Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
In this insightful session, Brendan Clace of The Mosaic Company will explore a practical framework to modernize OT vulnerability management by aligning risk scoring with operational realities and building consensus across teams.
SecurityGate's Ted Gutierrez presents three actionable tactics for enhancing cyber programs across OT, IT and IoT convergence.
Sergio Trindade of Águas do Tejo Atlântico shares water utility security program insights, focusing on internal strategies and management communication.
Mihirr P Thaker, Yogesh Kulkarni, and Aditya Sarangapani explore threat intelligence for OT security. Learn strategies for asset visibility, cybersecurity resilience, and mitigating risks in legacy systems.
Rick Kaun presents strategies for managing new regulations like NIS2 while strengthening baseline cybersecurity practices through real-world case studies.
Industry leaders Erwin Eimers, Keon McEwen and Lorena Nunes explore the intersection of cybersecurity and operational safety in industrial systems.
James Brake, James Goosby, Chris Sistrunk and Amanda Bosco provide essential OT incident response guidance.
Martin Cullen, Giovanni Vassallo, George Prokopos, Belén Brunet and Matthias Glawe discuss how to develop effective cyber strategies that ensure ROI and align business and security goals.
Prashant Prashant and Rajat Kumar Kundu demonstrate realistic cyberattack simulation using Graphic Realism Framework, showing how attackers exploit vulnerabilities in industrial control systems.
SSH Communications' Eduardo Giancristofaro discusses secure access control solutions enabling digital transformation in OT environments.
Mostafa Nassar examines why standard GRC platforms fail in industrial settings and provides strategies for developing OT-specific solutions that integrate with IT frameworks while addressing specialized operational needs.
Jonas Rendahl of Aurobay examines strategies to boost the human firewall through increased awareness, training and education while building mental toughness to protect individuals and companies in high-pressure situations.
Rick Kaun, VP solutions at Verve, shares practical strategies for building resilient OT security, offering insights on implementing effective security programs, proven strategies and efficiency gains in manufacturing environments.
Join a conversation with healthtech cybersecurity experts Phil Englert, Patty Ryan, Anahi Santiago and Luisa Soares de Brito in a conversation about managing hospital device security.
Stefan Turi of Rockwell Automation shares how to develop a robust business plan that creates momentum, focus and budget for protecting against cyberthreats while making measurable improvements in OT security posture.
Dr. Mohamed Abdur Rahman demonstrates how generative AI can monitor OT operations, detect attacks, block attackers and restore assets to working states, showing how AI-driven tools can fortify OT networks against evolving threats.
Commanding the IT-OT Convergence is designed for leaders tasked with driving the secure convergence of IT and OT systems. Click continue to start!
Chris Johnson of WSP explores dynamic program frameworks that replace static documentation with interactive cybersecurity road maps.
Anirban Ghosh of Black & Veatch explores shifting from vulnerability management to consequence-driven cybersecurity, covering all-vector protection, process safety integration and holistic approaches for critical infrastructure.
Ron Yosefi and Ariel Rotman demonstrate a high-stakes war game inspired by real OT incidents, showing how to think quickly, avoid common pitfalls and outsmart adversaries targeting critical systems.
John-Erik Horn of difesa explores how Continuous Threat Exposure Management aligns with DORA compliance and OT security, focusing on asset identification and unified risk management strategies.
Eduardo Giancristofaro, channel development director at SSH Communications Security, discusses how to overcome cybersecurity concerns in digital transformation, focusing on secure access control for production systems.
MITRE Labs' Mark Bristow discusses current threat landscape and strategies for efficiently reducing risks to critical infrastructure.
Shawn Thompson of Cyber Express shows how to shift from reactive to proactive OT security models while driving professional growth and becoming a business enabler.
Yusuf Hashmi of Jubilant Bhartia Group covers designing comprehensive OT SOC architectures, implementing security monitoring and overcoming visibility limitations.
Ian Cuthbertson of Cyolo demonstrates how a zero-trust approach can simplify user experience while strengthening security controls for privileged remote access to OT environments through real customer examples.
Engineering Secure ICS and OT Environments is designed for industrial and critical infrastructure technical leaders and technical professionals. Build more secure ICS and OT environments today!
Anton Kouznetsov explores risk-based approaches for converged environments, building collaborative IT-OT relationships and lessons from real-world critical infrastructure deployments.
Nasser Al-Alawi demonstrates a life cycle-based security assurance approach, exploring best practices for stakeholder engagement, implementing "security walks" and embedding cybersecurity in change management.
FortiGuard Labs' Aamir Lakhani analyzes real-world OT attack cases and honeypot data to reveal cybercriminal tactics, tools and motivations targeting critical infrastructure.
In this insightful session, Bryan Ward of Zero Networks, will explore how automated microsegmentation simplifies OT/IoT security, enabling zero trust without disrupting operations, while enhancing resilience and reducing risk and complexity.
As Industry 4.0 and 5.0 reshape manufacturing, zero trust architecture is key to securing hyperconnected operations from lateral threats. Learn how Zscaler and Price Industries tackle cyber risks in modern factories without added complexity.
Cavus Batki and Melanie Garson explore protecting assets against state-sponsored threats, examining cyber-physical attacks and analyzing geopolitical impacts on cybersecurity strategies.
Olivera Zatezalo and Dan Lau of Ontario Power Generation explore how AI is fueling advanced cyberthreats and outlines technical strategies and regional approaches to counter emerging AI-driven attacks.
Matt Fryer of Fortinet addresses positioning cybersecurity as a business priority and avoiding financial damages from cyberattacks.
Stéphane Potier reveals how Advens joined forces with French ANSSI to protect the Paris 2024 Olympic Games ecosystem through groundbreaking technological approaches tackling unprecedented infrastructure challenges.
Andres Prieto Anton, Sergio Trindade, Trish McGill and Emyr Thomas discuss strategies for embedding cybersecurity awareness in organizational culture and daily operations.
Frank Polky of Mars and Guillermo Pedezert of Knauf share how they created centers of excellence and implemented targeted solutions that transform security challenges into opportunities for operational improvement.
Kaspersky's Georgy Kucherin explores APT41's evolution in 2024, examining their shift from supply chain attacks to targeted operations, new persistence mechanisms and enhanced detection evasion techniques.
Maurice Snoeren examines distinct approaches for protecting OT systems and interfaces, demonstrating effective security strategies for critical control and safety systems.
Andres Prieto Anton of DSM-Firmenich shares insights on designing secure OT systems using zero trust principles and in-depth protection strategies.
Paul Barnes, Malek Abu Tayeh, Asma Habeeb, Dr. Mohamed Abdur Rahman and Jean-Baptiste Abbal discuss presenting risk-based approaches to boards, securing budgets, improving communication and developing compelling business cases for OT security.
John Ballentine, Sherry Hunyadi, Dave Bang, Todd Beebe, Tony Souza and Andy Krapf explore hybrid cybersecurity approaches for IT-OT integration.
Bill Moore of Xona covers integrating ICS IDS, firewalls, NAC and SIEM for unified infrastructure visibility while optimizing cost-effectiveness.
Learn the basics of Industrial Control Systems (ICS) and Operational Technology (OT) to protect your organization from cybersecurity related threats!
The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption.
Jonas Rendahl, Ricardo Hormann, Karol Herta, Jan Bau and Will Stefan Roth explore how to overcome cultural barriers between IT/OT teams and establish unified security approaches that respect both domains' strengths.
Christian Harter of UPS reveals how they built a proactive OT vulnerability and patch management program across hundreds of automated facilities, sharing key insights on gaining visibility, and overcoming implementation challenges.
Chris Johnson presents a four-phase framework for building OT cyber resilience, covering threat landscapes, regulatory requirements and implementation strategies for critical infrastructure sectors.
Hexagon's Roya Gordon presents case studies demonstrating effective collaboration between cybersecurity and engineering teams in OT environments.
1 2 3 Next