Practical Steps to Protect OT Systems Without Disruption
Course
Debbie Lay explores why visibility solutions fail when patching remains impossible, demonstrates network segmentation strategies that create smaller blast radius zones and shows protocol allow-listing methods using predictable OT behavior.
Visibility solutions turn on the lights but leave organizations staring at unpatched critical vulnerabilities with no clear path forward. Asset inventories reveal aging Windows systems with exploited CVEs, but patching cycles remain annual at best - if they happen at all.
Real protection requires network segmentation devices at lower Purdue levels, virtual patching that shields vulnerabilities through intelligent signatures and protocol allow-listing based on OT's predictable baseline behavior.
Led by Debbie Lay, principal solutions engineer at TXOne Networks, this session will cover:
- Why visibility solutions that match assets to vulnerability databases fail when annual patching cycles cannot address critical exposures;
- Network segmentation strategies that create smaller blast radius zones preventing ransomware lateral movement from IT convergence points;
- Protocol allow-listing methods that leverage OT's predictable baseline behavior to detect anomalous traffic patterns.
Here is the course outline:
Beyond Visibility: Practical Steps to Protect OT Systems Without Disruption |
Completion
The following certificates are awarded when the course is completed:
![]() |
CPE Credit Certificate |
