{"id":3177,"date":"2025-06-11T13:12:10","date_gmt":"2025-06-11T11:12:10","guid":{"rendered":"https:\/\/insightevents.dk\/isc-cph\/?post_type=tec_session&#038;p=3177"},"modified":"2025-11-03T15:11:27","modified_gmt":"2025-11-03T14:11:27","slug":"walk-talk","status":"publish","type":"tec_session","link":"https:\/\/insightevents.dk\/isc-cph\/sessions\/walk-talk\/","title":{"rendered":"Walk &#038; Talk"},"content":{"rendered":"<p>Choose between various security topics and spend an hour walking in beautiful Copenhagen, while networking with your peers.<\/p>\n<p><strong>1. OT Firmware Security: The Attack Isn\u2019t Coming, It\u2019s Already Installed<\/strong><br \/>\n<em>Patrick C Miller, Owner, Ampyx Cyber<\/em><\/p>\n<p>Firmware sits beneath the operating system, controlling everything from PLCs and RTUs to network gear and field devices. Yet it remains one of the least monitored and least protected layers in operational technology. Modern threat groups know this blind spot well. They no longer need noisy exploits or ransomware when they can simply implant malicious code into trusted firmware and wait. In this walk-and-talk session, we will explore why compromised firmware is no longer a theoretical risk, but a present and active threat already embedded in industrial environments.<\/p>\n<p>Led by Patrick C. Miller, a veteran OT security practitioner and advisor to critical infrastructure operators globally, this session will uncover how attackers target firmware supply chains, exploit trust boundaries, and persist below system defenses. We will walk through real-world scenarios, discuss practical detection methods without halting operations, and explore emerging countermeasures. This session is designed for anyone responsible for OT security resilience including engineers, asset owners, and security leaders who must now treat firmware as an attack surface hiding in plain sight.<\/p>\n<p><strong>2. OT Assessment &amp; Penetration Testing in a Live Environment<\/strong><br \/>\n<em>S\u00f8ren Egede Knudsen, CEO &amp; IT\/OT Security Expert, Egede<\/em><\/p>\n<p>We have been conducting penetration testing in OT environments for some time, but how can it be done safely in a live environment without disrupting production? This is the topic of this walk-and-talk session.<\/p>\n<p>S\u00f8ren Egede Knudsen, who will lead the walk, has extensive experience in both OT cybersecurity and OT penetration testing. He was also selected by SANS to help finalize the new 613 training, which focuses, specifically on this subject.<\/p>\n<p>This walk is intended for both those who commission OT live penetration tests and those who conduct them. It will also highlight some of the major differences between OT and IT penetration testing<\/p>\n<p><strong>3. Navigating the new normal in cybersecurity<\/strong><br \/>\n<em>Marc Br\u00e6ndstrup, Head of Siemens Industrial Security in Denmark, Siemens<\/em><\/p>\n<p>We will explore how the new Machinery Regulation connects CE marking and cybersecurity. Additionally, we\u2019ll investigate the Cyber Resilience Act (CRA) and its influence on the future cybersecurity landscape.<\/p>\n<p><strong>4. Log collection in OT \u2013 And why it\u2019s the core activity for your defence of OT\/ICS<\/strong><br \/>\n<em>Michael L. Weng, SOC Analyst, SektorCERT<\/em><\/p>\n<p>Defence is doable, and it\u2019s time to deliver on that defence in OT\/ICS (Thanks Rob. M. Lee). But to deliver, we must ensure proper logging of relevant telemetry and context data, for the SOC to deliver their end of the deal \u2013 Monitoring, Detection Engineering, Alerting and Incident Response.<br \/>\nIn this Walk &amp; Talk session we will explore and discuss proper logging and data collection for the OT\/ICS SOC functionality. Which Network logs do we need, and which endpoint logs do we need, to ensure correct and timely detection of adversaries in our systems? Will the OT SOC-as-a-Service ever be realistic?<\/p>\n<p>Join Michael Weng, Senior Analyst in SektorCERT\u2019s SOC, which daily monitors and detects threats for more than 450 members in the Danish Critical Infrastructure, as he during this session explores and challenge the current best practice of log-collection and use in a SOC for OT\/ICS.<br \/>\nWe\u2019ll discuss the CMF (Collection Management Framework) possibilities and of course the relevant logs to collect, to support OT SOC work. If you work in a SOC, or just want to gain more knowledge about the issues and challenges surrounding log-collection in OT\/ICS, come and join our Walk &amp; Talk session.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Choose between various security topics and spend an hour walking in beautiful Copenhagen, while networking with your peers. 1) OT Firmware Security: The Attack Isn\u2019t Coming, It\u2019s Already Installed. 2) OT Assessment &#038; Penetration Testing in a Live Environment. 3) Navigating the new normal in cybersecurity. 4) Log collection in OT \u2013 And why it\u2019s the core activity for your defence of OT\/ICS. Click here for more information.<\/p>\n","protected":false},"author":4,"featured_media":0,"template":"","meta":{"inline_featured_image":false,"footnotes":""},"session_track":[7,8,11],"session_location":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Walk &amp; Talk - Industrial Security Conference Copenhagen<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/walk-talk\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Walk &amp; Talk - Industrial Security Conference Copenhagen\" \/>\n<meta property=\"og:description\" content=\"Choose between various security topics and spend an hour walking in beautiful Copenhagen, while networking with your peers. 1) OT Firmware Security: The Attack Isn\u2019t Coming, It\u2019s Already Installed. 2) OT Assessment &amp; Penetration Testing in a Live Environment. 3) Navigating the new normal in cybersecurity. 4) Log collection in OT \u2013 And why it\u2019s the core activity for your defence of OT\/ICS. Click here for more information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/walk-talk\/\" \/>\n<meta property=\"og:site_name\" content=\"Industrial Security Conference Copenhagen\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-03T14:11:27+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/walk-talk\/\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/walk-talk\/\",\"name\":\"Walk & Talk - Industrial Security Conference Copenhagen\",\"isPartOf\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\"},\"datePublished\":\"2025-06-11T11:12:10+00:00\",\"dateModified\":\"2025-11-03T14:11:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/walk-talk\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insightevents.dk\/isc-cph\/sessions\/walk-talk\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/walk-talk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insightevents.dk\/isc-cph\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Walk &#038; Talk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/\",\"name\":\"Industrial Security Conference Copenhagen\",\"description\":\"Industrial Security Conference Copenhagen\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Walk & Talk - Industrial Security Conference Copenhagen","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insightevents.dk\/isc-cph\/sessions\/walk-talk\/","og_locale":"en_GB","og_type":"article","og_title":"Walk & Talk - Industrial Security Conference Copenhagen","og_description":"Choose between various security topics and spend an hour walking in beautiful Copenhagen, while networking with your peers. 1) OT Firmware Security: The Attack Isn\u2019t Coming, It\u2019s Already Installed. 2) OT Assessment & Penetration Testing in a Live Environment. 3) Navigating the new normal in cybersecurity. 4) Log collection in OT \u2013 And why it\u2019s the core activity for your defence of OT\/ICS. Click here for more information.","og_url":"https:\/\/insightevents.dk\/isc-cph\/sessions\/walk-talk\/","og_site_name":"Industrial Security Conference Copenhagen","article_modified_time":"2025-11-03T14:11:27+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insightevents.dk\/isc-cph\/sessions\/walk-talk\/","url":"https:\/\/insightevents.dk\/isc-cph\/sessions\/walk-talk\/","name":"Walk & Talk - Industrial Security Conference Copenhagen","isPartOf":{"@id":"https:\/\/insightevents.dk\/isc-cph\/#website"},"datePublished":"2025-06-11T11:12:10+00:00","dateModified":"2025-11-03T14:11:27+00:00","breadcrumb":{"@id":"https:\/\/insightevents.dk\/isc-cph\/sessions\/walk-talk\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insightevents.dk\/isc-cph\/sessions\/walk-talk\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/insightevents.dk\/isc-cph\/sessions\/walk-talk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insightevents.dk\/isc-cph\/"},{"@type":"ListItem","position":2,"name":"Walk &#038; Talk"}]},{"@type":"WebSite","@id":"https:\/\/insightevents.dk\/isc-cph\/#website","url":"https:\/\/insightevents.dk\/isc-cph\/","name":"Industrial Security Conference Copenhagen","description":"Industrial Security Conference Copenhagen","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/sessions\/3177"}],"collection":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/sessions"}],"about":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/types\/tec_session"}],"author":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/users\/4"}],"version-history":[{"count":0,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/sessions\/3177\/revisions"}],"wp:attachment":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/media?parent=3177"}],"wp:term":[{"taxonomy":"tec_track","embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/session_track?post=3177"},{"taxonomy":"tec_location","embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/session_location?post=3177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}