Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Martin Cullen, Giovanni Vassallo, George Prokopos, Belén Brunet and Matthias Glawe discuss how to develop effective cyber strategies that ensure ROI and align business and security goals.
Rainer Rodler, Claudio Sangaletti, Jose Seara and Kai Thomsen explore how automation and human-centric approaches can work in synergy for effective cyber risk management in manufacturing plants.
Jonas Rendahl of Aurobay examines strategies to boost the human firewall through increased awareness, training and education while building mental toughness to protect individuals and companies in high-pressure situations.
Stefan Turi of Rockwell Automation shares how to develop a robust business plan that creates momentum, focus and budget for protecting against cyberthreats while making measurable improvements in OT security posture.
Ron Yosefi and Ariel Rotman demonstrate a high-stakes war game inspired by real OT incidents, showing how to think quickly, avoid common pitfalls and outsmart adversaries targeting critical systems.
Tony Hadzima of Palo Alto Networks explores how industrial organizations can navigate cybersecurity challenges in smart manufacturing and why security has become a strategic imperative at leadership levels.
Massimo Nardone demonstrates how zero trust security principles can be applied to manufacturing environments to enable safer digital transformation with focus on access management challenges.
Ian Cuthbertson of Cyolo demonstrates how a zero-trust approach can simplify user experience while strengthening security controls for privileged remote access to OT environments through real customer examples.
Ali Baccouche of Texas Instruments provides a holistic view of the EU AI Act implementation guidelines and compliance requirements, covering risk categories and explaining how it applies in practice with clear takeaways.
Stéphane Potier reveals how Advens joined forces with French ANSSI to protect the Paris 2024 Olympic Games ecosystem through groundbreaking technological approaches tackling unprecedented infrastructure challenges.
Frank Polky of Mars and Guillermo Pedezert of Knauf share how they created centers of excellence and implemented targeted solutions that transform security challenges into opportunities for operational improvement.
Barbara Hauer of NTT Data and Daniel Buhmann of Fortinet demonstrate why deception technology is a powerful tool for protecting OT infrastructures without requiring AI or machine learning.
Jonas Rendahl, Ricardo Hormann, Karol Herta, Jan Bau and Will Stefan Roth explore how to overcome cultural barriers between IT/OT teams and establish unified security approaches that respect both domains' strengths.
Ricardo Hormann explores how to navigate the "cycle of chaos and pain" in OT asset management initiatives using Volkswagen Group's journey as a case study for breaking through organizational barriers.
Sami Petäjäsoja of SensorFleet introduces an open NDR architecture that scales across IT, OT/IoT and cloud environments, with support for multi-vendor deployments to minimize vendor lock-in.
OT Security Expert Tamas Buzgo explores why a zero trust approach is essential for protection against ransomware and malware, and how to ensure zero trust with NIST, ISA 62443 and ISO 27001.
Mirco Kloss of TXOne Networks provides insights on installation-free inspection of assets, on-premises endpoint protection and network protection including virtual patching and segmentation implementation for uninterrupted operations.
Diego Fernando Guerrero Bautista of Airbus Protect shares valuable lessons from conducting risk assessments across manufacturing, energy and nuclear industries, highlighting key successes and common pitfalls in OT risk management.
Tobias Kletz, Simon Heberl, Sebastian Haußmann and Ralf Kovacevic explore how workflow platforms can address critical OT challenges through ServiceNow and Siemens partnership examples.
Ramón Serres shares how Almirall evolved from qualitative risk assessments to a sophisticated deterministic model balancing long-term process maturity with real-time risk indicators in pharmaceutical manufacturing.
Ryan Davis of Acronis examines the people, process and technology strategies manufacturing leaders can adopt to protect cyber-physical infrastructure for NIS 2 compliance with focus on recovery measures.
Thomas Becker of AMDT explores why comprehensive vulnerability management that combines prevention with rapid recovery capabilities is essential for today's industrial operations.