Add event to calendar
Member: 600 USD
Non-member: 720 USD
600 USD
Honors and Awards Ticket: 125 USD
Discover the latest innovations at ISA's Automation Summit & Expo! Meet top experts in cybersecurity and digital transformation and listen as they explore the hottest trends and best practices in the industry.
Don’t miss the opportunity to:
Professionals involved in the security process should attend this event to learn more about workforce development strategies, hardware and software protection practices, and ways to improve infrastructure and data security measures.
Join an audience of fellow technical professionals including
Francis Marion Hotel – Charleston, South Carolina, USA
Attendees will be able to participate in live sessions, take part in networking breaks and receptions, and visit tabletop exhibits. After the conference, presentation recordings will be uploaded for all participants and registrants who purchased the Post-Event Recording and Virtual Tradeshow Pass.
Separate registration fee applies. To register, select this course on the event registration form.
Learning Objectives
Topics Covered
Preparing for an Assessment
Cybersecurity Vulnerability Assessment
Steve Mustard
President & CEO, National Automation, Inc.
Separate registration fee applies. To register, select this course on the event registration form.
Description:
The move to using Ethernet, TCP/IP, and web technologies in supervisory control and data acquisition (SCADA) and process control networks has exposed these systems to the same cyberattacks that have wreaked havoc on corporate information systems. This course provides a detailed look at how the ISA/IEC 62443 standards framework can be used to protect critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments.
You will be able to:
You will cover:
Classroom/Laboratory Demo:
Includes ISA Standards:
Patric Dove
Solutions Engagement Manager, 1898 & Co.
Closed sessions. By invitation only. Contact sections@isa.org for information.
Meeting Days:
Eastern North America
Midwest North America
Southern North America
This custom-designed workshop crafts plans for mission-focused, vibrant and successful sections and divisions. Current and aspiring volunteers will leave this workshop with a plan, with energy, with knowledge and with an expanded network of other volunteers who believe in and want to shape ISA’s future.
Separate registration is required. Click here to register.
Join us for a warm welcome reception at the Automation Summit & Expo! Meet and network with fellow attendees and industry leaders while enjoying light refreshments and hors d'oeuvres. This is the perfect opportunity to connect with colleagues and make new connections in a relaxed, social setting. The reception will be held at the Francis Marion Hotel, offering stunning views of Charleston's historic district. Don't miss this chance to kick off your conference experience in style!
NASA’s Johnson Space Center (JSC) in Houston, Texas, is a hub of human spaceflight activity and plays a pivotal role in many of NASA’s key programs. This presentation will delve into the critical role that digital transformation is playing within challenges and solutions of advanced lunar surface initiatives and Astronaut training at JSC, all central to NASA's vision for the future of space exploration and human presence beyond Earth.
Houston Green
Space Exploration Engineer, The Aerospace Corporation, NASA Johnson Space Center
The energy industry faces several cyber security threats, making it imperative for companies to adopt robust security measures. The ISA/IEC 62443 standard is designed specifically for the energy industry to protect critical infrastructure from cybersecurity risks such as cyber attacks. In this 30-minute technology demonstration, Carlos Buenano will showcase how the ISA/IEC 62443 implementation approach can be applied to secure systems and networks in the energy industry. This demonstration aims to help organizations in the energy industry understand and implement the ISA/IEC 62443 standard to strengthen their cyber security posture and protect their critical assets.
Carlos Buenaño
CTO, OT, Armis
In the face of continually evolving cyber threats, industrial organizations are compelled to adopt automated analysis, orchestration, and response technologies, including the capabilities brought by Machine Learning (ML) and Generative AI. Integrating AI into security operations reduces alert fatigue and enables more efficient analysis and response to incidents. Leveraging AI integrated into a security platform enhances threat detection, incident response, and compliance assurance while lowering the total cost of ownership for SecOps infrastructure.
Rod Locke
Director, Product Management, Operational Technology, Fortinet
Amidst the swift advancement of cyber threats, adopting Artificial Intelligence (AI) and Machine Learning (ML) within cybersecurity measures has transitioned from a mere advantage to an absolute necessity. This presentation will provide some of the current challenges and innovative solutions in the realm of industrial cybersecurity. Anchored on critical updates and insights from the latest industry trends and standards, this presentation emphasizes proactive defense mechanisms and effective incident response, with ISA/IEC 62443 as a foundational framework.
Felipe Costa
Product Marketing Manager, Moxa
Explore how manufacturers can thrive in the era of industry 4.0 by capturing and harnessing the power of data to unlock innovation and deliver new revenue streams. This session will highlight the companies who are doing it best.
Jeff Winter
Executive Board Member, ISA
The Xphir4 project is a sophisticated cyber-physical simulator developed by TI Safe Lab, designed to replicate the operational and security aspects of a nuclear power plant. Based on a Pressurized Water Reactor (PWR) model, the Xphir4 simulator integrates various hardware components, including Siemens PLCs (S7-1200), Scalance switches (XC208), and Fortigate firewalls (F60), utilizing communication protocols such as S7-COMM and Profinet. The project adheres to the ISA/IEC 62443 standards for securing Industrial Automation and Control Systems (IACS), ensuring that all phases of the plant's lifecycle—from design to operation—are covered under stringent cybersecurity measures.
Victor Alvarez
Information Security Analyst, TI Safe
In this session, we will explore the critical importance of robust data governance and its impact on your organization’s data backend. As data becomes the lifeblood of businesses, understanding how to harness and manage it effectively can make or break your company's success in today's digital age.
Tom Hollingworth
Principal Consultant, Rhize Manufacturing Data Hub
The crowdstrike breach has significantly impacted businesses worldwide, highlighting the importance of robust cybersecurity measures and operational resilience. Our presenters will cover lessons learned from the breach and its implications for operational technology (OT). It will cover critical lessons learned, including the need for business continuity plans, testing and deployment within the OT environment and critical systems affected.
Sunil Doddi
Senior Principal Process Controls Engineer, Air Products and Chemicals, Inc.
Patrick O’Brien
Cybersecurity Team Lead, exida
Chris Choquette
Senior Cyber Security Consultant, FM Global
In this captivating session, ISA’s own Jason Wampler will discuss the transformative power of Generative AI and its potential to revolutionize organizations across various industries. Jason will discuss how ISA is successfully leveraging their new Large Language Model (LLM) — Mimo — for digital transformation, and will explore the key strategies, challenges, and opportunities that arise when introducing Generative AI to your organization. Discover the tangible benefits of LLMs in optimizing workflows, enhancing customer experiences, and unlocking new business opportunities.
Jason Wampler
Jason Wampler, Managing Director of Information Technology, ISA
Traditionally, manufacturing systems were integrated through point-to-point connections. This meant that as new systems were added, they would need to be integrated with all other systems. As manufacturers become data driven organizations, it became clear that traditional architectures would no longer suffice. This panel will discuss how manufacturing and business systems should be integrated through a common technology stack. The result is faster integration and short time to value.
David Schultz
Senior Consultant, Spruik Technologies
Jeffrey Schroeder
Product Manager, HighByte
Russell Gregg
Director of Manufacturing Solutions, Canary Labs
Robert Graves
Technical Solutions Program Manager, Sales Engineering, Inductive Automation
Dan White
Director of Technical Marketing, Opto 22
Josh Schadel
General Manager & CTO, Signalfire Wireless Telemetry
Arlen Nipper
President & CTO, Cirrus Link
In this session Colin will discuss the A, B, Cs and Ds of technology in South Carolina: Artificial Intelligence, Broadband, Cybersecurity, and Defense. He will walk through the work Savanah National Laboratory is doing in partnership with the Department of Energy for US cybersecurity threat intelligence efforts.
Colin Chinn
Cyber Assurance and Resiliency Group Lead, Savannah River National Laboratory
As the use of artificial intelligence (AI) in industry increases, technology and cybersecurity professionals must focus on engineering intrinsically safe and inherently secure AI systems—especially when used in operational technology (OT) environments, where a system failure or cybersecurity incident could result in serious injury and loss of life, environmental harm, or the interruption of critical infrastructure services. From this context, three core principles of AI safety engineering adapted to IEC 61508 and ISA/IEC 62443 standards will be presented to address the unique needs of OT processes—prioritizing both safety and reliability in operations—with use cases highlighting the ethical cybersecurity and risk management challenges of implementing AI within electric utilities’ OT networks.
Jessa Davis
Security Consulting Manager, Accenture Security
Manufacturing has traditionally relied on business models that drive economies of scale, based on costly carbon-heavy supply chains, that as the COVID pandemic showed, often lack resilience. Every day manufacturers across the globe, execute demand decisions, based on lagging indicators, over long planning horizons, making products far from where they are to be consumed. In this dynamic session, learn how manufacturing will move towards making today what was sold yesterday, leveraging a dynamic ecosystem of flexible manufacturing nodes coupled with complete supply chain visibility. You will hear about the upcoming revolution and how it will foster automated collaboration between buyers of product, those who create it and those owning the IP on how to manufacture, and how it opens up new business models for manufacturing and exciting times ahead for the automation community to invent the infrastructure of the future.
Andrew McDonald
Principal Consultant/Managing Director, FutureofManufacturing LLC
This presentation will explore the key similarities, differences and lessons learned in applying the ISA/IEC 62443 standard within greenfield and brownfield industrial environments. In greenfield (new) projects, where systems can be designed from the ground up, there is a unique opportunity to integrate cybersecurity measures into the architecture from the earliest stages. Chris will discuss strategies for leveraging this opportunity, including best practices for designing a secure infrastructure, selecting compatible technologies, and ensuring seamless integration of security controls. Conversely, brownfield (existing) projects present distinct challenges, particularly when dealing with legacy systems that were not originally designed with cybersecurity in mind. The presentation will address these challenges, offering practical approaches to retrofitting existing systems with modern security measures, managing vulnerabilities inherent in outdated technologies, and balancing operational continuity with the need for enhanced security.
Chris Monchinski
CTO, InflexionPoint
In this cutting-edge session, we’ll delve into the exciting ways Artificial Intelligence (AI) is revolutionizing the deployment of automation systems. Join us as we explore the pivotal role of industrial AI in enhancing production and maintenance operations, and how it serves as a driving force behind configuration systems and sensors integration.
Jonas Berge
Senior Director of Applied Technology, Emerson in Singapore
Bus Pick Up: 4:45 p.m.
1. Pick up Wristband from ISA registration desk in Francis Marion Hotel.
2. Line up with ISA staff in the Francis Marion Lobby.
Don your best aviator shades and cocktail attire as we toast the best and brightest in the automation field and celebrate our 2024 awardees. Enjoy a memorable experience, complete with flight simulators and a tour of the famous Maritime Museum. Tickets (125 USD) include all food and beverages and transportation from the Francis Marion Hotel.
Dress code: semi-formal/cocktail attire. Heels are not required; flats are recommended
Jamie will present a success story on delivering a secure solution allowing data to traverse OT to IT to gain central visibility across our entire portfolio of farms generating renewable energy. It is a very challenging project designed from the ground up, emphasizing cyber security for safety and compliance.
James Clark
Vice President, Information Technology, South Jersey Industries Information Security
The ACME Chemical Company tests 20,000 instruments annually. These instruments have been added to the testing program over the last 20 years and were deemed to be safety critical, production critical, environmentally critical, air permit critical, etc. Management has asked the maintenance/reliability team to reduce the cost of testing but still maintain the overall reliability and safety of the facility. So, how does one achieve what appears to be conflicting goals to extend testing from 12 months to 24 months or even longer while simultaneously maintaining instrumentation performance?
Eric Van Beek
Product Manager, aeShield
Tim Harwood
CEO, Siker Ltd.
Houston Green
Space Exploration Engineer, The Aerospace Corporation, NASA Johnson Space Center
Edgar Baur
Manager—Engineering Digitalization, Robert Bosch LLC
Brian Romano
Director of Technology Development, The Arthur G. Russell Co., Inc.
For leaders in the automation industry, the challenge of building robust teams and nurturing client relationships often poses a stumbling block. In today ' s technical world, possessing technical skills alone is no longer enough. To truly thrive, we must also cultivate our human skills—those qualities that connect us to our humanity, define our personalities, and enable us to communicate and interact effectively with others. By developing emotional intelligence, you will transition from being task-focused managers to empathetic and inspiring leaders. This transformation will not only improve team performance and project outcomes but also create a positive and thriving work environment, leading your organization toward greater success and growth.
Karine Leblanc
Modular Solutions Sales Manager - West, Daikin Applied
Since announcing the Automation and Control Systems Security Assurance (ACSSA) initiative, the ISA Security Compliance Institute (ISCI) has engaged with certification bodies, industry experts, and asset owners to build a robust site assessment process that meets the growing cybersecurity demands of OT environments.
Join us for this exclusive panel of SMEs working on the standard to hear firsthand what the industry can expect, including release dates, preparation documents, and upcoming training opportunities.
Sean Haynes
Chief Marketing Officer, SecurityGate.io
Patrick O’Brien
Cybersecurity Team Lead, exida
Kenny Mesker
OT Cybersecurity Strategist, Chevron
Brandon Price
Sr. Principal Industrial Cybersecurity, ExxonMobil Technology & Engineering Company
Riddhi Padariya
Senior Controls Engineer, Heirloom
Sherry LaBonne
Software Product Manager, Rockwell Automation
Shreya Nandiraju
Consultant, Global Infrastructure Advisory - Deal Advisory, KPMG
Patrick Corbett
Senior Systems Data Engineer, Eli Lilly and Company
Our entire way of life is dependent on reliable water and wastewater services. In the past few years a number of high-profile incidents in this sector has raised concerns about cybersecurity posture and incident readiness. Many nations have taken action to manage this risk, but how well prepared are our water and waste water systems today? This presentation will highlight some of the unique challenges in the sector and provide some recommendations to address this unshakable risk to our society.
Steve Mustard
President & CEO, National Automation, Inc.
Technological developments in recent times have greatly increased our ability to address carbon emissions in a variety of processes and operations. Our capacity to address direct and indirect emissions sources more successfully than in the past has increased as a result of these developments. Massive datasets have been collected easier thanks to the spread of automation and instrumentation solutions, creating data lakes that may be used to proactively identify emission sources and the connections between them and primary carbon emission sources.
In this context, digitalization is essential because it makes it possible to identify the sources of emissions both within and between them, analyze the composition of emissions, and optimize processes—all of which lead to a more sustainable future.
In order to understand the fundamental building blocks of emission control, this presentation explains the transformative power of digital technologies and digitalization capabilities, such as the Industrial Internet of Things (IIoT), Artificial Intelligence and Machine Learning (AI/ML), Unmanned Aerial Vehicles (UAVs), and Digital Twin technologies among others in serving the nezero objective.
This study also suggests an integrated system and data model that may predict emissions related to energy consumption. The presentation also includes control strategies intended to lessen these negative effects on the environment. This research seeks to establish a comprehensive framework for tackling the urgent problem of carbon emissions in the contemporary industrial landscape by integrating these technological breakthroughs and techniques.
Dr. Soloman Almadi
Principal Scientist, Aramco
Patrick Corbett
Senior Systems Data Engineer, Eli Lilly and Company
Colleen Goldsborough
Industry Sales Manager, United Electric Supply
Ashley Weckwerth
Project Manager, Burns & McDonnell
Brian Curtis
REFS Contract Manager, Novartis
Alan Bryant
Senior Automation Engineer, Oxy
Edge devices have a unique set of requirements. Whether they are on the constant move or even going in and out of communication coverage, edge devices need to be designed to be away from connectivity and the ability to acquire information from the back office. This panel will discuss the unique challenges presented by edge devices and different methods that can be used to enable and manage them.
Ron Victor
Executive Vice President, AustinGIS
Mark Kraeling
Solutions Architect, GE Transportation
Arlen Nipper
President & CTO, Cirrus Link
Eva Feng
Vice President of Product Management, ZEDEDA
The evolving threat landscape and increasing interconnectedness of industrial systems have made cybersecurity a top priority for plant owners across industries. This panel discussion brings together asset owners and industry experts to share their insights and experiences in addressing the unique cybersecurity challenges and threats faced by critical infrastructure.
Brandon Price
Sr. Principal Industrial Cybersecurity, ExxonMobil Technology & Engineering Company
Patrick O’Brien
Cybersecurity Team Lead, exida
Chris DaCosta
ICS Cybersecurity Director, Air Products and Chemicals, Inc.
Edgar Baur
Manager—Engineering Digitalization, Robert Bosch LLC
Amazon has what many consider a peculiar culture and approach to inventing, and how this approach to innovation has remained consistent since the company first launched – start with the customer, and work backwards.
In this session, you’ll be introduced to Amazon culture where we obsess over customers, and how Amazon innovates through four distinct yet interdependent elements: Culture, Mechanisms, Architecture, and Organization. You’ll have the chance to dive deeper on each topic, and learn more about practical applications including Leadership Principles, our process for inventing known as "Working Backwards", and structuring working groups into "Two-Pizza Teams". You'll hear how mechanisms empower Amazon to Think Big yet move quickly to deliver products and services to invent on customers' behalf, and how to apply these within any organization to empower customer obsessed delivery.
Andrew Page
Amazon Web Services (AWS)
Plant optimization through loop tuning is nothing new, but how can it be done efficiently and safely? Once optimization is achieved, how do you ensure that performance gains are sustained as process conditions change and equipment wears down? This presentation will guide you through initiating a plant-wide optimization project, highlighting the methodologies and digital tools used. It will also demonstrate, with data and real-world examples, how control loop performance monitoring tools can keep the plant operating at peak performance, while quickly identifying and resolving any new issues that arise.
Dennis Nash
President and Chief Executive Officer, Control Station
Maxym Lachance
Project Manager - Optimization, Advanced Control and Alarm Management, BBA
Many organizations are struggling to find skilled cybersecurity workers to meet their business needs. Part of this struggle for an organization, after years of research by Dr. Stailey in applied workforce, is the discovery that organizations don't know what they don't know about their current cyber workforce. As such this makes it extremely difficult when hiring cyber personnel to really know what skills are needed. Most often organizations are not considering operational technology to be part of cyber processes or initiatives. This presentation will introduce the concept of a workforce inventory with an introduction to some tools and resources that will help an organization from the C-Suite, to HR, to line leaders and front line managers understand cyber competencies that exist across the organization. The information shared in this presentation is being utilized as a backdrop for work in ISA/IEC WG's 10 and 15 to help uncover the professional roles that should be considered when implementing an IACS which will in the future be, potentially, additions to ISA/IEC 62443 standards. Once an organization identifies the business need for these professional roles 62443 standards can help the realization of the premise for what a cyber ready team should consist of. Then based on their unique business size, type, industry focus and business requirements an organization can appropriately and continually align and hire future cyber personnel.
Sean McBride
Director, Informatics Research Institute, Idaho State University
Shane Stailey
Co-CEO, Cyber Workforce Center
ISA-95 is likely the most well-known standards in manufacturing. It is also one of the least understood. It is often characterized as obsolete or out-of-date and not suitable for a modern manufacturing architecture technology stack. This session will provide a basic overview of the standard, covering Parts 2, 3 and 4. It will also demonstrate how to apply the standard to a basic manufacturing use case.
David Schultz
Senior Consultant, Spruik Technologies
The Unified Namespace (UNS) is a popular approach for systems integration. It has been claimed that it is inherently secure due to its pub/sub technology. This claim has resulted in concerns over how secure the approach is. This session will have two parts. The first will provide an overview of the UNS and how to design one. The second is how to apply ISA/IEC 62443 to a UNS and present security considerations.
David Schultz
Senior Consultant, Spruik Technologies
ROI of Industry 4.0 has many facets. This session will look at how to identify immense potential of Industry 4.0 projects and realize the economic and sustainable ‘value’. The session will also delve upon soft returns for customers, employees and finally the society.
Sujata Tilak
Managing Director, Ascent Intellimation Pvt. Ltd.
Brian Romano
Director of Technology Development, The Arthur G. Russell Co., Inc.
Closed session. By invitation only. Contact sections@isa.org for information.
ISA’s international standards play a vital role in promoting safety, cybersecurity and efficiency across global industry. This workshop will provide an overview of ISA’s international standards program and its relationship to and collaboration with the International Electrotechnical Commission (IEC). A panel of experts representing standards stakeholders will then answer questions from the audience.
Charley Robinson
Senior Director, Standards Administration, ISA
This panel is an extension of the ISA Standards Overview and will have time for audience Q&A.
Charley Robinson
Senior Director, Standards Administration, ISA
Scott Reynolds
Security Engineering Manager - ITD, Johns Manville
Ed Manns
Managing Director, External Relations, ISA
Dave Lee
President, User Centered Design Services