Enhancing Cybersecurity in Manufacturing Using Advanced Technologies
Tuesday, May 12, 2026 | 5:00 PM – 6:15 PM PST
Webinar
1 CPE Credit
Topic Overview
The manufacturing technology landscape is rapidly evolving with the acceleration of information technology (IT) and operational technology (OT) convergence; the artificial intelligence (AI)-driven, software-defined factories; and the emergence of quantum computing. In turn, potential security risks continue to increase as OT networks change and more connections are added.
Learning ObjectivesParticipants will be able to:
1
CPE Earned
Online Event
May 12
5:00 PM – 6:15 PM PST
Featured Speakers
Our webinars are led by certified professionals with deep expertise in IT audit, cybersecurity, risk, and OT security.
Senior Manager, Deloitte and Touche LLP
Adam is a Senior Manager in Deloitte's Enterprise Security practice, specializing in cyber-physical systems (CPS) cybersecurity for healthcare and manufacturing environments.
His specialization centers on CPS-specific program builds and security control architecture design and implementation, helping clients modernize and secure their fabs and manufacturing environments at major life sciences and microelectronics manufacturers, as well as nationwide hospital systems. Before joining Deloitte, Adam spent more than 6 years with the Department of Homeland Security in a variety of critical infrastructure cybersecurity roles for the agency now known as CISA.
Manager, Deloitte and Touche LLP
Jason is a Manager in Deloitte's Cyber Risk practice with more than 12 years of experience designing and implementing hardware and technology solutions. He has focused his time at Deloitte on specializing in Industrial Control Systems (ICS) and Operational Technology (OT) environments to strengthen the security posture of large organizations. He has advised leadership across multiple industries in the development and delivery of strategic mechanisms to manage risk while supporting business objectives, specifically in the areas of security program design, governance, asset management, risk assessment, and threat-based vulnerability management.
CPE Credit & Disclaimer
ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentations. All applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.
Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.
Resources:
1700 E. Golf Road, Suite 400, Schaumburg, Illinois 60173, USAISACA.orgContact Us
JoinBenefitsLearn More
About ISACACommunity Code of ConductISACA Policies ISACA Terms of UseISACA Global Privacy Notice