top of page

Schedule

Main Auditorium

Track 2

7:30 AM

Doors Open

8:30 AM - 8:40 AM

Opening Remarks

Mike Holcomb

8:40 AM - 9:30 AM

Keynote: Critical Infrastructure Defense Requires a Whole of Society Approach.
Let's Make Our World Safer Together. 🦄⚡

Bryson Bort

9:30 AM - 9:45 AM

Break

Break

9:45 AM - 10:15 AM

Responsible Adoption of Artificial Intelligence (AI) in Electric Grid Operations

Remy Stolworthy

Solving the Chaos and Confusion to succeed in OT Security

Vivek Ponnada

10:15 AM - 10:30 AM

Break

Break

10:30 AM - 11:00 AM

Undisruptable 2027

Josh Corman & Stephanie Ross

Mission: Resilient—Your OT Cybersecurity Maturity Made Possible

Mandie Grosskopf

11:00 AM - 11:15 AM

Break

Break

11:15 AM - 11:45 AM

As the Grid Swings: Modeling Grid Load Dynamics and Cyber Risk with Newton’s Cradle

Megan Culler

From STARTER kit to MASTER of the universe!

Oren Niskin

11:45 AM - 12:45 PM

Lunch

Lunch

12:45 PM - 1:30 PM

Keynote

Dr. Emma Stewart

1:30 PM - 1:40 PM

Break

Break

1:40 PM - 2:10 PM

Integrating and Implementing CISA Guidance on Maintaining an OT Asset Inventory and Architecture

Brandon Workentin

Modern Attackers are Business People: The Economics of OT Cyber Attacks 101

Anusha Iyer

2:10 PM - 2:20 PM

Break

Break

2:20 PM - 2:50 PM

OT Security Skills: The New Essential for Protecting Industrial Environments

James Risler

What's the Fuss About? Determining Volt Typhoon Next Steps

Joe Slowik

2:50 PM - 3:00 PM

Break

Break

3:00 PM - 3:30 PM

Three Hops to Failure: Why Modern Industrial Systems Don't Break Alone

Munish Walther-Puri

OT Disaster Recovery with Engineering-Centric Scenarios

Saltanat Mashirova & Michael Hoffman

3:30 PM - 3:40 PM

Break

Break

3:40 PM - 4:10 PM

A Day in the Life of a Data Packet and Electron in the Battery Storage System: How to Combine Function and Security in Design

Katherine Hutton & Dr. Ginger Wright

Fabricating Killchains - A Safe Approach to OT Purple Teams

Connor Jackson

4:10 PM - 4:20PM

Break

Break

4:20 PM - 4:45PM

You’ve Scored It—Now What? Data Needs for Effective Remediation

Kylie McClanahan

Access Control Problems and Mitigations in Cyber Physical Systems

Indrakshi Ray

4:45 PM - 4:55 PM

Closing Remarks & Prizes

5:00 PM - 7:00 PM

After Party

Top Secret Location

7:00 PM - 9:00 PM

Reception for Women in OT/ICS Cybersecurity

Another Top Secret Location

Extended Schedule

7:30 AM

Doors Open

8:30 AM - 8:40 AM

Main Auditorium

Opening Remarks

Mike Holcomb

8:40 AM - 9:30 AM

Main Auditorium

Keynote: Critical Infrastructure Defense Requires a Whole of Society Approach.
Let's Make Our World Safer Together. 🦄

Bryson Bort

2x CEO, 3x Founder - services, product, and non-profit companies, Angel Investor in multiple pre-seed/seed startups. Speaker and teacher. Army officer and IC veteran. Press - happy to answer questions on government, cybersecurity, critical infrastructure, and national security. Always be kind and try to make a difference 🦄.

9:30 AM - 9:45 AM

Break

9:45 AM - 10:15 AM

Main Auditorium

Responsible Adoption of Artificial Intelligence (AI) in Electric Grid Operations

Remy Stolworthy

The future of the grid will be powered by AI—or undermined by it. As artificial intelligence transforms grid operations with faster fault detection, sharper forecasting, and smarter optimization, it also introduces new risks: cyber threats, regulatory uncertainty, and human-factor challenges. This talk presents a consequence-driven framework for deploying AI responsibly in the electric grid. We’ll showcase real-world applications across analysis and detection, prediction, and control/optimization, and introduce a new method for scoring AI risks against OWASP’s Top 10 AI/LLM vulnerabilities. Attendees will gain practical strategies to strengthen resilience, boost reliability, and deploy AI securely — ensuring the grid of the future is not only smarter but safer.

9:45 AM - 10:15 AM

Track 2

Solving the Chaos and Confusion to succeed in OT Security

Vivek Ponnada

OT Security isn't that new anymore. For reference, the ISA 99 Committee was formed in 2002, and the first version of the 62443-2-1 was approved in 2009, around the same time that Stuxnet was discovered. So, why in 2026 are we still in such an infancy in OT Security across key critical infrastructure verticals? If OT Security were a student, we expect them to have graduated by now - however, it's as if there was never a syllabus to follow, so while sometime she studies the Alphabet in English, other times she's reading Shakespeare in Spanish. Overall, the 'teachers' or pioneers are so divided that the industry is struggling to tackle the onslaught that's already on, let alone plan for what's coming. This presentation covers the key issues & solutions - 1) Misapplied visibility focus and the managing dependencies for edge protection and secure remote access 2) Avoiding confusion of Asset Management & Network Security Monitoring that share infrastructure but are different applications altogether 3) Choosing the Platform vs. Best in Class solutions to scale across organizations and optimize resources.

10:15 AM - 10:30 AM

Break

10:30 AM - 11:00 AM

Main Auditorium

Undisruptable 2027

Josh Corman & Stephanie Ross

UnDisruptable27 (U27) exists to translate high-level risk awareness into local readiness. Focusing at the nexus of water infrastructure and emergency healthcare, this initiative responds to an urgent reality: critical infrastructure faces a multidimensional threat, and most communities remain underprepared.

U.S. officials have testified about People’s Republic of China (PRC) hackers’ capability and intent to be able to disrupt domestic infrastructure by 2027. This targeting of critical infrastructure by PRC army units creates leverage in a potential conflict, as the disruption of civilian life could impair policymakers’ capacity for rapid response in a crisis. While we cannot control the PRC’s strategic aims, we can reinforce the resilience of our communities.

UnDisruptable27’s mission is to bridge this preparedness gap by equipping communities on the front lines with the information, tools, and support they need to mitigate the impacts of increasingly complex and cascading infrastructure disruptions. By empowering local leadership, infrastructure operators, and everyday Americans with accessible, actionable insights, UnDisruptable27 aims to enhance national resilience… starting at the local level.

10:30 AM - 11:00 AM

Track 2

Mission: Resilient—Your OT Cybersecurity Maturity Made Possible

Mandie Grosskopf

There is no "one size fits all" when it comes to increasing your organization's Cybersecurity Maturity, and that is particularly true for ICS/OT environments. There can be competing priorities between IT, OT, and Leadership teams, and navigating needs, priorities, and zero days can be exhausting. Join us as we discuss cybersecurity regulatory requirements, impacts of cyber attacks on ICS/OT in the wild, and understanding how to go from zero to hero when it comes to protecting your environment.

11:00 AM - 11:15 AM

Break

11:15 AM - 11:45 AM

Main Auditorium

As the Grid Swings: Modeling Grid Load Dynamics and Cyber Risk with Newton’s Cradle

Megan Culler

As the electric grid evolves to accommodate hyperscale data centers, increased digitization, monitoring, and control, and new generation sources like small modular reactors (SMRs), the dynamics of power distribution are becoming increasingly complex—and increasingly fragile. In this talk, we introduce a novel metaphor using a Newton’s cradle to visualize the cascading effects of new OT technologies and changing operational paradigms on grid stability. By adjusting the cradle’s parameters—mass, string length, and timing—we illustrate how even well-intentioned innovations can introduce new vulnerabilities. But this isn’t just a physics lesson. We layer in the digital and cyber dimensions that amplify these effects: automation, digital monitoring and control, AI integration into planning and operations, and the growing attack surface of operational technology (OT). The result is a compelling, accessible framework for understanding how cyber-informed engineering must evolve to keep pace with the grid’s transformation.

11:15 AM - 11:45 AM

Track 2

From STARTER kit to MASTER of the universe!

Oren Niskin

Gaining meaningful hands-on experience with automation equipment is one of the biggest barriers for new practitioners entering ICS/OT security. Industrial gear is expensive, fragile, and rarely accessible outside an operational environment. That slows down learning and limits the talent pipeline—just when our community needs more diverse defenders than ever. This talk introduces a low-cost, beginner-friendly ICS/OT training kit that can be built in a single weekend using commodity hardware. The kit is intentionally simple, replicable, and fully documented by a growing community of tinkerers. The kit also only uses components one would see in a real-world automation system. During the session, I will walk through constructing a basic industrial process—including a fan, start/stop controls, indicator lights, and a four-rung PLC program. We will explore core industrial protocols such as Modbus and EtherNet/IP, demonstrate how to read and write I/O, and show how this small process can evolve over time with add-ons like a historian, additional sensors, and defense instrumentation. I’ll also demonstrate how the kit can be used to simulate common OT attack and detection scenarios, offering a safe environment for experimentation without PowerPoint and without needing a plant full of machinery. Attendees will leave with everything they need—including a parts list, wiring diagram, sample logic, and setup procedures to build their own starter OT lab, contribute to the community, and begin gaining real hands-on ICS experience.

11:45 AM - 12:45 PM

Lunch

12:45 PM - 1:30 PM

Main Auditorium

Keynote

Dr. Emma Stewart

Dr. Emma Stewart is a nationally recognized leader in energy resilience and cybersecurity, with over two decades of experience spanning national laboratories, electric cooperatives, engineering consultancy, federal advisory roles, and international research collaborations. As Chief Power Grid Scientist at Idaho National Laboratory, she leads critical programs at the intersection of cyber-physical security, consequence-driven engineering, and operational transformation for U.S. infrastructure.

1:30 PM - 1:40 PM

Break

1:40 PM - 2:10 PM

Main Auditorium

Integrating and Implementing CISA Guidance on Maintaining an OT Asset Inventory and Architecture

Brandon Workentin

Critical infrastructure organizations increasingly recognize that having an OT asset inventory is essential – but stopping at an inventory leaves a major gap. Modern operations require a living, governed, architectural understanding of the OT environment: how assets connect, how changes are controlled, how remote access is managed, and how risk is continuously informed by real data. This session unifies OT-focused guidance from CISA and the UK’s NCSC focused on creating a Definitive Record of OT Architecture. We will show how organizations can move from static lists to operationalized, continuously updated system knowledge. Attendees will learn how to pair taxonomy, change management, network documentation, and governance into a single, defensible architecture model that reduces risk, supports engineering workflows, and accelerates incident response. By walking through a practical 90-day plan drawn from the guidance and informed by extensive experience across various critical infrastructure sectors, the session highlights not only what to collect and document, but how to make it accurate, authoritative, and useful for operations, maintenance, and cybersecurity teams.

1:40 PM - 2:10 PM

Track 2

Modern Attackers are Business People: The Economics of OT Cyber Attacks 101

Anusha Iyer

In the industrial sector, we have long prioritized "Availability" above all else, often at the expense of cyber. This has created a fundamental economic imbalance where the Unit Cost of an Attack remains negligible even as targeted attacks against OT systems are surging. Modern attackers are business people. They look for the highest ROI. In this session, we move beyond the technical post mortems of exploits to examine the adversary economics of OT security.

2:10 PM - 2:20 PM

Break

2:20 PM - 2:50 PM

Main Auditorium

OT Security Skills: The New Essential for Protecting Industrial Environments

James Risler

As digital transformation accelerates, the line between IT and OT (Operational Technology) is blurring-introducing new risks and new skill requirements for cyber defenders. This session will highlight why OT security skills are now critical for organizations with industrial or critical infrastructure, and outline practical, accessible ways for IT and security professionals to bridge the knowledge gap. We'll break down what makes OT environments unique, common threats and vulnerabilities, and the foundational skills needed to secure them. The talk will showcase real-life examples, such as the impact of ransomware on manufacturing and energy systems, and explain the core technical concepts behind OT network segmentation, asset visibility, and secure remote access. Attendees will gain a clear understanding of tools like SNORT, Wireshark and Firewalls can help protect OT environments-demonstrated through user-friendly scenarios rather than deep technical dives. Whether you're an IT security leader, OT manager, or new to the OT world, you'll leave with practical steps to upskill yourself, the team and strengthen your organization's industrial security posture.

2:20 PM - 2:50 PM

Track 2

What's the Fuss About? Determining Volt Typhoon Next Steps

Joe Slowik

Volt Typhoon has dominated headlines for several years as a unique, persistent, OT-targeting threat. Yet for all this attention, there has been no identified disruptive event linked to this threat actor - what gives? In this discussion, we will examine the "so what" behind Volt Typhoon given the entity's demonstrated tradecraft and, based on a review of historical OT-targeting events, likely next-steps. In this we will review Volt Typhoon's known tradecraft, how this aligns with OT intrusion requirements, and what reasonable actions we can project for Volt Typhoon-linked operations. Placing this in broader context, we will then outline what asset owners and operators need to do - today - to counter threats such as Volt Typhoon to identify intrusions or prevent intrusions from reaching the point of OT disruption. From this, attendees will learn how to conceptualize long-running, emerging threats and what best practices to take to harden environments to maintain availability, integrity, and safety.

2:50 PM - 3:00 PM

Break

3:00 PM - 3:30 PM

Main Auditorium

Three Hops to Failure: Why Modern Industrial Systems Don't Break Alone

Munish Walther-Puri

Modern industrial networks rarely fail in isolation - yet most risk assessments still treat them as if they do. This talk introduces a visual and repeatable way to map how dependencies spread through OT environments, showing how issues in one layer (a network switch, historian feed, cloud connector, or shared vendor account) can quietly ripple three hops away into process instability or safety alarms. This beginner-friendly session walks attendees through the idea of dependency chain mapping and cascading path analysis (CPA) -- methods to trace who depends on whom across engineering, IT, and external service layers. Using relatable ICS examples, like a small SCADA outage that snowballed into logistic bottlenecks, this talk will show how to profile upstream and downstream dependencies, identify critical nodes, and monitor “early wobble” indicators before a fault becomes a full incident. Understanding Dependencies in ICS/OT Cross-sector vs. trans-sector dependencies explained through visuals. Why digital integration increases shared failure modes. Building a Dependency Chain Map Simple method: start from a critical process and walk upstream/downstream. What counts as a “hop” -- technical, procedural, or organizational. Cascading Path Analysis (CPA) in Practice Introduce the CPA framework: trace paths of potential failure. Show indicators to watch (e.g., slow network telemetry preceded historian lag). Reporting and Awareness Turning dependency maps into actionable heatmaps. How to communicate cascading risk to operations and leadership.

3:00 PM - 3:30 PM

Track 2

OT Disaster Recovery with Engineering-Centric Scenarios

Saltanat Mashirova & Michael Hoffman

Building on last year’s vendor-agnostic framework for disaster recovery in operational technology (OT), this year's session expands into a practical, scenario-based methodology. The methodology discussed will work through a plant-level mock scenario, applying disaster recovery workflows to specific outage and loss scenarios. Through this scenario, a structured walkthrough will guide participants in developing critical components of a disaster recovery plan, while taking into account the dependencies, escalation pathways, and validation required to resume functional OT processes safely and efficiently.

3:30 PM - 3:40 PM

Break

3:40 PM - 4:10 PM

Main Auditorium

A Day in the Life of a Data Packet and Electron in the Battery Storage System: How to Combine Function and Security in Design

Katherine Hutton & Dr. Ginger Wright

This session uses a real-world case study to explore how cyber-informed engineering (CIE) can help design effective security controls in utility-scale battery energy storage systems. By following the path of a data packet and an electron, attendees will see how functional influence, control proximity, and trust relationships shape both system performance and cyber risk. The session highlights practical ways to integrate cyber security into the design of complex energy systems. Participants will receive access to tools and information about how to use CIE in their own infrastructure efforts.

3:40 PM - 4:10PM

Track 2

Fabricating Killchains - A Safe Approach to OT Purple Teams

Connor Jackson

Despite newer research suggesting it may not be that fragile, there maintains a fear of security testing against OT/ICS systems. And the fear isn't unwarranted - these are critical production systems with zero-tolerance for downtime. When we perform purple team tests against IT systems, there is almost none of this fear. How can we translate the open-book testing that is being done in corporate networks, and use it to gain a better understanding of our OT security posture? Verifying the effectiveness of defense in depth measures, such as OT-centric visibility, is becoming increasingly important. Purple Teaming in OT is a collaborative, open-book exam approach to understanding whether OT security tools effectively detect and alert on suspicious activity. OT Purple Teams bring together IT, OT, and security stakeholders that previously may not engage on a regular basis. In my talk I'll discuss a refined approach to planning and executing OT purple teams with an emphasis on safety. Focus will be put on designing a mock kill-chain that reflects real-world attacker techniques while limiting the risk of downtime for mission-critical assets. This approach allows teams to analyze the performance of their security stack and identify growth areas within networks that may usually be off-limits for other security assessments.

4:10 PM - 4:20PM

Break

4:20 PM - 4:45PM

Main Auditorium

You’ve Scored It — Now What? Data Needs for Effective Remediation

Kylie McClanahan

Substantial effort goes into prioritizing which vulnerabilities to address, but the work of securing industrial environments—and the need for information to support it—doesn’t stop there. Critical details of remediation options are often published in formats that are not machine-readable, hampering efforts at automation. This session will cover how remediation data differs from vulnerability data, the complexities and interdependencies of the landscape, and initiatives to standardize its reporting and distribution. Finally, it will discuss how this data can be used within an organization to support the vulnerability and patch management process.

4:20 PM - 4:45PM

Track 2

Access Control Problems and Mitigations in Cyber Physical Systems

Indrakshi Ray

The presentation provides the current research efforts on strengthening the cybersecurity of Cyber Physical Systems (CPS) mainly focusing on access control issues which are the root cause for increased attack surface

4:45 PM - 4:55 PM

Main Auditorium

Closing Remarks & Prizes

5:00 PM - 7:00 PM

Top Secret Location

After Party

Check out the views of downtown Miami with your new BSidesICS family and friends!

7:00 PM - 9:00PM

Another Top Secret Location

Reception for Women in OT/ICS Cybersecurity

bottom of page