ÎÞÓÇ´«Ã½

Operational Technology Cybersecurity Workshop

Event Details

Ìý

But wait, there’s more! We understand the urgency of staying ahead in this rapidly evolving landscape. That’s why we’ve curated a workshop that educates and equips you with actionable takeaways you can implement immediately.

Don't miss out on this exclusive opportunity to network with like-minded professionals and gain invaluable knowledge from industry leaders.Ìý

Attendee Profile

Our workshop attendees include IT and OT professionals, engineers, and business leaders facing similar security challenges and issues. This forum provides a safe space to share and learn from peers through facilitated and targeted discussion across different industries and maturity levels.

Workshop Protocol

  1. Chatham House Rule
  2. Peer-sharing of leading practices and lessons learned
  3. Networking opportunities
  4. Learn from ÎÞÓÇ´«Ã½â€™s experts

Workshop Topics

ENABLE

  • Building the Business Case for OT Cybersecurity Transformation

IDENTIFY

  • Leading Practices in Building a Comprehensive OT Inventory
  • Managing Supply Chain and Third-Party Risk

PROTECT

  • Defense-in-Depth with OT Network Segmentation
  • Planning and Executing Global Implementations

DETECT

  • Establishing an OT Threat Detection Program
  • Maximizing the Value of OT Passive Monitoring Tools

RESPOND/RECOVER

  • IT/OT Cybersecurity Incident Response Tabletop Exercise

Sign Up to Learn More

If you want to learn more, receive an invitation, or present at our next workshop, please complete the form below.Ìý