Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
In this insightful session, Brendan Clace of The Mosaic Company will explore a practical framework to modernize OT vulnerability management by aligning risk scoring with operational realities and building consensus across teams.
SecurityGate's Ted Gutierrez presents three actionable tactics for enhancing cyber programs across OT, IT and IoT convergence.
Sergio Trindade of Águas do Tejo Atlântico shares water utility security program insights, focusing on internal strategies and management communication.
Mihirr P Thaker, Yogesh Kulkarni, and Aditya Sarangapani explore threat intelligence for OT security. Learn strategies for asset visibility, cybersecurity resilience, and mitigating risks in legacy systems.
Rick Kaun presents strategies for managing new regulations like NIS2 while strengthening baseline cybersecurity practices through real-world case studies.
Industry leaders Erwin Eimers, Keon McEwen and Lorena Nunes explore the intersection of cybersecurity and operational safety in industrial systems.
Martin Cullen, Giovanni Vassallo, George Prokopos, Belén Brunet and Matthias Glawe discuss how to develop effective cyber strategies that ensure ROI and align business and security goals.
SSH Communications' Eduardo Giancristofaro discusses secure access control solutions enabling digital transformation in OT environments.
Mostafa Nassar examines why standard GRC platforms fail in industrial settings and provides strategies for developing OT-specific solutions that integrate with IT frameworks while addressing specialized operational needs.
Jonas Rendahl of Aurobay examines strategies to boost the human firewall through increased awareness, training and education while building mental toughness to protect individuals and companies in high-pressure situations.
Rick Kaun, VP solutions at Verve, shares practical strategies for building resilient OT security, offering insights on implementing effective security programs, proven strategies and efficiency gains in manufacturing environments.
Join a conversation with healthtech cybersecurity experts Phil Englert, Patty Ryan, Anahi Santiago and Luisa Soares de Brito in a conversation about managing hospital device security.
Stefan Turi of Rockwell Automation shares how to develop a robust business plan that creates momentum, focus and budget for protecting against cyberthreats while making measurable improvements in OT security posture.
Dr. Mohamed Abdur Rahman demonstrates how generative AI can monitor OT operations, detect attacks, block attackers and restore assets to working states, showing how AI-driven tools can fortify OT networks against evolving threats.
Commanding the IT-OT Convergence is designed for leaders tasked with driving the secure convergence of IT and OT systems. Click continue to start!
Olivera Zatezalo and Dan Lau of Ontario Power Generation explore how AI is fueling advanced cyberthreats and outlines technical strategies and regional approaches to counter emerging AI-driven attacks.
Ron Yosefi and Ariel Rotman demonstrate a high-stakes war game inspired by real OT incidents, showing how to think quickly, avoid common pitfalls and outsmart adversaries targeting critical systems.
Eduardo Giancristofaro, channel development director at SSH Communications Security, discusses how to overcome cybersecurity concerns in digital transformation, focusing on secure access control for production systems.
MITRE Labs' Mark Bristow discusses current threat landscape and strategies for efficiently reducing risks to critical infrastructure.
Ian Cuthbertson of Cyolo demonstrates how a zero-trust approach can simplify user experience while strengthening security controls for privileged remote access to OT environments through real customer examples.
Engineering Secure ICS and OT Environments is designed for industrial and critical infrastructure technical leaders and technical professionals. Build more secure ICS and OT environments today!
Nasser Al-Alawi demonstrates a life cycle-based security assurance approach, exploring best practices for stakeholder engagement, implementing "security walks" and embedding cybersecurity in change management.
FortiGuard Labs' Aamir Lakhani analyzes real-world OT attack cases and honeypot data to reveal cybercriminal tactics, tools and motivations targeting critical infrastructure.
In this insightful session, Bryan Ward of Zero Networks, will explore how automated microsegmentation simplifies OT/IoT security, enabling zero trust without disrupting operations, while enhancing resilience and reducing risk and complexity.
As Industry 4.0 and 5.0 reshape manufacturing, zero trust architecture is key to securing hyperconnected operations from lateral threats. Learn how Zscaler and Price Industries tackle cyber risks in modern factories without added complexity.
Cavus Batki and Melanie Garson explore protecting assets against state-sponsored threats, examining cyber-physical attacks and analyzing geopolitical impacts on cybersecurity strategies.
Stéphane Potier reveals how Advens joined forces with French ANSSI to protect the Paris 2024 Olympic Games ecosystem through groundbreaking technological approaches tackling unprecedented infrastructure challenges.
Andres Prieto Anton, Sergio Trindade, Trish McGill and Emyr Thomas discuss strategies for embedding cybersecurity awareness in organizational culture and daily operations.
Frank Polky of Mars and Guillermo Pedezert of Knauf share how they created centers of excellence and implemented targeted solutions that transform security challenges into opportunities for operational improvement.
Kaspersky's Georgy Kucherin explores APT41's evolution in 2024, examining their shift from supply chain attacks to targeted operations, new persistence mechanisms and enhanced detection evasion techniques.
Maurice Snoeren examines distinct approaches for protecting OT systems and interfaces, demonstrating effective security strategies for critical control and safety systems.
Andres Prieto Anton of DSM-Firmenich shares insights on designing secure OT systems using zero trust principles and in-depth protection strategies.
Paul Barnes, Malek Abu Tayeh, Asma Habeeb, Dr. Mohamed Abdur Rahman and Jean-Baptiste Abbal discuss presenting risk-based approaches to boards, securing budgets, improving communication and developing compelling business cases for OT security.
Learn the basics of Industrial Control Systems (ICS) and Operational Technology (OT) to protect your organization from cybersecurity related threats!
The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption.
Jonas Rendahl, Ricardo Hormann, Karol Herta, Jan Bau and Will Stefan Roth explore how to overcome cultural barriers between IT/OT teams and establish unified security approaches that respect both domains' strengths.
Christian Harter of UPS reveals how they built a proactive OT vulnerability and patch management program across hundreds of automated facilities, sharing key insights on gaining visibility, and overcoming implementation challenges.
Hexagon's Roya Gordon presents case studies demonstrating effective collaboration between cybersecurity and engineering teams in OT environments.
Andreas Östrin and Thomas Bonello Zuliani will discuss the breach's impact, key response measures, and best practices for strengthening security and ensuring business continuity.
Biju Hameed shares insights from two decades in the energy and aviation sectors, focusing on effective communication between IT and OT teams, understanding true convergence, and addressing barriers that create an "illusion of understanding."
Claudio Sangaletti, OT security leader at Medmix, discusses managing increased convergence risks through robust security strategies, addressing future threats and leveraging new standards for enhanced cyber resilience.
Join Phillip Englert and Suzanne Schwartz in a conversation about medical device security.
Navigating ICS and OT Compliance is for industrial and critical infrastructure technical leaders and technical professionals. Get the resources you need to implement your ICS and OT cybersecurity compliance strategy today!
Ricardo Hormann explores how to navigate the "cycle of chaos and pain" in OT asset management initiatives using Volkswagen Group's journey as a case study for breaking through organizational barriers.
Palo Alto Networks' Robert Albach explores recent regulatory shifts in petrochemical security, including CFATS changes and TSA amendments.
Debbie Lay, principal solutions engineer at TXone Networks, shares best practices for assessing OT cybersecurity posture, vetting external resources and developing holistic solutions for effective threat mitigation in OT environments.
Sami Petäjäsoja of SensorFleet introduces an open NDR architecture that scales across IT, OT/IoT and cloud environments, with support for multi-vendor deployments to minimize vendor lock-in.
"OT Attack!" is a hands-on tabletop simulating cyber-attacks on OT systems.
Chris Johnson, senior director at WSP, presents a structured approach to OT cybersecurity road maps, covering strategic planning, life cycle integration and practical frameworks drawn from real-world infrastructure projects.
Ron Yosefi shares strategies for managing OT data explosion, prioritizing threats, and maximizing SecOps resources to improve security posture while addressing skill.
1 2 Next