Cybersecurity Track

Tuesday, August 20, 2024
1:15 PM - 2:15 PM
Navigating the NIST Guidelines for BEAD: From Assessment to Deployment
Evan Rice

This session outlines a systematic approach to achieving cybersecurity compliance with NIST guidelines. Covering a Compliance Roadmap, including assessing current controls, identifying gaps, and remediation steps, as well as practical steps for deploying the plan, such as budgeting, risk cataloging, supply chain management, and addressing operational challenges.

Wednesday, August 21, 2024
8:00 AM - 9:00 AM
Unraveling Adversarial Machine Learning
Anmol Agarwal

Machine learning is ubiquitous today. As we begin to rely on it for daily tasks, threat factors will begin to target it. Attendees will learn about adversarial machine learning and the different kinds of attacks. In addition, learn about real world case studies regarding attacks that have impacted the industry.

Thursday, August 22, 2024
8:00 AM - 9:00 AM
Using Inertial Navigation Technology to Obtain Critical Pipeline Data
Daryl Reid

Gyroscopic Mapping, using Inertial Navigation Technology, is rapidly becoming a widely accepted method for obtaining accurate XYZ data of subsurface utility infrastructure. Gyro-mapping has a number of advantages over traditional mapping that make it the more suitable and/or desirable technology in existing networks as well. This session introduces the concept, operational method, and data output.