8:00 am Chair’s Opening Remarks
Cybersecurity In Action
8:10 am Moving from Incident Preparation to Effective Response
Synopsis
- Covering the phases of incident handling (e.g. detection, containment, eradication) and the role of tools like forensic analysis and log collection in mitigating security incidents
- Understanding who to contact in the event of a breach: When should executive teams be involved in incidents versus when can technical teams manage them independently?
- Creating a process for regular simulations to refine decision-making, stakeholder roles, and communication paths during an incident
8:50 am Case Study: Optimizing Security Operations Center (SOC) Management for Enhanced Response Effectiveness
Synopsis
- Determining the appropriate level of access SOC analysts should have, read-only or active control in internal systems
- Fostering a culture of ongoing training and certification for SOC teams to ensure they are prepared to handle emerging threats and new security technologies
- Weighing the pros and cons of internal SOC management versus outsourcing to third-party SOCs or managed security service providers, with considerations around resourcing, control, cost and scalability
10:00 am Morning Refreshments
Leveraging AI-Powered Defense
10:40 am Audience Discussion: Managing the Use of AI to Ensure Business Efficiency & Safety
Synopsis
- Finding ways to reinforce proprietary data to ensure it isn’t exposed or transferred through AI platforms
- Managing risks from employees using unsanctioned AI tools without IT/security approval
- Demonstrating to clients that AI usage is controlled, secure, and doesn’t endanger their data to safeguard client information and build trust
11:20 am Panel: Exploring the Practical Use of AI for Cybersecurity to Better Protect Your Company’s Data
Synopsis
- Reflecting on current perceptions of AI tools and questioning whether these tools truly increase security or simply make operations more efficient
- Overviewing the current vendor landscape to understand how AI is being most effectively implemented by other industries and discussing how appropriate these applications may be in construction
- Discovering how organizations are using AI for alert management to make security decisions faster
12:00 pm Networking Lunch
Mastering Third-Party Risk Management
1:00 pm 1:00 pm Implementing Vetting Processes & Security Controls for Subcontractors & Vendors to Minimize Third-Party Risk
Synopsis
- Defining risk tiers for subcontractors and vendors based on access to sensitive data, project systems, or physical jobsite presence
- Establishing a continuous oversight framework, including regular audits, assessments, and monitoring of partner security practices to ensure compliance and proactively address emerging threats
- Incorporating specific clauses and responsibilities into trade contracts to better define security expectations and accountability, mitigating legal and financial risks associated with breaches
1:40 pm Case Study: Effectively Managing Multi-Tenant Environments While Maintaining Visibility & Control
Synopsis
- Consolidating triage efforts across multiple tenants to improve detection and accelerate response to active threats
- Designing architecture and SOC identity structures for streamlined internal management and oversight
- Establishing privileged accounts within a centralized tenant to enable Microsoft or third-party incident response teams to quickly regain control during a breach
Shaping the Future of Construction Cybersecurity
2:20 pm Panel: Future-Proofing Cybersecurity in Construction to Prepare for What’s Next
Synopsis
- Tracking the maturation of construction technologies and assessing how evolving functionality impacts threat exposure
- Defining clear steps of designing future-proof incident response plans with readiness for AI-driven threats, multi-party breaches, and evolving ransomware tactics
- Evaluating sustainable cybersecurity investments to prioritize scalable security strategies and risk-based tooling across diverse projects