Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Jonas Rendahl, Ricardo Hormann, Karol Herta, Jan Bau and Will Stefan Roth explore how to overcome cultural barriers between IT/OT teams and establish unified security approaches that respect both domains' strengths.
Frank Polky of Mars and Guillermo Pedezert of Knauf share how they created centers of excellence and implemented targeted solutions that transform security challenges into opportunities for operational improvement.
Tony Hadzima of Palo Alto Networks explores how industrial organizations can navigate cybersecurity challenges in smart manufacturing and why security has become a strategic imperative at leadership levels.
Stefan Turi of Rockwell Automation shares how to develop a robust business plan that creates momentum, focus and budget for protecting against cyberthreats while making measurable improvements in OT security posture.
Thomas Becker of AMDT explores why comprehensive vulnerability management that combines prevention with rapid recovery capabilities is essential for today's industrial operations.
Ryan Davis of Acronis examines the people, process and technology strategies manufacturing leaders can adopt to protect cyber-physical infrastructure for NIS 2 compliance with focus on recovery measures.
Jonas Rendahl of Aurobay examines strategies to boost the human firewall through increased awareness, training and education while building mental toughness to protect individuals and companies in high-pressure situations.
Mirco Kloss of TXOne Networks provides insights on installation-free inspection of assets, on-premises endpoint protection and network protection including virtual patching and segmentation implementation for uninterrupted operations.
Stéphane Potier reveals how Advens joined forces with French ANSSI to protect the Paris 2024 Olympic Games ecosystem through groundbreaking technological approaches tackling unprecedented infrastructure challenges.
Sami Petäjäsoja of SensorFleet introduces an open NDR architecture that scales across IT, OT/IoT and cloud environments, with support for multi-vendor deployments to minimize vendor lock-in.
Ali Baccouche of Texas Instruments provides a holistic view of the EU AI Act implementation guidelines and compliance requirements, covering risk categories and explaining how it applies in practice with clear takeaways.
Diego Fernando Guerrero Bautista of Airbus Protect shares valuable lessons from conducting risk assessments across manufacturing, energy and nuclear industries, highlighting key successes and common pitfalls in OT risk management.
Ricardo Hormann explores how to navigate the "cycle of chaos and pain" in OT asset management initiatives using Volkswagen Group's journey as a case study for breaking through organizational barriers.
Ian Cuthbertson of Cyolo demonstrates how a zero-trust approach can simplify user experience while strengthening security controls for privileged remote access to OT environments through real customer examples.
Tobias Kletz, Simon Heberl, Sebastian Haußmann and Ralf Kovacevic explore how workflow platforms can address critical OT challenges through ServiceNow and Siemens partnership examples.
Rainer Rodler, Claudio Sangaletti, Jose Seara and Kai Thomsen explore how automation and human-centric approaches can work in synergy for effective cyber risk management in manufacturing plants.
Ron Yosefi and Ariel Rotman demonstrate a high-stakes war game inspired by real OT incidents, showing how to think quickly, avoid common pitfalls and outsmart adversaries targeting critical systems.
Massimo Nardone demonstrates how zero trust security principles can be applied to manufacturing environments to enable safer digital transformation with focus on access management challenges.
OT Security Expert Tamas Buzgo explores why a zero trust approach is essential for protection against ransomware and malware, and how to ensure zero trust with NIST, ISA 62443 and ISO 27001.
Barbara Hauer of NTT Data and Daniel Buhmann of Fortinet demonstrate why deception technology is a powerful tool for protecting OT infrastructures without requiring AI or machine learning.
Martin Cullen, Giovanni Vassallo, George Prokopos, Belén Brunet and Matthias Glawe discuss how to develop effective cyber strategies that ensure ROI and align business and security goals.
Ramón Serres shares how Almirall evolved from qualitative risk assessments to a sophisticated deterministic model balancing long-term process maturity with real-time risk indicators in pharmaceutical manufacturing.