{"id":24966,"date":"2024-07-09T20:12:10","date_gmt":"2024-07-09T18:12:10","guid":{"rendered":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/?page_id=24966"},"modified":"2024-07-09T23:28:43","modified_gmt":"2024-07-09T21:28:43","slug":"programma-2024","status":"publish","type":"page","link":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/en\/industrialcybersecurity\/programma-2024\/","title":{"rendered":"Industrial Cyber Security program"},"content":{"rendered":"<header id=\"header\" class=\"header header--high header--branch\">\n\n\t\t\t\t\t\t\t\t\t\t<div class=\"header__background header__background--high\">\n\t\t\t\t\t<img decoding=\"async\" class=\"header__background-image\" src=\"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/app\/uploads\/2024\/07\/Afbeelding-voor-nieuwsbrief-header-1920x910.jpg\" alt=\"\">\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\n\t<div class=\"container\">\n\t\t<div class=\"header__content\">\n\t\t\t<div class=\"header__first\">\n\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h6 class=\"header__subtitle\">All information for visitors<\/h6>\n\t\t\t\t\n\t\t\t\t<h1 class=\"header__title\" >\n\t\t\t\t\tIndustrial Cyber Security event \t\t\t\t<\/h1>\n\n\t\t\t\t<div class=\"header__dots-line\">\n\t\t\t\t\t<svg width=\"431\" height=\"9\" viewbox=\"0 0 431 9\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M430.799 4.192a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.135 1.135 0 1 1-2.27 0 1.135 1.135 0 0 1 2.27 0Zm-27.27 0a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.39 1.39 0 1 1-2.78 0 1.39 1.39 0 0 1 2.78 0Zm-27.78 0a1.645 1.645 0 1 1-3.29 0 1.645 1.645 0 0 1 3.29 0Zm-28.29 0a1.9 1.9 0 1 1-3.799 0 1.9 1.9 0 0 1 3.799 0Zm-28.799 0a2.154 2.154 0 1 1-4.308 0 2.154 2.154 0 0 1 4.308 0Zm-29.308 0a2.41 2.41 0 1 1-4.819 0 2.41 2.41 0 0 1 4.819 0Zm-29.819 0a2.663 2.663 0 1 1-5.326.001 2.663 2.663 0 0 1 5.326-.001Zm-30.327 0a2.919 2.919 0 1 1-5.837 0 2.919 2.919 0 0 1 5.837 0Zm-30.837 0a3.173 3.173 0 1 1-6.345.001 3.173 3.173 0 0 1 6.345 0Zm-31.346 0a3.428 3.428 0 1 1-6.856 0 3.428 3.428 0 0 1 6.856 0Zm-31.856 0a3.683 3.683 0 1 1-7.365 0 3.683 3.683 0 0 1 7.365 0Zm-32.365 0a3.937 3.937 0 1 1-7.875 0 3.937 3.937 0 0 1 7.875 0Zm-32.874 0a4.192 4.192 0 1 1-8.384 0 4.192 4.192 0 0 1 8.384 0Z\" fill=\"#FFF960\"\/><\/svg>\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"header__description\">\n\t\t\t\t\t\t\t<p>October 8, 2024 \u2013 Conference Center 1931 in Den Bosch.<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<div class=\"header__second\">\n\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"header__branch-logos\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/app\/uploads\/2024\/02\/Industriele-automatisering.svg\" class=\"header__branch-logo\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/header>\n\n\t<div class=\"header__meta\">\n\t<div class=\"container\">\n\t\t<div class=\"header__meta__category\">\n\n\t\t\t\t\t\t\t<div class=\"header__meta__detail\">\n\t\t\t\t\t<div>Branch<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/en\/kennishub\/?_branches_kennishub=industriele-automatisering\" class=\"header__meta__detail--branch\">\n\t\t\t\t\t\t\t\tIndustrial automation\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n\t<div class=\"table__wrapper table__wrapper--offwhite\">\n\t\t<div class=\"container\">\n\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2 class='table__title'>Program first plenary session<\/h2><\/div>\t\t\t\t\t\t\t\t\t<table class=\"table\">\n\t\t\t\t\t\t<colgroup>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--2\">\n\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--link\">\n\t\t\t\t\t\t<\/colgroup>\n\t\t\t  \t\t\t\t  \t\t\t\t\t\t\t\t<thead class=\"table__head\">\n\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--1\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--2\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t<\/thead>\n\t\t\t  \t\t\t  \t\t\t\t\t\t\t\t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">9.00 \u2013 09.25<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Reception<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">09.30 \u2013 09.55<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Cybersecurity and Europe. Friend or enemy?<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Liesbeth Holterman \u2013 Cyber Safe Netherlands<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/en\/industrialcybersecurity\/programma-2024\/cybersecurity-en-europa-vriend-of-vijand\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/tbody>\n\t\t\t  \t\t\t\t\t<\/table>\n\t\t\t\t<\/div>\n\t<\/div>\n\n\n\n\t<div class=\"table__wrapper table__wrapper--white\">\n\t\t<div class=\"container\">\n\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2 class='table__title'>Parallel sessions 10.00 \u2013 10.25<\/h2><\/div>\t\t\t\t\t\t\t\t\t<table class=\"table\">\n\t\t\t\t\t\t<colgroup>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--2\">\n\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--link\">\n\t\t\t\t\t\t<\/colgroup>\n\t\t\t  \t\t\t\t  \t\t\t\t\t\t\t\t<thead class=\"table__head\">\n\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--1\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--2\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t<\/thead>\n\t\t\t  \t\t\t  \t\t\t\t\t\t\t\t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">10.00 \u2013 10.25<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">The tangible keys to solving intangible threats in the chain<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Jos van Veluw \u2013 Croonwolter&amp;dros<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/en\/industrialcybersecurity\/programma-2024\/de-tastbare-sleutels-tot-het-oplossen-van-ontastbare-dreigingen-in-de-keten\/\" target=\"_self\"><span class=\"table__link--text\">The tangible keys to solving intangible threats in the chain<\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">10.00 \u2013 10.25<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">OT Cyber risk management\u2026 in practice(?)<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Nick Pfennings \u2013 Otconnect<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/en\/industrialcybersecurity\/programma-2024\/ot-cyber-risicomanagement-in-de-praktijk\/\" target=\"_self\"><span class=\"table__link--text\">OT Cyber risk management in practice<\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">10.00 \u2013 10.25<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Synergy between IT and OT, from conflict to collaboration<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Danny Cullens &amp; Gert Ippel \u2013 Actemium-Axians<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/en\/industrialcybersecurity\/programma-2024\/synergie-tussen-it-en-ot-van-conflict-naar-samenwerking\/\" target=\"_self\"><span class=\"table__link--text\">Synergy between IT and OT, from conflict to collaboration<\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">10.00 \u2013 10.25<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Practical application of IEC 62443 as a machine builder<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Stan van Duijnhoven \u2013 IXON<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/en\/industrialcybersecurity\/programma-2024\/iec-62443-praktisch-toepassen-als-machinebouwer\/\" target=\"_self\"><span class=\"table__link--text\">Practical application of IEC 62443 as a machine builder<\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/tbody>\n\t\t\t  \t\t\t\t\t<\/table>\n\t\t\t\t<\/div>\n\t<\/div>\n\n\n\n\t<div class=\"table__wrapper table__wrapper--light-blue\">\n\t\t<div class=\"container\">\n\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2 class='table__title'>Parallel sessions 11.30 \u2013 11.55<\/h2><\/div>\t\t\t\t\t\t\t\t\t<table class=\"table\">\n\t\t\t\t\t\t<colgroup>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--2\">\n\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--link\">\n\t\t\t\t\t\t<\/colgroup>\n\t\t\t  \t\t\t\t  \t\t\t\t\t\t\t\t<thead class=\"table__head\">\n\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--1\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--2\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t<\/thead>\n\t\t\t  \t\t\t  \t\t\t\t\t\t\t\t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">11.30 \u2013 11.55<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">The impact of legislation and regulations<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Bart Scholten \u2013 Kiwa Netherlands<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">11.30 \u2013 11.55<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">OT Risk Management from Paper to Practice: A Pragmatic Step-by-Step Plan for Implementation and Execution<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Frank Ruedisueli \u2013 Secura<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">11.30 \u2013 11.55<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Safely Transition to Secure Industrial Networks to Increase Industrial Automation<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Sarah-Louise Justin, Hans Clardij &amp; Josef Kandelan \u2013 Cisco<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">11.30 \u2013 11.55<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Hardening your network using IEC62443<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Yuri Nijdam &amp; Stefan Barten \u2013 MODELEC<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/tbody>\n\t\t\t  \t\t\t\t\t<\/table>\n\t\t\t\t<\/div>\n\t<\/div>\n\n\n\n\t<div class=\"table__wrapper table__wrapper--white\">\n\t\t<div class=\"container\">\n\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2 class='table__title'>Parallel sessions 12.00 \u2013 12.25<\/h2><\/div>\t\t\t\t\t\t\t\t\t<table class=\"table\">\n\t\t\t\t\t\t<colgroup>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--2\">\n\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--link\">\n\t\t\t\t\t\t<\/colgroup>\n\t\t\t  \t\t\t\t  \t\t\t\t\t\t\t\t<thead class=\"table__head\">\n\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--1\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--2\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t<\/thead>\n\t\t\t  \t\t\t  \t\t\t\t\t\t\t\t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">12.00 \u2013 12.25<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Need for a SOC for OT: The Inevitable Evolution!<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Joep van Heumen \u2013 OT Security Hub<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">12.00 \u2013 12.25<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">The Key to Business Resilience: Getting Started with Business Continuity in the OT<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Marco Rijkschroeff &amp; Louis Priem \u2013 ICT Group<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">12.00 \u2013 12.25<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">If you only have a firewall, every problem looks like a firewall rule<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Arnold Krille \u2013 Genoa partner of Hima Benelux<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">12.00 \u2013 12.25<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Open source tooling workshop for OT cyber security<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Nico Roosenboom \u2013 Keysight Technologies<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/tbody>\n\t\t\t  \t\t\t\t\t<\/table>\n\t\t\t\t<\/div>\n\t<\/div>\n\n\n\n\t<div class=\"table__wrapper table__wrapper--offwhite\">\n\t\t<div class=\"container\">\n\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2 class='table__title'>Parallel sessions 1:30 PM \u2013 1:55 PM<\/h2><\/div>\t\t\t\t\t\t\t\t\t<table class=\"table\">\n\t\t\t\t\t\t<colgroup>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--2\">\n\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--link\">\n\t\t\t\t\t\t<\/colgroup>\n\t\t\t  \t\t\t\t  \t\t\t\t\t\t\t\t<thead class=\"table__head\">\n\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--1\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--2\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t<\/thead>\n\t\t\t  \t\t\t  \t\t\t\t\t\t\t\t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">13.30 \u2013 13.55<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">The impact of ISO 42001 (Artificial Intelligence) on an Industrial environment<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Bas van Hertom \u2013 T\u00dcV Nord Netherlands<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">13.30 \u2013 13.55<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">How to organize an OT Cyber Program and what are the experiences of an active OT Cybersecurity trip<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Claroty<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">13.30 \u2013 13.55<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Industrial Edge as a security toolkit<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Ruud Welschen \u2013 Siemens Netherlands<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">13.30 \u2013 13.55<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">OPC UA standard 10000-100, as a uniform standard for managing devices and updates<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Bert van der Linden \u2013 Phoenix Contact<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/tbody>\n\t\t\t  \t\t\t\t\t<\/table>\n\t\t\t\t<\/div>\n\t<\/div>\n\n\n\n\t<div class=\"table__wrapper table__wrapper--white\">\n\t\t<div class=\"container\">\n\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2 class='table__title'>Parallel sessions 2:00 PM \u2013 2:25 PM<\/h2><\/div>\t\t\t\t\t\t\t\t\t<table class=\"table\">\n\t\t\t\t\t\t<colgroup>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--2\">\n\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--link\">\n\t\t\t\t\t\t<\/colgroup>\n\t\t\t  \t\t\t\t  \t\t\t\t\t\t\t\t<thead class=\"table__head\">\n\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--1\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--2\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t<\/thead>\n\t\t\t  \t\t\t  \t\t\t\t\t\t\t\t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">14.00 \u2013 14.25<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">The Impact of AI on Cybersecurity in OT<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Fortinet<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">14.00 \u2013 14.25<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">IIOT, the end or just the beginning of your problems<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Orange Cyberdefense<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">14.00 \u2013 14.25<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">The next step in OT SOC: Elevating OT threat detection and response capabilities<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Nick Peeters \u2013 SoterICS<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">14.00 \u2013 14.25<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Engineering grade (physical) solutions to protect the critical industrial (OT) environment from external attacks<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Waterfall Security Solutions<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/tbody>\n\t\t\t  \t\t\t\t\t<\/table>\n\t\t\t\t<\/div>\n\t<\/div>\n\n\n\n\t<div class=\"table__wrapper table__wrapper--light-blue\">\n\t\t<div class=\"container\">\n\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2 class='table__title'>Parallel sessions 3:00 PM \u2013 3:25 PM<\/h2><\/div>\t\t\t\t\t\t\t\t\t<table class=\"table\">\n\t\t\t\t\t\t<colgroup>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--2\">\n\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--link\">\n\t\t\t\t\t\t<\/colgroup>\n\t\t\t  \t\t\t\t  \t\t\t\t\t\t\t\t<thead class=\"table__head\">\n\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--1\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--2\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t<\/thead>\n\t\t\t  \t\t\t  \t\t\t\t\t\t\t\t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">15.00 \u2013 15.25<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Compliance vs Risk<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Chris van den Hooven \u2013 Hudson Cybertec<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">15.00 \u2013 15.25<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Aligning your cyber security strategy to optimize business outcomes (and how to get a bigger security budget)<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Dominic Storey \u2013 Tenable<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">15.00 \u2013 15.25<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Beyond the PLC: Comprehensive Strategies for OT Security<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Filip Vanierschot \u2013 Armis<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">15.00 \u2013 15.25<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Transforming OT and IoT Security with Cloud Technologies<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Jeffrey Noya \u2013 Nozomi Networks<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/tbody>\n\t\t\t  \t\t\t\t\t<\/table>\n\t\t\t\t<\/div>\n\t<\/div>\n\n\n\n\t<div class=\"table__wrapper table__wrapper--white\">\n\t\t<div class=\"container\">\n\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2 class='table__title'>Plenary session and networking reception<\/h2><\/div>\t\t\t\t\t\t\t\t\t<table class=\"table\">\n\t\t\t\t\t\t<colgroup>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--2\">\n\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--link\">\n\t\t\t\t\t\t<\/colgroup>\n\t\t\t  \t\t\t\t  \t\t\t\t\t\t\t\t<thead class=\"table__head\">\n\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--1\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--2\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t<\/thead>\n\t\t\t  \t\t\t  \t\t\t\t\t\t\t\t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">15.30 \u2013 15.55<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Plenary session <\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">More information about this lecture will follow<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">16.00 \u2013 16.30<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Networking drinks<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/tbody>\n\t\t\t  \t\t\t\t\t<\/table>\n\t\t\t\t<\/div>\n\t<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":17,"featured_media":0,"parent":22797,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"branches":[12],"events":[352],"secretariat":[],"categories":[],"themes_tax":[],"class_list":["post-24966","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Industrial Cyber Security - programma - FHI, federatie van technologiebranches<\/title>\n<meta name=\"description\" content=\"Stap binnen in de wereld van cybersecurity tijdens het Industrial Cybersecurity Event georganiseerd door FHI. Deze bijeenkomst belicht de meest urgente kwesties omtrent cyberbeveiliging in de industrie. Ontdek of jouw bedrijf voldoende \u2018cyber secure\u2019 is en identificeer uitdagingen in de cruciale samenwerking tussen IT- en OT-afdelingen. Leer hoe je kunt profiteren van digitale innovaties terwijl je de grip op informatiebeveiliging behoudt, en ontdek hoe je regelgeving toepast, inclusief het implementeren van relevante normen.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industrial Cyber Security - programma - FHI, federatie van technologiebranches\" \/>\n<meta property=\"og:description\" content=\"Stap binnen in de wereld van cybersecurity tijdens het Industrial Cybersecurity Event georganiseerd door FHI. Deze bijeenkomst belicht de meest urgente kwesties omtrent cyberbeveiliging in de industrie. Ontdek of jouw bedrijf voldoende \u2018cyber secure\u2019 is en identificeer uitdagingen in de cruciale samenwerking tussen IT- en OT-afdelingen. Leer hoe je kunt profiteren van digitale innovaties terwijl je de grip op informatiebeveiliging behoudt, en ontdek hoe je regelgeving toepast, inclusief het implementeren van relevante normen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/en\/industrialcybersecurity\/programma-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"FHI, federatie van technologiebranches\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-09T21:28:43+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/industrialcybersecurity\/programma-2024\/\",\"url\":\"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/industrialcybersecurity\/programma-2024\/\",\"name\":\"Industrial Cyber Security - programma - FHI, federatie van technologiebranches\",\"isPartOf\":{\"@id\":\"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/#website\"},\"datePublished\":\"2024-07-09T18:12:10+00:00\",\"dateModified\":\"2024-07-09T21:28:43+00:00\",\"description\":\"Stap binnen in de wereld van cybersecurity tijdens het Industrial Cybersecurity Event georganiseerd door FHI. Deze bijeenkomst belicht de meest urgente kwesties omtrent cyberbeveiliging in de industrie. Ontdek of jouw bedrijf voldoende \u2018cyber secure\u2019 is en identificeer uitdagingen in de cruciale samenwerking tussen IT- en OT-afdelingen. Leer hoe je kunt profiteren van digitale innovaties terwijl je de grip op informatiebeveiliging behoudt, en ontdek hoe je regelgeving toepast, inclusief het implementeren van relevante normen.\",\"breadcrumb\":{\"@id\":\"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/industrialcybersecurity\/programma-2024\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/industrialcybersecurity\/programma-2024\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/industrialcybersecurity\/programma-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industrial Cyber Security\",\"item\":\"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/industrialcybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Industrial Cyber Security &#8211; programma\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/#website\",\"url\":\"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/\",\"name\":\"FHI, federatie van technologiebranches\",\"description\":\"Nederlandse branchevereniging voor technologiebranches\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Industrial Cyber Security - programma - FHI, federatie van technologiebranches","description":"Enter the world of cybersecurity at the Industrial Cybersecurity Event organized by FHI. This event highlights the most pressing cybersecurity issues in the industry. Find out if your company is sufficiently &#039;cyber secure&#039; and identify challenges in the crucial collaboration between IT and OT departments. Learn how to benefit from digital innovations while maintaining control over information security, and discover how to apply regulations, including the implementation of relevant standards.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Industrial Cyber Security - programma - FHI, federatie van technologiebranches","og_description":"Stap binnen in de wereld van cybersecurity tijdens het Industrial Cybersecurity Event georganiseerd door FHI. Deze bijeenkomst belicht de meest urgente kwesties omtrent cyberbeveiliging in de industrie. Ontdek of jouw bedrijf voldoende \u2018cyber secure\u2019 is en identificeer uitdagingen in de cruciale samenwerking tussen IT- en OT-afdelingen. Leer hoe je kunt profiteren van digitale innovaties terwijl je de grip op informatiebeveiliging behoudt, en ontdek hoe je regelgeving toepast, inclusief het implementeren van relevante normen.","og_url":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/en\/industrialcybersecurity\/programma-2024\/","og_site_name":"FHI, federatie van technologiebranches","article_modified_time":"2024-07-09T21:28:43+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/industrialcybersecurity\/programma-2024\/","url":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/industrialcybersecurity\/programma-2024\/","name":"Industrial Cyber Security - programma - FHI, federatie van technologiebranches","isPartOf":{"@id":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/#website"},"datePublished":"2024-07-09T18:12:10+00:00","dateModified":"2024-07-09T21:28:43+00:00","description":"Enter the world of cybersecurity at the Industrial Cybersecurity Event organized by FHI. This event highlights the most pressing cybersecurity issues in the industry. Find out if your company is sufficiently &#039;cyber secure&#039; and identify challenges in the crucial collaboration between IT and OT departments. Learn how to benefit from digital innovations while maintaining control over information security, and discover how to apply regulations, including the implementation of relevant standards.","breadcrumb":{"@id":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/industrialcybersecurity\/programma-2024\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fhi.acceptatie.indicia-interactiv.nl\/industrialcybersecurity\/programma-2024\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/industrialcybersecurity\/programma-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/"},{"@type":"ListItem","position":2,"name":"Industrial Cyber Security","item":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/industrialcybersecurity\/"},{"@type":"ListItem","position":3,"name":"Industrial Cyber Security &#8211; programma"}]},{"@type":"WebSite","@id":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/#website","url":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/","name":"FHI, federation of technology industries","description":"Dutch trade association for technology industries","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/en\/wp-json\/wp\/v2\/pages\/24966","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/en\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/en\/wp-json\/wp\/v2\/comments?post=24966"}],"version-history":[{"count":17,"href":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/en\/wp-json\/wp\/v2\/pages\/24966\/revisions"}],"predecessor-version":[{"id":25071,"href":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/en\/wp-json\/wp\/v2\/pages\/24966\/revisions\/25071"}],"up":[{"embeddable":true,"href":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/en\/wp-json\/wp\/v2\/pages\/22797"}],"wp:attachment":[{"href":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/en\/wp-json\/wp\/v2\/media?parent=24966"}],"wp:term":[{"taxonomy":"branches","embeddable":true,"href":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/en\/wp-json\/wp\/v2\/branches?post=24966"},{"taxonomy":"events","embeddable":true,"href":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/en\/wp-json\/wp\/v2\/events?post=24966"},{"taxonomy":"secretariat","embeddable":true,"href":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/en\/wp-json\/wp\/v2\/secretariat?post=24966"},{"taxonomy":"categories","embeddable":true,"href":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/en\/wp-json\/wp\/v2\/categories?post=24966"},{"taxonomy":"themes","embeddable":true,"href":"https:\/\/fhi.acceptatie.indicia-interactiv.nl\/en\/wp-json\/wp\/v2\/themes_tax?post=24966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}