SANS Stay Sharp Training Live Online: Quickly sharpen your skills with 1-3 day blue team & cloud courses. Save 25% thru 11/11.

ICS Security Summit & Training 2021 - Live Online

Virtual, US Eastern | Thu, Mar 4 - Sat, Mar 13, 2021

The advisory board are volunteers from the security awareness community who provide input on topics, review and help select CFP submissions, plan special events and networking activities, and provide assistance and help to attendees at the event. They ensure the summit is the best event possible. Interested in serving on the advisory board for a future Summit? Email SummitSpeakers@sans.org.


Marc Ayala

Marco Ayala

Marco (Marc) Ayala is a process automation professional with over 25 years of experience working in petrochemical facilities where he designed, engineered and maintained process automation, safety systems and integrated networks. Marco is active in the oil and gas, chemicals industry, maritime domain including offshore facilities. . Mr. Ayala is an established and respected instructor for ISA cyber courses. He is a member and contributor to the AMSC Cybersecurity efforts as Chair, InfraGard member; Sector Chief of the Maritime Domain - Cross Sector Council for ports and terminals.


Andy Bochman

Andrew Bochman

Andy Bochman is the Senior Cyber and Energy Strategist at Idaho National Lab. Andy provides strategic guidance on topics at the intersection of critical infrastructure security and resilience to senior U.S. and international government and industry leaders. His career began with the US Air Force, and before joining INL, was in several cybersecurity start-ups, was Global Energy & Utilities Security Lead at IBM, and a Senior Advisor at the Chertoff Group in Washington, DC. A member of the global advisory board for the Control Systems Cyber Security Association International (CS2AI). Andy is on the advisory committee to the SANS Institute and a cybersecurity subject matter expert listed with the U.S. State Department Speakers Bureau. His papers and articles include “The Missing Chief Security Officer” (CXO) and “Internet Insecurity: the Brutal Truth” (HBR), and “Supply Chain in the Software Era” (Atlantic Council).


Terry Freesone

Terry Freestone

Terry started in IT in 1980 as the guinea pig for a computer science course. 14 years ago, he decided to focus on security. He has worked for a variety of industries including government, healthcare and building, but most of his time has been with oil and gas companies. He is also an associate member of CSA technical committee for Security Management for Petroleum and Natural Gas.


Jennifer Chavarria Reindl

Jennifer Chavarria Reindl

Jennifer is a Threat Hunter at Shell where she researches and hunts for adversary behaviors targeting ICS, Retail, and the Energy industry in general. She has presented at the ONG-ISAC and the SANS Threat Hunting & IR Summit, and has previously served on the SANS Summit Steering Committee.

When she is not threat hunting, she serves on the board of the local women’s employee resource group to promote gender and racial equity in the workplace. At home, she and her husband are kept busy by their three energetic Huskies and Siamese cat.


Sarah Freeman

Sarah Freeman

Sarah Freeman is an Industrial Control Systems (ICS) cyber security analyst for the Cybercore Integration Center at Idaho National Laboratory (INL), where she provides U.S. government partners and private sector entities with actionable cyber threat intelligence, developing innovative security solutions for the critical infrastructure within the U.S.

At Idaho National Laboratory, Sarah pursues innovative threat analysis and cyber defense approaches, most recently Consequence-driven Cyber-informed Engineering (CCE). As Principle Investigator on a laboratory discretionary research, her current research is focused on new signatures and structured methods for cyber adversary characterization. Following the December 2015 electric grid attacks, Sarah participated in the DOE-sponsored training for Ukrainian asset owners in May 2016. She has also researched the Ukrainian 2015 and 2016 cyber-attacks and the Trisis/Hatman incident.