Thu, May 18
9:00 AM – 10:00 AM ET

The Role of Generative AI in Manufacturing: A Discussion of Current and Future Applications

Sponsored by IIoT World
This session will explore the current and potential future applications of generative AI in manufacturing. The discussion will focus on how generative AI can be used to optimize manufacturing processes, improve product design, and increase overall efficiency. Experts in the field will share their insights and experiences, and attendees will have the opportunity to participate in a Q&A to gain a deeper understanding of how generative AI can transform the manufacturing industry.
Founder & CEO
Senior Director,
Artificial Intelligence
Chief Technology Officer
Chief Digital Officer
Industry Executive, Manufacturing
Thu, May 18
10:00 AM – 11:00 AM ET

How to improve Overall Equipment Effectiveness using IIoT technologies

Sponsored by IFM, Pulse Industrial and Empiric Inc.
This session will explore the use of Industrial Internet of Things (IIoT) technologies to improve Overall Equipment Effectiveness (OEE) in manufacturing. Our speakers will discuss how IIoT sensors, analytics, and machine learning algorithms can be used to collect and analyze data on equipment performance in real time. This data can then be used to identify areas of improvement in the manufacturing process, such as reducing downtime, optimizing maintenance schedules, and improving product quality. The speakers will also focus on the emergence of IIOT as a business case; the role of technology supporting plug-and-play IIOT; the Challenges and limitations of plug-and-play IIOT; Insights for the future of IIOT.
Thu, May 18
11:00 AM – 11:30 AM ET

Keynote: Making Cyberspace Safe and Secure by Design

Sponsored by IIoT World
Within the recently released National Cybersecurity Strategy, the White House is advancing cybersecurity efforts spanning national security systems and critical infrastructure to everyday consumer IoT products. Now that the strategy is in place, what are the tangible next steps to reduce risk? Mr. Kelly will frame these efforts in the context of the current threatscape, geopolitics, and Administration policy toward a cyberspace that is safe and secure by design.
Special Assistant to the President and Senior Director for Cybersecurity
and Emerging Technology,
National Security Council
Thu, May 18
11:30 AM – 12:30 PM ET

Top best practices for Zero Trust OT Security

Sponsored by TXOne
This session will focus on the best practices for implementing Zero Trust security in operational technology (OT) environments. Speakers will discuss various techniques that can be used to achieve Zero Trust, such as network segmentation, continuous monitoring, identity and access management, and endpoint protection. In addition, the session will draw on the experience of industry experts who have successfully implemented Zero Trust security measures in OT environments.
Principal Solution Architect
Director of Cybersecurity
Offer Management
Director,
Cyber-SCRM Programs
CEO and Founder
Thu, May 18
12:30 PM – 1:30 PM ET

Securing the ICS Software Supply Chain

Sponsored by aDolus
CTO and Board Member
Head of Product Security
Executive Director