OT environments pose significant challenges that can make cybersecurity management an extremely
complicated environment to navigate. When you add legacy systems into the mix that have been
integrated without much consideration for cybersecurity, you are faced with systems vulnerable to cyber
attacks.
Join this workshop to understand and respond to:
● Navigating industry specific regulatory compliance for cybersecurity
● Integrating risk and lifecycle management across your OT assets
● Overcoming the challenge of legacy systems vulnerability to cyber attacks
● Prioritizing vulnerabilities through a targeted approach to risk management
● Streamlining activities to achieve cost efficiencies
The convergence of IT and OT can bridge the gap between digital and physical worlds and connect data
management systems and industrial operations. However, this convergence can introduce significant
security challenges.
Join this workshop to understand and respond to:
● Deploying a holistic security system that addresses vulnerabilities and risk across IT/OT
● Integrating security policies, practices and technologies that cover data and industrial processes
● Overcoming security protocols that do not seamlessly integrate with one another
● Considering upgrades to legacy systems in response to reduced security features
● Examining the impacts of IT/OT convergence on ICS security
Compromised identities and stolen credentials present major opportunities for cyber criminals. With
operational technologies that control critical infrastructure systems becoming increasingly connected, the
risk of attack via compromised identity dramatically increases.
Join this workshop to understand and respond to:
● Identifying the cyber attack risks that connected and remotely accessible OT systems face
● Potential solutions for users with multiple identities and credentials for different assets
● Overcoming the challenges faced when OT assets are not compatible with modern identity and access
management solutions
● Responding to losing access to OT assets in remote areas when the network is down
● Reducing your attack surface with multi-layer identity-based access management
OT devices in Industry 4.0 operating environments are susceptible to cyber attacks which can affect
productivity and safety, and result in major financial loses to an organisation. This has highlighted the
urgent need for operators to deploy endpoint protection so each OT device can protect itself and prevent
communication from unauthorized devices.
Join this workshop to understand and respond to:
● Overcoming vulnerability to malware attacks on endpoint devices that lack robust security measures
● Avoiding expensive downtime from a malware infection on critical OT devices
● Enhancing your security posture and providing an additional layer of protection to your OT security
strategy
● Responding to increasingly sophisticated cyber attacks with malware designed to exploit unique OT
system vulnerabilities
● Providing continuous monitoring and protection with real time defense safeguards
The adoption of connected devices is driving innovation and growth across smart operating environments, but with increased convergence of IT/OT devices, comes new risks and vulnerabilities to cyber attack. With many organizations not having the necessary visibility of threats across their OT systems, it is essential that security leaders remain vigilant against an ever-expanding array of threats.
Our industry leading panelists will discuss:
● Developing a zero-trust approach to data protection across diverse platforms and locations
● Building cybersecurity controls to thwart ransomware attacks without disrupting the user experience
● Developing strategies that work effectively across converged IT/OT systems
● Cost-driven decision-making vs security-driven decision-making
● Identifying unknown points of IT/OT convergence
● Understanding the opportunities for attackers to slip through the air gap
● Using self-learning AI solutions that provide visibility and threat detection
● Threat response and incident reporting that your workforce can easily understand
Legacy OT systems are vulnerable to cyber attack as they were not built with security in mind and are compromised by outdated systems and lack of compatibility with new security technology. Many organizations may also not understand the dangers posed by legacy systems which is exasperated by lack of visibility across OT systems and security knowledge amongst their workforce.
Join this session to discuss:
● Finding the balance between maintaining legacy systems and transitioning to new technology
● Regularly auditing of your legacy systems to provide a clearer picture of potential vulnerabilities
● Isolating legacy systems from your network to protect your entire infrastructure from attack
● Identifying the security tools that will work effectively across legacy systems
● Securing converged IT-OT Networks with a security fabric that ensures your devices are protected
● Providing automated responses to attacks in any vector
● Continuous monitoring of behaviors in OT networks to provide intelligence about known and unknown threats
● Closing OT security gaps and delivering full visibility across your networks
This structured networking session is the ideal opportunity for you to capitalize on time out of the office by speaking to each of our event
partners in attendance and learning about the essential solutions available to your specific challenges. How does it work? It’s easy. You
spend five minutes at a booth of your choice, and when the bell rings you’ll be directed to the next one to start another round of learning and
networking. At the end of the session, you’ll have met a selection of our event partners, and for any you have missed, you can connect with
them at the networking cocktail reception at the end of the day.
Having the best security tools and technologies in place can be totally undermined if you don’t have solid identity and access management as
the foundation of your cybersecurity efforts. You must ensure that you have a complete view of the identities flowing across your OT environment
if you want to avoid a devastating cyber attack.
Join this panel to discuss:
● Addressing siloed, manual and insecure OT IAM procedures
● Influencing senior leaders on the benefits of investment in modern OT IAM solutions
● Overcoming push back from OT during implementation of IAM controls
● Responding to increased regulatory requirements on improving cybersecurity for critical infrastructure control systems
● Simplifying protection and monitoring across your OEM vendors
● Investing in a solution that enhances security across segmented networks
● Providing vulnerability and risk assessment across multiple endpoints
● Gaining access to real-time visibility to malware threats
Ensuring that you have the necessary policies, procedures, and technologies in place can help prevent or reduce the opportunities for insider threats and stay alert to anomalous user behavior. With many organizations focusing on external threats, not being proactive with insider threats can be a costly oversight.
Join this session to discuss:
● Understanding the tactical approaches, you can take to mitigate insider threat opportunities
● Building awareness of malicious internal threats from rogue employees and contractors
● Adopting a layered approach across a range of security controls and processes
● Implementing 24/7 network and endpoint monitoring to detect malicious behavior