October 29, 2025
8:00am – 4:00pm, Reception following The Water Tower, Buford, Georgia and Virtual
Time |
Programme |
| 8:00 | Continental Breakfast and Networking (Lobby) |
| 8:30 | Conference Opening (Multipurpose Room) Melissa Meeker, CEO of The Water Tower |
| 8:35 | Setting the Stage for Cybersecure Water Utilities Cole Dutton, Cybersecurity Engineer, U.S. Environmental Protection Agency – INVITED |
| 8:45 | Introduction of Keynote I Aditya Mathur, iTrust, Singapore University of Technology and Design |
| 8:50 | Water 4.0 and the Road to 5.0: Resilience, Security, and the Future of Water Systems Stefano Galelli, Cornell University, Ithaca, NY, USA |
| 9:20 | Regular Session I Chair: Gauthama Ramani Customizing Lightweight TTnet Architecture with TFHE for Privacy-Preserving Deep Learning Time-Series Analytics in Water Infrastructures Monitoring Alvin Chew, Bently Systems, Singapore |
| 9:50 | TE-LSTM-AE: A Group-Aware Temporal Autoencoder for Anomaly Detection in Water Treatment Systems Babangida Abdullahi and Sunil Vadera, University of Salford, UK |
| 10:20 | XAI for Intrusion Detection in Water Distribution Systems: A Case Study Using the WADI Dataset Salman Shahid, University of Alabama, Birmingham, USA |
| 10:50 | Data Driven Approach for the Identification of Rules and Model Features for Anomaly Detection in Cyber Physical Systems Wen Ni Pang and Jonathan WW Goh, Ensign Infosecurity, Singapore |
| 11:20 | A Context Aware Cybersecurity Assessment Methodology for Industrial Control Systems in the Water Industry Fabian Voggensberger1, João Henrique Schmidt2, Victor Mattos2, Gaurav Srivastava1 Daniel S. Menasché2, Amit Bhaya2, and Alan O. de Sá3, 1Siemens Corporation, Princeton NJ, USA, 2Federal University of Rio de Janeiro (UFRJ), Brazil, 3University of Lisbon, Portugal |
| 11:50 | Cybersecurity and Infrastructure Security Agency (CISA) Tools and Resources Stanton Gatewood, Cybersecurity State Coordinator (Georgia) – INVITED |
| 12:10 | Lunch will be held in the lobby |
| 12:45 | Introduction of Keynote II Aditya Mathur, iTrust, Singapore University of Technology and Design |
| 12:50 | Vulnerabilities of Yesterday, Threats of Today – Cyber-Physical Defenses Wenke Lee, Georgia Tech, Atlanta, USA |
| 13:20 | R&D For OT Technologies Chair: Aditya Mathur OT in RIE2030 Andre Foo, Cyber Security Agency, Singapore Automating Anomaly Detection Using AI Jonathan Goh, Ensign Infosecurity Scaling up Design-Infused Anomaly Detection Aditya Mathur and Gauthama Ramani SUTD, Singapore |
| 14:50 | Regular Session II Chair: Melissa Meeker Building a Resilient OT Cybersecurity Program for Water Utilities: A Holistic Approach Kam Chumley-Soltani (Armis) and Keith Walsh (1898 & Co.) |
| 15:20 | Operational Resilience During Active Cyberattacks: Governance, Risk, Resilience, and Compliance in Water Utilities Kevin Montague (Dekalb County) and Kenn Bengtsson (Tetra Tech) |
| 15:45 | Securing Critical Water Infrastructure—A Converged OT/IT Cybersecurity Approach Manoj Kumar, Global Solutions Group |
| 16:15 | Closing Networking Reception to follow |





