CTEM for DORA and OT Security - How Does That Fit?
Course
John-Erik Horn of difesa explores how Continuous Threat Exposure Management aligns with DORA compliance and OT security, focusing on asset identification and unified risk management strategies.
Organizations face mounting pressure to comply with DORA regulations while securing increasingly complex IT and OT environments. This session explores how Continuous Threat Exposure Management, or CTEM, provides the critical visibility and risk reduction needed to bridge regulatory compliance requirements with operational technology security challenges.
In this session, John-Erik Horn, CEO of difesa, will cover:
- How CTEM frameworks align with DORA compliance requirements and OT security standards;
- Asset identification and network detection strategies for environments where agents cannot be installed;
- Methods for bridging the IT-OT divide through unified risk management and vulnerability prioritization.
Here is the course outline:
CTEM for DORA and OT Security - How Does That Fit? |