Conference Day Two
Wednesday, July 31

8:30 am Check-In & Coffee

9:00 am Chair’s Opening Remarks

Defend & Govern Your Firm With Artificial Intelligence

9:10 am Panel: Analyzing the Growing Danger of AI to Proactively Equip Your Business & Mitigate Potential Risks

Synopsis

  • Gaining insight into the recent advancements in AI and the implications for the construction industry
  • Learning novel methods cybercriminals are employing to utilize AI in their attack vectors
  • Understanding the legal implications of utilizing AI and how to navigate them for in-house use

9:50 am Audience Discussion: Leveraging AI for Governance & Defensive Objectives to Enhance Resource Allocation & Minimize Inefficiencies

Synopsis

  • Exploring how AI can streamline data processes and ensure appropriate access levels for users
  • Navigating the current maturity level of AI solutions and exploring the potential applications for governance and defence against cyber threats
  • Benchmarking strategies to effectively monitor the impact AI is having upon daily operations

11:00 am Morning Break & Networking

Preparing Your Firm for an Attack

11:30 am Case Study: Mitigating Malware & Ransomware Threats to Protect Project Integrity

Synopsis

  • Understanding potential financial, information, and project viability impacts of a successful hack of your business
  • Exploring diverse strategies and solutions adopted by industry peers for ransomware protection and mitigating supply chain risks
  • Implementing rapid rollback mechanisms to minimize financial impacts and reduce operational downtime in the event of a ransomware attack

12:10 pm Preparing Effective Incident Response Procedures to Minimize Disruption & Ensure Business Continuity

  • Eric Corder Head of Information Technology & Security, Performance Contracting Group
  • Shane Brown Information Security Manager, Performance Contracting Group

Synopsis

  • Understanding common routes leading up to an organization requiring an incidence response team and how to develop your approach to avoid them
  • Enhancing risk assessments and contingency planning to maintain business operations during disruptions
  • Employing multiple layers of data recovery solutions to enhance resilience and ensure data integrity

12:50 pm Networking Lunch

1:50 pm Ensuring Alignment of Robust Security Procedures Between All Project Partners to Eliminate Weak Links & Maintain Operations

Synopsis

  • Establishing and enforcing enterprise security standards for project partners and vendors, to increase service quality and business efficiency
  • Standardizing device security requirements for partners to promote project-wide adherence and increase protection
  • Implementing effective digital isolation measures for compromised machines to maintain project schedule and mitigate impacts upon other network devices

2:30 pm Audience Discussion: Improving Individual & Collective Contributions to Bolster Cybersecurity Team Efficiency & Foster New Opportunities

Synopsis

  • Implementing a regular rhythm and defined agenda for team interactions to maintain alignment whilst allowing flexibility for individual responsibilities
  • Leveraging diverse skill sets and perspectives within your team to enhance operational efficiency
  • Demonstrating tangible value to your organization to propel self-advancement alongside team success

3:10 pm Case Study: Mastering the Implementation of New Technologies to Minimize Business Down-Time

  • Hunter Drawdy Vice President of Technology Design & Operations, Power Design

Synopsis

  • Identifying appropriate investment levels of new tech for current and projected business needs
  • Examining prevalent roadblocks surrounding the seamless integration of new tools and systems
  • Sharing lessons learned and strategies to reduce time from software acquisition to enterprise-wise adoption 

3:50 pm Chair’s Closing Remarks

4:00 pm End of Conference