International VDI Conference - IT Security for Smart Manufacturing

  • Find out about the latest international security norms and standards as well as how you can harmonize IT and OT.
  • Learn how to secure your connected production facilities
  • Discuss how you can effectively protect your company from cyber-attacks with leading industry experts.
  • Profit from world cafés, panel discussion and the evening event to make high-quality contacts.
  • Visit the presentations at the co-located VDI Conferences “CESIS – Global Internet of Things” and “Industrial Wearables & Devices - AR/VR Applications and Technologies” running at the same time at no additional cost.
IT Security for Smart Manufacturing | VDI Conference

The international VDI conference “IT Security for Smart Manufacturing” will demonstrate how to adapt IT security in times of increasing interconnection and digitization. Discuss international IT standards and norms with renowned industry experts. Find out more about secure communication, trustworthiness and legal aspects. Discuss in world cafés questions like “who owns the data?” or “how to implement IT security for brown field production facilities?” Learn how to protect best your company data with best practice examples.

Free of charge whitepaper download

Why We Build Testbeds: First Results
Author: Industrial Internet Consortium

Download now

International IT security standards for Industry 4.0

Security needs dependable standards. This has become crucial in times of Industry 4.0, the industrial Internet of Things (IIoT) and company-wide digital connectivity. The implementation is usually more challenging than the theory, which is why standards like IEC 62443, ISO 27001 and OPC UA Security will be thoroughly discussed. At the international VDI “IT Security for Smart Manufacturing” conference international experts will present various ideas and solutions, whilst considering the issues from an international standpoint.

You’ll also find out how your business can be protected from existentially threatening malware programs such as WannaCry and which strategies provide you with the highest possible resilience against cyber-attacks. You’ll be able to discuss how security is an enabler for new business models and how to link IT and OT.

Three conferences and one big evening Event

The VDI Conferences “CESIS – Global Internet of Things”, “Industrial Wearables & Devices – AR/VR Applications and Technologies” and “IT Security for Smart Manufacturing” are running at the same time. This gives you the opportunity to attend all the presentations you are interested in plus world cafés and panel discussions at no additional cost. On the first evening an evening reception will be hosted where you’ll have the opportunity to expand your network and exchange ideas with experts and participants from all three conferences.

Download Program PDF

Tuesday, February 20, 2018


Registration & welcome coffee


Chair’s welcome and opening address

Conference chair:
Dr. Markus Braendle, Head of Cyber Security, Airbus Defence and Space GmbH, Germany

I. International Standards


Protection Levels and IEC 62443: The Base for a holistic Plant Protection

  • Security is about technology processes and people
  • Product suppliers, integrators and asset owners have to contribute to a defense-in-depth protection concept
  • IEC 62443 addresses all stakeholders
  • Protection levels is a methodology to evaluate the protection of installations in operation
  • Holistic security concept: The product supplier is also asset owner

Dr. Pierre Kobes, Product and Solution Security Officer, Siemens AG, Germany


Secure by Design: OPC UA Security for Industrie 4.0

  • OPC Unified Architecture (UA) Specification
  • Factory floor security today
  • OPC UA security design
  • Microsoft’s security concepts
  • Microsoft’s OPC UA security

Erich Barnstedt, M.Sc., Principal Software Engineering Lead, Microsoft Corporation, Germany


Implementation of NIST Cyber Security Framework

  • Improving cyber security in industrial systems
  • Mapping NIST cyber security framework to manufacturing
  • Mapping NIST cyber security framework to ISA/IEC 62443

Marty Edwards, Managing Director, Automation Federation, USA


Architectures for Secure Systems in the Industrial Internet

  • The Industrial Internet Consortium ecosystem and testbeds
  • Introducing a shared vocabulary and architecture for the Industrial Internet
  • Defining a framework for secure IIoT systems
  • Secure connectivity in the Industrial Internet

Dr. Richard Soley, Executive Director, Industrial Internet Consortium, USA




Cyber Security and Trust for smart Manufacturing

  • Role of BSI in shaping cyber security for Industry 4.0
  • Open problems – cyber security as enabler
  • SE-API: Connecting trust anchors to OPC UA

Andre Braunmandl, Federal Office for Information Security (BSI), Germany


How to connect IT security and production?

Panel moderator:
Lukas Linke,
Referent Security, ZVEI – Zentralverband Elektrotechnik- und Elektronikindustrie e.V.

Panelists will be regulators and users.


Networking & coffee break

II. Basics for Connected Industry


Secure Communication for Industry 4.0

  • Communication across company borders
  • Secure identification as a basic requirement
  • Communication in different domains of a smart factory

Dr. Lutz Jaenicke, Product & Solution Security Officer, Phoenix Contact GmbH & Co. KG, Germany


Integrity a fundamental Protection Goal for Trustworthiness

  • Definition and concepts
  • Technical measures for testing and ensuring integrity
  • Dealing with disturbances of integrity
  • Integrity as an essential prerequisite for trustworthiness
  • Conclusion for the value chain networks

Michael Jochem, Director, Project Business Chief Digital Officer, Robert Bosch GmbH, Germany


Smart Manufacturing – The legal Side of Security and Privacy

  • Technical security and works council agreements
  • Security breach – what do I need to do?
  • Liability – a management issue and contractual safeguards

Dr. Alexander Duisberg, Partner, Bird & Bird LLP, Germany


Security as the enabler for new Business Models

  • Dealing with relevant threats and risks when trading and using data
  • Demonstration of the safe trading of data on a market place
  • Transformation of the business models of the data trade in the SmartFactory

Dr.-Ing. Hans-Peter Bock, Expert for Industry 4.0 Communication and Security, TRUMPF Werkzeugmaschinen GmbH + Co. KG Germany


End of conference day one


Evening Reception

At the end of the first conference day we kindly invite you to use the relaxed and informal atmosphere for in-depth conversations with other participants and speakers.

Wednesday, February 21, 2018

III. Cyber Security in Practice


How to achieve good Security in a manufacturing Environment

  • The challenges faced by the manufacturing sector
  • Why the traditional enterprise mind-set fails so spectacularly in the manufacturing sector
  • How technology has caught up to give options to the sector that were not there 18 months ago
  • What good security in manufacturing looks like today

Simon Saunders, Head of Strategy, Risk & Compliance, Cisco Security Advisory Services, UK


Cyber Security in Manufacturing

  • What are the threats?
  • What can be the impact?
  • How to be secure?
  • Protecting your Business

L. Duke Golden, Strategic Accounts Manager - DACH, Kaspersky Lab, Germany


How Industrial Internet of Things (IIoT) is challenging IT Security in Manufacturing

  • The threat and perception
  • IIoT opportunities and challenges
  • A changing threat landscape – Strategy and roadmap
  • Cyber security framework
  • How INEOS is embedding ICS security into its Enterprise Risk Management program

Abeed Hossain, Global Director IT, Operations and Infrastructure Services, INEOS Styrolution Group GmbH, Germany


Networking & coffee break


World Cafés

  • Who owns the Data?
  • How to implement IT Security for brown Field Production Facilities?
  • How to empower Employees to minimize the Human Risk and implementing IT Security into Corporate Culture?
  • How much can Cyber Security Insurance protect Manufacturer?



Understanding Connectivity Solution to protect your IIOT Growth Strategy

  • Security is required for every IIoT but IT and OT profiles are different
  • Connectivity from shop floor to IT is a security problem
  • Several technologies available to protect information flow but little understood
  • Differences between gateways, unidirectional gateways, IT firewalls and OT firewalls
  • Understand the regulations and standards related to protecting connectivity

Jesus Molina, Ph.D., Director, Waterfall Security Ltd., Israel


Measuring End-to-End Security using an IIoT Security Maturity Model

  • Addressing end-to-end security
  • From hardware to the cloud
  • Evaluating IoT security maturity
  • Process and technology evaluation
  • Addressing I4.0 needs, IT and OT

Ron Zahavi, Chief Strategist for IoT Standards and Consortia, Microsoft, USA, co-authors: Arjmand Samuel, Security Lead, Microsoft, USA, Erich Barnstedt, Principal Software Engineering Lead, Microsoft, Germany


Embedded Security using Machine Learning for Mobile and Industrial Applications

  • IIoT security needs today
  • Existing embedded solutions
  • Robust threat detection using Machine Learning

Mark Szewczul, IoT Security Architect, Zimperium Inc., USA


Networking & coffee break


Network Monitoring for Industrial Automation: Challenges and Benefits

  • Challenges in Industry 4.0/Industrial Internet of Things
  • Cyber incidents in Industrial Control Systems (ICS)
  • Network monitoring technology in manufacturing networks
  • The drive to increase productivity and reduce costs in manufacturing environments

Dr. Damiano Bolzoni, Chief Executive Officer, SecurityMatters B.V., The Netherlands


How to become Trustworthy: A path Forward

  • Safe, reliable, and secure – how to tell?
  • Sourcing and integrating trustworthy components
  • What does a trustworthy marketplace for Industrial Internet of Things (IIoT) look like?
  • Standards and evidence-based value chains in Industrial IoT

Robert Martin, Senior Principal Secure Software & Technology Engineer, MITRE Corporation, USA


Conference chair’s closing remarks


End of conference

Who is the conference aimed at?

The international VDI conference “IT Security for Smart Manufacturing”is a cross-industry event that is designed for professionals and management who want to protect their connected digital systems from attacks and data loss. The target audience includes:

  • Chief Information Security Officers – CISO
  • Industrial Security Officer
  • Heads of IT Security
  • Product Security Officer
  • Heads of Production
  • Operations Manager
  • Factory Manager
  • Heads of Process Automation
  • VP of Engineering
  • Heads of Cyber Security and Industrial Automation
  • Experts of the departments development and planning
  • Managing Directors

The agenda boasts of presentations of internationally renowned experts and has been put together by our supporting experts of the VDI Conference “IT Security for Smart Manufacturing”:

  • Klaus Bauer, Head of Basic Technology Development, TRUMPF
  • Dr. Markus Braendle, Airbus Defence and Space GmbH 
  • Michael Jochem, Projekt Business Chief Digital Officer, Robert Bosch GmbH
  • Dr. Ragnar Schierholz, Head of Cyber Security, ABB

Secure your place at the conference

Discuss how you make the IT infrastructure for your production facilities smart with leading international experts. Find out about the best way to implement international IT security standards, especially when your business locations are spread across many countries and how to ensure secure communications and achieve trustworthiness. Book your place at the international VDI conference “IT Security for Smart Manufacturing”  now.

Eventnumber: 02KO907

The event is currently not available for booking.

We will inform you by email as soon as it is possible to book the event again.

By sending through your contact details, you won’t miss any further updates about our events.

In case of queries, you can reach us here

You can reach us at:


Become an exhibitor or sponsor

Request information

Are you missing something?

Do you need more information about this event? Then please feel free to send us a message.

Write a message