Yusuf Hashmi of Jubilant Bhartia Group covers designing comprehensive OT SOC architectures, implementing security monitoring and overcoming visibility limitations.
OT environments face escalating cyberthreats that demand specialized monitoring and response capabilities beyond traditional IT security approaches. The convergence of operational and information technology networks has created complex attack surfaces that require dedicated detection frameworks tailored to industrial control systems, SCADA networks and cyber-physical processes. Building effective OT security operations requires understanding unique operational constraints, legacy system limitations and the critical importance of maintaining continuous availability while ensuring comprehensive threat visibility.
This session, led by Yusuf Hashmi, group chief information security officer at Jubilant Bhartia Group, will cover:
- Designing comprehensive OT SOC architectures from the ground up;
- Implementing effective security monitoring and incident response capabilities that address the unique challenges of OT protocols and asset life cycles;
- Overcoming visibility limitations.
Here is the course outline:
Elevating OT Security: How to Build an OT SOC |
Completion
The following certificates are awarded when the course is completed:
![]() |
CPE Credit Certificate |
