Training

Cybersecurity: How to make your production hacker proof?

Gent
Cybersecurity: How to make your production hacker proof?

Event address

ICC GENT
Familie van Rysselberghedreef 2
9000 Gent
Belgium

Flanders Make event on cybersecurity

Are you betting on the end-to-end digitisation of your production? Then don't miss this event!
You will get a picture of the needs around end-to-end digitalisation in the field of IT/OT security.

End-to-end digitalisation fits into the circular economy and industry of the future. It stands for the digitalisation of the entire chain of business processes, from product design to production control and steering, and the exchange of that data. Often, this data exchange takes place not only within the company walls, but also outside, e.g. between several sites, possibly in several countries and with suppliers.

Important needs here are:

  • Secure data sharing within a self-defined framework
  • Check received data before entering the company
  • Securing software applications so that they cannot be hacked

COMPANY EXPERTS HAVE THEIR SAY

Experts from Ebo Enterprises, Delaware, Savaco and Ometa explain how companies can safely take their next steps in digitalisation. Both companies taking their first steps and those already well advanced in their digitalisation will gain new insights during this event.

Programme

Time Topic
15:00 Welcome with coffee
15:30 Introduction
Marc Engels & Grisja Lobbestael - COO & CEO, Flanders Make
16:00

Realtime Secured Digital Workspaces give actionable insights on your shopfloor
Luc Deleu - CEO, Ometa
"In short, Ometa presents its wealth of experience in integrating various systems and ensuring efficient data management. They have a unique approach to security that provides a secure login and security token creation while validating authentication and authorization for each API call. Its real-time data streams bring ERP (planning) and Shopfloor (actual) data together resulting in immediate actionable insights."

How do you best handle cybersecurity in the design of your "connected" devices?
Vincent Haerinck - Team Manager Security, Savaco
"How do you deal with cybersecurity in the design of your "connected" devices? Vincent explains a case of a manufacturer that builds appliances with built-in "callback" functions, which remotely monitors a number of parameters. These devices are placed in the end customers' network and are connected 24/7 to the internet and underlying manufacturer's systems. The case contains some typical stumbling blocks when setting up such systems and gives concrete tips on how to overcome them."

16:45 Break
17:15

Wind farm intrusion detection case study
Tijl Deneut - Security Engineer en Teamlead Security, Ebo Enterprises
"If you want to ensure that your industrial manufacturing environment remains safe and secure, it is crucial to have thorough visibility. However, this can be challenging when it comes to maximising results while ensuring safety and security. This session will not only present a concrete approach to asset visibility, but also how this can lead to benefits other than security. Moreover, some concrete use cases will be presented from a Flemish wind farm, explaining the approach and how it can be applied to other industrial environments."

Protecting hybrid networks – From factory to cloud and back
Dirk Van Hecke – Lead expert Networking, Delaware
"Connected systems are here to stay, from cloud-based AI solutions powered by sensor data from production lines to cloud managed firewalls. With industry 4.0, hybrid is the norm. These hybrid environments come with their new challenges around availability and security. In this session, we will look at how connectivity and cybersecurity are part of the hybrid landscape and how cloud tooling helps with this."

18:00 Paneldicussion and Q&A
18:30 Networking drink with snacks

Register here

The event is free of charge. You only need to register using the form below.

Gent