OT Cybersecurity Strategist
Danielle Jablanski is an OT Cybersecurity Strategist at Nozomi Networks, responsible for researching global cybersecurity topics and promoting OT and ICS cybersecurity awareness throughout the industry. In 2022 she also joined the Atlantic Council as a non-resident fellow with the Cyber Statecraft Initiative in the Scowcroft Center for Strategy and Security, focusing on operational technology and workforce development issues. Danielle serves as a staff and advisory board member of the nonprofit organization Building Cyber Security, leading cyber-physical standards development, education, and certifications to advance the physical security, safety, and privacy in public and private sectors. Danielle also serves as the President of the North Texas Section of the International Society of Automation (ISA), organizing monthly member meetings, training, and community engagements. She is also a member of the Cybersecurity Apprenticeship Advisory Taskforce (CAAT) with the Building Apprenticeship Systems in Cybersecurity (BASIC) program sponsored by the Department of Labor.
Cyber Security Panel: Protecting Americas Critical Infrastructure in the Digital Age
Moderator: Danielle Jablanski, OT Cybersecurity Strategist, Nozomi Networks
Bemi Anjous, CISO, Noble Drilling
Chad Adams, Supervisory Cybersecurity Advisor, Region VI, CISA
Joel Austin, SVP, Chief Digital Officer, Oncor Energy
The session will focus on the importance of protecting critical infrastructure, such as power grids, transportation systems, communication networks and IT/OT systems, from cyber threats. The panelists will discuss strategies and best practices for securing these systems, including risk assessment, threat intelligence, incident response, and recovery planning. They will also explore the role of emerging technologies, such as artificial intelligence, blockchain, and IoT, in enhancing critical infrastructure security.
4 OT Cyber Incidents and How to Stop Them
How might operational technology be impacted in a cyber incident? Opportunistic attacks cast at OT operations, Credential Access and exploitation in ICS networks, Destructive Wipers, and targeting of ICS-specific protocols. To address these types of incidents, security leaders need to know what OT they operate and how it all communicates, what product vulnerabilities to hunt for, threat intelligence for the OT/ICS arena, and how to maximize information, tools and partnerships to take action.