WHAT

Organizations in industries ranging from manufacturing to utilities face new risks from attacks on cyber-physical systems. If you’re looking to add or improve your operational technology (OT) security, join us at the APAC Operational Technology Security Summit to learn strategies for reducing risk and increasing your network and cybersecurity resiliency.  

Sessions will discuss IT and OT network convergence and the importance of using OT-specific solutions that can integrate multiple data sources to automate security and speed intrusion detection time. You’ll learn about: 

  • Protecting endpoints and implementing security controls and policy enforcement 

  • Setting up segmentation and microsegmentation to reduce risks 

  • Deploying centralized monitoring, logging, and reporting across IT and OT systems 

  • Mitigating threats, vulnerabilities, and zero-day exploits with real-time, up-to-date, threat intelligence 

You’ll also hear from Fortinet customers and partners about how they are using the Fortinet OT Security Platform to secure their production environments and critical infrastructure. 

WHY

As industrial organizations continue to digitize their operations, they are pulling production data from across their operations into IT systems. As more OT systems are connected to enterprise IT networks, this data can be shared to help drive business growth. But with this increased connectivity comes increased risk. Because many OT environments have inadequate and outdated security, cybercriminals are increasingly attacking cyber-physical systems in manufacturing, energy, utility and other industries.  

The Fortinet OT Security Summit includes sessions that explain how you can set up an integrated cybersecurity strategy that covers your IT and OT networks.  You’ll learn how to protect your unique legacy systems, secure the expanding attack surface, and keep remote employees, vendors, and service providers safe from attacks. Register now for the Operational Technology Security Summit and gain the knowledge you need to ensure that everything within your IT and OT production networks stays safe, available, and secure. 

FEATURED SPEAKERS

Chief Marketing Officer and EVP of Products and Solutions
Advanced Cyber Security Architect
Global VP Threat Intelligence
Cybersecurity Architect Leader (Hub Asia)
Certified Instructor
Cybersecurity Solutions and Services Lead APAC
Cybersecurity Sales Executive Global Industry Accounts

AGENDA

John Maddison
Chief Marketing Officer and EVP of Products and Solutions
Fortinet

Critical infrastructures, including national critical infrastructure, offer many essential services to communities and nations. In some cases, a nation’s economy depends on these infrastructures. They rely on industrial control systems (ICS) and operational technology (OT) to provide uninterrupted and reliable services.

These infrastructures often contain security gaps and flaws in technology implementations leading to succesful cyberattacks. Some of them rely on the concept of air-gap networks to thwart cyber intrusions. However, due to interconnections between internal and external networks and the expansion of services, air-gap implementations are fading away. As a result, ICS that are not designed with security in mind are exposed to external threats, compromising the resiliency of the infrastructure.

Strategic readiness should be underpinned by the notion that eventually, a cyberattack will happen, and when it occurs, you should be proactively ready to respond. Fortifying operational technology is essential to make these infrastructures cyber-resilient and available to serve.

During this keynote, Jason Dely will speak about implementing a comprehensive and proactive risk management strategy. He will discuss evaluating tools to properly assess the cyber risk posture and effectively prioritize the most pressing vulnerabilities to safeguard these infrastructures from cyberattacks and make them cyber-resilient.

Jason Dely
Certified Instructor
SANS

Critical infrastructure organizations are on alert as bad actors see these infrastructures as attractive target for cyber-attacks. Ransomware variants, phishing emails, wiper malware and more show up as tactics used to disrupt services offered by these infrastructures. As digital transformation grows, so does the number of users, devices and applications connect across the operational technology, information technology, and cloud domains. This increases the number of remote users accessing critical systems like meters, sensors, and industrial control systems. While for many critical infrastructure owners and operators, this positively contributes to operational efficiency, it has also increased cyber risk and expanded the attack surface introducing known and unknown threats to the critical systems. During this session, we will look at the threats impacting critical infrastructure organizations and discuss the value of a threat-informed defense strategy for securing these organizations.

Derek Manky
Global VP Threat Intelligence
Fortinet

Industrial asset owners experience unique challenges and security considerations when securig their network perimeter, focusing on OT LAN and Edge Networks. With the increasing integration of IT/OT environments and the exposure of the network perimeter to external networks, this session explores threats and vulnerabilities affecting critical networks, along with mitigation strategies. Rod will introduce Fortinet’s Security Fabric Platform approach for integrated security management of the LAN and Edge Networks in OT, discussing the benefits of a unified approach for configuration, maintenance, and security operations. Additionally, he will explore LAN Edge and SASE extensions, highlighting how these enable the extension of unified security across the smallest and most remote sites.Industrial asset owners experience unique challenges and security considerations when securig their network perimeter, focusing on OT LAN and Edge Networks. With the increasing integration of IT/OT environments and the exposure of the network perimeter to external networks, this session explores threats and vulnerabilities affecting critical networks, along with mitigation strategies. Rod will introduce Fortinet’s Security Fabric Platform approach for integrated security management of the LAN and Edge Networks in OT, discussing the benefits of a unified approach for configuration, maintenance, and security operations. Additionally, he will explore LAN Edge and

Rod Locke
Director of Product Management
Fortinet

As digital transformation drives change in operations, industrial organizations are leveraging production data to improve efficiency and inform decisions. With transformation comes an increase in OT systems connected to enterprise IT networks, expanding the attack surface and introducing increased risk to the business. During this session, we will explore three customer case studies and how they designed-in security so OT production networks stay safe, available, and secure.

Richard Springer
Director Marketing, OT Solutions
Fortinet

Organizations that embarked on accelerated digital transformation are connecting their OT systems to the outside world. And since then,  there have been a surge of ransomware targeting OT infrastructure worldwide. Manufacturing, Energy and Facilities have all been targeted.  With the greater available of AI tools today, malicious hackers who do not have deep skillsets are now able to conduct those complex hacking previously only carried out by the more sophisticated hackers.  Organizations got to step up their cyber defense and adopt a holistic approach to be better prepared to support the vision and growth of their businesses with minimal disruption from adversaries.  In this session, the panel would discuss about the current challenges faced by most organizations, and the type of tools that enable them to stay ahead in this A.I. era.

Moderator:

Eddy Lek
Regional Product Marketing Manager - Operational Technology, Asia
Fortinet
Michael Murphy
Head of Operational Technology and Critical Infrastructure
Fortinet
Nikki Saunders
Cybersecurity Solutions and Services Lead APAC
Schneider electric
Patrick Ho
Cybersecurity Sales Executive Global Industry Accounts
Rockwell Automation
Saltanat Mashirova
Advanced Cyber Security Architect
Honeywell
Yap Khang How
Cybersecurity Architect Leader (Hub Asia)
ABB Malaysia Sdn Bhd

In the face of continually evolving cyber threats, organizations are compelled to adopt a unified and integrated approach to network operations centers (NOC) and security operations centers (SOC). This session explores the need for synergy between NOC and SOC functions in response to the dynamic nature of modern cyber threats. By examining the challenges posed by siloed operations, the session sheds light on the benefits and strategic advantages of fostering collaboration and integration between NOC and SOC teams across IT and OT environments. An integrated NOC/SOC reduces alert fatigue and enables efficient security automation. Aasef will share insights into how Fortinet’s Security Fabric Platform approach enhances threat detection, incident response, compliance assurance, and overall organizational resilience while lowering the total cost of ownership for SecOps infrastructure.

Aasef Iqbal
Sr. Director, Product Management
Fortinet
John Maddison
Chief Marketing Officer and EVP of Products and Solutions
Fortinet
John Maddison
Chief Marketing Officer and EVP of Products and Solutions
Fortinet

Critical infrastructures, including national critical infrastructure, offer many essential services to communities and nations. In some cases, a nation’s economy depends on these infrastructures. They rely on industrial control systems (ICS) and operational technology (OT) to provide uninterrupted and reliable services.

These infrastructures often contain security gaps and flaws in technology implementations leading to succesful cyberattacks. Some of them rely on the concept of air-gap networks to thwart cyber intrusions. However, due to interconnections between internal and external networks and the expansion of services, air-gap implementations are fading away. As a result, ICS that are not designed with security in mind are exposed to external threats, compromising the resiliency of the infrastructure.

Strategic readiness should be underpinned by the notion that eventually, a cyberattack will happen, and when it occurs, you should be proactively ready to respond. Fortifying operational technology is essential to make these infrastructures cyber-resilient and available to serve.

During this keynote, Jason Dely will speak about implementing a comprehensive and proactive risk management strategy. He will discuss evaluating tools to properly assess the cyber risk posture and effectively prioritize the most pressing vulnerabilities to safeguard these infrastructures from cyberattacks and make them cyber-resilient.

Jason Dely
Certified Instructor
SANS

Critical infrastructure organizations are on alert as bad actors see these infrastructures as attractive target for cyber-attacks. Ransomware variants, phishing emails, wiper malware and more show up as tactics used to disrupt services offered by these infrastructures. As digital transformation grows, so does the number of users, devices and applications connect across the operational technology, information technology, and cloud domains. This increases the number of remote users accessing critical systems like meters, sensors, and industrial control systems. While for many critical infrastructure owners and operators, this positively contributes to operational efficiency, it has also increased cyber risk and expanded the attack surface introducing known and unknown threats to the critical systems. During this session, we will look at the threats impacting critical infrastructure organizations and discuss the value of a threat-informed defense strategy for securing these organizations.

Derek Manky
Global VP Threat Intelligence
Fortinet

Industrial asset owners experience unique challenges and security considerations when securig their network perimeter, focusing on OT LAN and Edge Networks. With the increasing integration of IT/OT environments and the exposure of the network perimeter to external networks, this session explores threats and vulnerabilities affecting critical networks, along with mitigation strategies. Rod will introduce Fortinet’s Security Fabric Platform approach for integrated security management of the LAN and Edge Networks in OT, discussing the benefits of a unified approach for configuration, maintenance, and security operations. Additionally, he will explore LAN Edge and SASE extensions, highlighting how these enable the extension of unified security across the smallest and most remote sites.

Rod Locke
Director of Product Management
Fortinet

As digital transformation drives change in operations, industrial organizations are leveraging production data to improve efficiency and inform decisions. With transformation comes an increase in OT systems connected to enterprise IT networks, expanding the attack surface and introducing increased risk to the business. During this session, we will explore three customer case studies and how they designed-in security so OT production networks stay safe, available, and secure.

Richard Springer
Director Marketing, OT Solutions
Fortinet

Organizations that embarked on accelerated digital transformation are connecting their OT systems to the outside world. And since then,  there have been a surge of ransomware targeting OT infrastructure worldwide. Manufacturing, Energy and Facilities have all been targeted.  With the greater available of AI tools today, malicious hackers who do not have deep skillsets are now able to conduct those complex hacking previously only carried out by the more sophisticated hackers.  Organizations got to step up their cyber defense and adopt a holistic approach to be better prepared to support the vision and growth of their businesses with minimal disruption from adversaries.  In this session, the panel would discuss about the current challenges faced by most organizations, and the type of tools that enable them to stay ahead in this A.I. era.

Moderator:

Eddy Lek
Regional Product Marketing Manager - Operational Technology, Asia
Fortinet
Derek Manky
Global VP Threat Intelligence
Fortinet
Nikki Saunders
Cybersecurity Solutions and Services Lead APAC
Schneider electric
Patrick Ho
Cybersecurity Sales Executive Global Industry Accounts
Rockwell Automation
Saltanat Mashirova
Advanced Cyber Security Architect
Honeywell
Yap Khang How
Cybersecurity Architect Leader (Hub Asia)
ABB Malaysia Sdn Bhd

In the face of continually evolving cyber threats, organizations are compelled to adopt a unified and integrated approach to network operations centers (NOC) and security operations centers (SOC). This session explores the need for synergy between NOC and SOC functions in response to the dynamic nature of modern cyber threats. By examining the challenges posed by siloed operations, the session sheds light on the benefits and strategic advantages of fostering collaboration and integration between NOC and SOC teams across IT and OT environments. An integrated NOC/SOC reduces alert fatigue and enables efficient security automation. Aasef will share insights into how Fortinet’s Security Fabric Platform approach enhances threat detection, incident response, compliance assurance, and overall organizational resilience while lowering the total cost of ownership for SecOps infrastructure.

Aasef Iqbal
Sr. Director, Product Management
Fortinet
John Maddison
Chief Marketing Officer and EVP of Products and Solutions
Fortinet
John Maddison
Chief Marketing Officer and EVP of Products and Solutions
Fortinet

Critical infrastructures, including national critical infrastructure, offer many essential services to communities and nations. In some cases, a nation’s economy depends on these infrastructures. They rely on industrial control systems (ICS) and operational technology (OT) to provide uninterrupted and reliable services.

These infrastructures often contain security gaps and flaws in technology implementations leading to succesful cyberattacks. Some of them rely on the concept of air-gap networks to thwart cyber intrusions. However, due to interconnections between internal and external networks and the expansion of services, air-gap implementations are fading away. As a result, ICS that are not designed with security in mind are exposed to external threats, compromising the resiliency of the infrastructure.

Strategic readiness should be underpinned by the notion that eventually, a cyberattack will happen, and when it occurs, you should be proactively ready to respond. Fortifying operational technology is essential to make these infrastructures cyber-resilient and available to serve.

During this keynote, Jason Dely will speak about implementing a comprehensive and proactive risk management strategy. He will discuss evaluating tools to properly assess the cyber risk posture and effectively prioritize the most pressing vulnerabilities to safeguard these infrastructures from cyberattacks and make them cyber-resilient.

Jason Dely
Certified Instructor
SANS

Critical infrastructure organizations are on alert as bad actors see these infrastructures as attractive target for cyber-attacks. Ransomware variants, phishing emails, wiper malware and more show up as tactics used to disrupt services offered by these infrastructures. As digital transformation grows, so does the number of users, devices and applications connect across the operational technology, information technology, and cloud domains. This increases the number of remote users accessing critical systems like meters, sensors, and industrial control systems. While for many critical infrastructure owners and operators, this positively contributes to operational efficiency, it has also increased cyber risk and expanded the attack surface introducing known and unknown threats to the critical systems. During this session, we will look at the threats impacting critical infrastructure organizations and discuss the value of a threat-informed defense strategy for securing these organizations.

Derek Manky
Global VP Threat Intelligence
Fortinet

Industrial asset owners experience unique challenges and security considerations when securig their network perimeter, focusing on OT LAN and Edge Networks. With the increasing integration of IT/OT environments and the exposure of the network perimeter to external networks, this session explores threats and vulnerabilities affecting critical networks, along with mitigation strategies. Rod will introduce Fortinet’s Security Fabric Platform approach for integrated security management of the LAN and Edge Networks in OT, discussing the benefits of a unified approach for configuration, maintenance, and security operations. Additionally, he will explore LAN Edge and SASE extensions, highlighting how these enable the extension of unified security across the smallest and most remote sites.

Rod Locke
Director of Product Management
Fortinet

As digital transformation drives change in operations, industrial organizations are leveraging production data to improve efficiency and inform decisions. With transformation comes an increase in OT systems connected to enterprise IT networks, expanding the attack surface and introducing increased risk to the business. During this session, we will explore three customer case studies and how they designed-in security so OT production networks stay safe, available, and secure.

Richard Springer
Director Marketing, OT Solutions
Fortinet

Organizations that embarked on accelerated digital transformation are connecting their OT systems to the outside world. And since then,  there have been a surge of ransomware targeting OT infrastructure worldwide. Manufacturing, Energy and Facilities have all been targeted.  With the greater available of AI tools today, malicious hackers who do not have deep skillsets are now able to conduct those complex hacking previously only carried out by the more sophisticated hackers.  Organizations got to step up their cyber defense and adopt a holistic approach to be better prepared to support the vision and growth of their businesses with minimal disruption from adversaries.  In this session, the panel would discuss about the current challenges faced by most organizations, and the type of tools that enable them to stay ahead in this A.I. era.

Moderator:

Eddy Lek
Regional Product Marketing Manager - Operational Technology, Asia
Fortinet
Michael Murphy
Head of Operational Technology and Critical Infrastructure
Fortinet
Nikki Saunders
Cybersecurity Solutions and Services Lead APAC
Schneider electric
Patrick Ho
Cybersecurity Sales Executive Global Industry Accounts
Rockwell Automation
Saltanat Mashirova
Advanced Cyber Security Architect
Honeywell
Yap Khang How
Cybersecurity Architect Leader (Hub Asia)
ABB Malaysia Sdn Bhd

In the face of continually evolving cyber threats, organizations are compelled to adopt a unified and integrated approach to network operations centers (NOC) and security operations centers (SOC). This session explores the need for synergy between NOC and SOC functions in response to the dynamic nature of modern cyber threats. By examining the challenges posed by siloed operations, the session sheds light on the benefits and strategic advantages of fostering collaboration and integration between NOC and SOC teams across IT and OT environments. An integrated NOC/SOC reduces alert fatigue and enables efficient security automation. Aasef will share insights into how Fortinet’s Security Fabric Platform approach enhances threat detection, incident response, compliance assurance, and overall organizational resilience while lowering the total cost of ownership for SecOps infrastructure.

Aasef Iqbal
Sr. Director, Product Management
Fortinet
John Maddison
Chief Marketing Officer and EVP of Products and Solutions
Fortinet
John Maddison
Chief Marketing Officer and EVP of Products and Solutions
Fortinet

Critical infrastructures, including national critical infrastructure, offer many essential services to communities and nations. In some cases, a nation’s economy depends on these infrastructures. They rely on industrial control systems (ICS) and operational technology (OT) to provide uninterrupted and reliable services.

These infrastructures often contain security gaps and flaws in technology implementations leading to succesful cyberattacks. Some of them rely on the concept of air-gap networks to thwart cyber intrusions. However, due to interconnections between internal and external networks and the expansion of services, air-gap implementations are fading away. As a result, ICS that are not designed with security in mind are exposed to external threats, compromising the resiliency of the infrastructure.

Strategic readiness should be underpinned by the notion that eventually, a cyberattack will happen, and when it occurs, you should be proactively ready to respond. Fortifying operational technology is essential to make these infrastructures cyber-resilient and available to serve.

During this keynote, Jason Dely will speak about implementing a comprehensive and proactive risk management strategy. He will discuss evaluating tools to properly assess the cyber risk posture and effectively prioritize the most pressing vulnerabilities to safeguard these infrastructures from cyberattacks and make them cyber-resilient.

Jason Dely
Certified Instructor
SANS

Critical infrastructure organizations are on alert as bad actors see these infrastructures as attractive target for cyber-attacks. Ransomware variants, phishing emails, wiper malware and more show up as tactics used to disrupt services offered by these infrastructures. As digital transformation grows, so does the number of users, devices and applications connect across the operational technology, information technology, and cloud domains. This increases the number of remote users accessing critical systems like meters, sensors, and industrial control systems. While for many critical infrastructure owners and operators, this positively contributes to operational efficiency, it has also increased cyber risk and expanded the attack surface introducing known and unknown threats to the critical systems. During this session, we will look at the threats impacting critical infrastructure organizations and discuss the value of a threat-informed defense strategy for securing these organizations.

Derek Manky
Global VP Threat Intelligence
Fortinet

Industrial asset owners experience unique challenges and security considerations when securig their network perimeter, focusing on OT LAN and Edge Networks. With the increasing integration of IT/OT environments and the exposure of the network perimeter to external networks, this session explores threats and vulnerabilities affecting critical networks, along with mitigation strategies. Rod will introduce Fortinet’s Security Fabric Platform approach for integrated security management of the LAN and Edge Networks in OT, discussing the benefits of a unified approach for configuration, maintenance, and security operations. Additionally, he will explore LAN Edge and SASE extensions, highlighting how these enable the extension of unified security across the smallest and most remote sites.Industrial asset owners experience unique challenges and security considerations when securig their network perimeter, focusing on OT LAN and Edge Networks. With the increasing integration of IT/OT environments and the exposure of the network perimeter to external networks, this session explores threats and vulnerabilities affecting critical networks, along with mitigation strategies. Rod will introduce Fortinet’s Security Fabric Platform approach for integrated security management of the LAN and Edge Networks in OT, discussing the benefits of a unified approach for configuration, maintenance, and security operations. Additionally, he will explore LAN Edge and

Rod Locke
Director of Product Management
Fortinet

As digital transformation drives change in operations, industrial organizations are leveraging production data to improve efficiency and inform decisions. With transformation comes an increase in OT systems connected to enterprise IT networks, expanding the attack surface and introducing increased risk to the business. During this session, we will explore three customer case studies and how they designed-in security so OT production networks stay safe, available, and secure.

Richard Springer
Director Marketing, OT Solutions
Fortinet

Organizations that embarked on accelerated digital transformation are connecting their OT systems to the outside world. And since then,  there have been a surge of ransomware targeting OT infrastructure worldwide. Manufacturing, Energy and Facilities have all been targeted.  With the greater available of AI tools today, malicious hackers who do not have deep skillsets are now able to conduct those complex hacking previously only carried out by the more sophisticated hackers.  Organizations got to step up their cyber defense and adopt a holistic approach to be better prepared to support the vision and growth of their businesses with minimal disruption from adversaries.  In this session, the panel would discuss about the current challenges faced by most organizations, and the type of tools that enable them to stay ahead in this A.I. era.

Moderator:

Eddy Lek
Regional Product Marketing Manager - Operational Technology, Asia
Fortinet
Michael Murphy
Head of Operational Technology and Critical Infrastructure
Fortinet
Nikki Saunders
Cybersecurity Solutions and Services Lead APAC
Schneider electric
Patrick Ho
Cybersecurity Sales Executive Global Industry Accounts
Rockwell Automation
Saltanat Mashirova
Advanced Cyber Security Architect
Honeywell
Yap Khang How
Cybersecurity Architect Leader (Hub Asia)
ABB Malaysia Sdn Bhd

In the face of continually evolving cyber threats, organizations are compelled to adopt a unified and integrated approach to network operations centers (NOC) and security operations centers (SOC). This session explores the need for synergy between NOC and SOC functions in response to the dynamic nature of modern cyber threats. By examining the challenges posed by siloed operations, the session sheds light on the benefits and strategic advantages of fostering collaboration and integration between NOC and SOC teams across IT and OT environments. An integrated NOC/SOC reduces alert fatigue and enables efficient security automation. Aasef will share insights into how Fortinet’s Security Fabric Platform approach enhances threat detection, incident response, compliance assurance, and overall organizational resilience while lowering the total cost of ownership for SecOps infrastructure.

Aasef Iqbal
Sr. Director, Product Management
Fortinet
John Maddison
Chief Marketing Officer and EVP of Products and Solutions
Fortinet

OT EXPERT LINEUP


Richard Springer
Director Marketing, OT Solutions
Fortinet

Rod Locke
Director of Product Management
Fortinet

Michael Murphy
Head of Operational Technology and Critical Infrastructure
Fortinet

Eddy Lek
Regional Product Marketing Manager - Operational Technology, Asia
Fortinet

Aasef Iqbal
Sr. Director, Product Management
Fortinet