> - Net Measure<\/p><p>Marc Foulon presents the latest trends in DDoS attacks and shows you a real time tool of the current landscape.Marc Foulon presents the latest trends in DDoS attacks and shows you a real time tool of the current landscape.<\/p><p>The volume, duration and growing complexity of attacks require industries to equip themselves with the right tools at the right places in order to preserve the continuity of their business.<\/p><p>Total visibility, real-time source detection and investigation are the keys to success in your monitoring and security approach.<\/p><p>Marc Foulon will explain how to implement an NDR solution that unloads \u00a0your firewall and provides you with always-on protection.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-44612\" class=\"elementor-tab-title\" data-tab=\"12\" role=\"button\" aria-controls=\"elementor-tab-content-44612\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-bleu\"><p class=\"heure-titre\">14:30 - 15:00 uur<\/p><p class=\"texte-titre\">Security for Data-Sciences Applications<\/p><p class=\"pause\">TIMI<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-44612\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"12\" role=\"region\" aria-labelledby=\"elementor-tab-title-44612\"><h3 class=\"bleu\"><strong>Security for Data-Sciences Applications<\/strong><\/h3><p class=\"heure\">14:30 - 15:00 uur<\/p><p class=\"heure\"><em>Frank Vanden Berghen<\/em> - Timi<\/p><p class=\"translation-block\">We will cover different aspect of how to implement proper Security in Data-Sciences Applications.<br>How to secure passwords in open source code? What are the implications of GDPR when it comes to security?<br>How can we mitigate security breaches with our teams of data scientists?<br>How should tools and processes be adapted to meet the requirements of resultd for the CDO and security for the CIO?<\/p><p>How can we mitigate security breaches with our teams of data scientists<\/p><p>How should tools and processes be adapted to meet the requirements of resultd for the CDO and security for the CIO?<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-44613\" class=\"elementor-tab-title\" data-tab=\"13\" role=\"button\" aria-controls=\"elementor-tab-content-44613\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"><div class=\"flex-titre bg-vert\"><p class=\"heure-titre\">15.30 uur<\/p><p class=\"texte-titre\">Afsluiting + Netwerken<\/p><p class=\"pause\">PAUZE<\/p><\/div><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-44613\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"13\" role=\"region\" aria-labelledby=\"elementor-tab-title-44613\"><h3 class=\"vert\">Afsluiting en netwerken&nbsp;<\/h3>\n<p class=\"heure\">15.30 uur<\/p>\n<p class=\"texte\">Afsluiting en netwerken&nbsp;<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Industrial Cybersec Forum Inscriptions CONFERENCES 2023 &#8211; INDUSTRIAL CYBERSEC FORUM Vous trouverez ci-dessous, le programme des conf\u00e9rences qui sera r\u00e9guli\u00e8rement mis \u00e0 jour. Hieronder vindt u het programma van de conferentie, dat regelmatig zal worden bijgewerkt. Here below, you can find the program of the conferences that will regularly be updated. Conferences: Room 8:00 &#8211; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-339","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/pages\/339","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/comments?post=339"}],"version-history":[{"count":0,"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/pages\/339\/revisions"}],"wp:attachment":[{"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/media?parent=339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}