About

Conference

SecurityWeek’s ICS Cyber Security Conference is the conference where ICS users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber-incidents, analyze their causes and cooperate on solutions.

<We_can_help/>

What are you looking for?

>Event Session

Breaking the Kill Chain: How Industrial Sectors Can Coordinate to Deny Nation-State Infrastructure

Thursday, October 30, 2025
9:00 AM - 9:30 AM
Windsor C (Strategy Breakout)

About This Session

When Russian hackers target a water utility, they don't just attack the SCADA systems—they use Western telecom providers for command-and-control, Western cloud platforms for staging, and Western financial systems for resource acquisition. This session reveals how coordinated infrastructure denial can break these attack chains before they reach OT environments.
Drawing from experience securing critical medical devices and industrial systems, this presentation demonstrates why traditional IT security approaches fail in OT environments facing nation-state adversaries. We'll examine real-world attack chains against industrial targets, showing how 90% depend on commercial Western infrastructure that could be denied through coordination.

Key Takeaways:
Mapping nation-state attack infrastructure dependencies in industrial sectors
Why ISACs fail at real-time threat sharing (and how to fix them)
Legal frameworks needed to enable cross-sector defensive coordination
Practical models for utility, manufacturing, and energy sector collaboration
Case study: How coordinated denial could have stopped recent water sector attacks
Building sector-specific threat fusion centers that actually work

This session provides industrial defenders with actionable strategies for collective defense. When China targets one manufacturer's IP, every manufacturer in that sector should know within hours. When we identify hostile infrastructure, every participating utility should deny access simultaneously.

Technical Level: Intermediate
Primary Audience: Security leaders in utilities, manufacturing, oil & gas, transportation
Secondary Audience: Government liaisons, ISAC coordinators, OT security engineers
Note: This is a strategy session focused on coordination frameworks, not a vendor pitch. All recommendations are vendor-neutral and based on operational experience.

Speaker

Brad Tenenholtz

Brad Tenenholtz

Product Security Officer - Becton Dickenson

Brad Tenenholtz leads security for FDA-approved medical devices and AI products at BD, where he protects critical healthcare infrastructure from nation-state threats. His recent writing on cyber sovereignty examines how industrial defenders can coordinate against sophisticated adversaries. Previously built security programs protecting critical infrastructure across multiple sectors. Holds MS in Cybersecurity from Indiana University and CISSP certification.