Five Ways to Engage:
Knowledge Hub Session
March 25 | 11:00 AM - 11:30 AM (CT)
Visit Knowledge Hub #5558 and join our team to learn more about Tales from the Crypt: A Hackers View of Electric Utility Vulnerabilities.
Breakout Session
March 25 | 1:00 PM - 1:50 PM (CT)
Stop by Room C141 and listen in on the Causes and Consequences of Running Unpatched Systems.
Peer-to-Peer Roundtable
March 26 | 10:15 AM - 11:15 AM (CT)
Attend the Peer-to-Peer Roundtable on Reducing Cyber Risk to Operational System in Room D220.
It's 5 O'clock Somewhere
March 26 | 4:00 PM - 5:00 PM (CT)
Join us for happy hour during It’s 5 O’clock Somewhere at our Booth #4033.
Booth Meeting with Fortinet
Booth #4033
Schedule time with our OT experts on the show floor.
Not Registered Yet?
Booth #4033
Claim a complimentary exhibit hall pass and join us in Dallas!
Fortinet Session Details:
Tales from the Crypt | A Hackers View of Electric Utility Vulnerabilities
Tuesday, March 25 from 11:00 AM - 11:30 AM (CT)
Booth #5558 - Digitalizing the Grid Knowledge Hub
Attacks on operational technology (OT) — the systems controlling industrial equipment, processes, and events — have leaped from Hollywood screens into reality. What started as a cloak and dagger spy novel with Stuxnet, today evolved to increasing and expanding attacks on OT infrastructure that nation states use to demonstrate capability and install fear in the public - all while laying in wait to prepare for battle. Attacks on electric utilities operations are not new, but their impact is more significant than ever. Join us as Fortinet FortiGuard Labs delves into the offensive techniques used by threat actors targeting OT environments in the electric utility sector. Discover how attackers gain unauthorized access to networks, the specific tactics and attacks they employ, and how they bypass security measures. This session will pull back the curtain on these cyber threats and reveal the hidden dangers lurking in our modern infrastructure.
Presenter:

Protecting Vulnerable OT Devices: Causes and Consequences of Running Unpatched Systems
Tuesday, March 25 from 1:00 PM - 1:50 PM (CT)
Room C141
Recent cyberattacks have demonstrated increased risk to both IT and operational technology (OT) environments. While you are waiting to patch, cybercriminals are maximizing their opportunity by exploiting older vulnerabilities and an expanding attack surface.
Keeping firmware current in an always-on environment is challenging yet the risk of not addressing vulnerabilities can critically impact compliance and resilience. Preparing for, responding to, and recovering from cyberattacks should be a strategic part of any continuity plan within your cybersecurity management system. Readiness equates to the enforcement of rules and policies that provide visibility, control, and situational awareness to respond at the speed of business.
During this session, we will explore the use of compensating controls to address vulnerabilities until the time when you can upgrade firmware. The session will also review a risk strategy through response planning to support your cybersecurity management system. The session will underscore how an integrated cybersecurity platform with the appropriate use of automation can support OT readiness.
Presenter:

Wednesday, March 26 from 10:15 AM - 11:15 AM (CT)
Room D220
Bad actors do not discriminate. They look for ways to disrupt. Most often it is a matter of when, not if, your organization could experience a breach. Energy utilities need the ability to see and understand everything that is on their operational networks. Just as utilities leverage weather predictions, utilities need a global view of threats to their operations. Once visibility is established, you then need to protect any devices that appear to be vulnerable. This requires protective compensating controls that are purpose-built for sensitive OT devices. Capabilities such as protocol-aware network policies, system-to-system interaction analysis, and endpoint monitoring can detect and prevent compromises of vulnerable assets. During this peer-to-peer discussion, we examine ways to reduce the exposure of vulnerable legacy systems and leverage threat intel to secure your environment.
Peer-to-peer exchange is a discussion on a specific topic. Discussions provide attendees access to knowledge and expertise to help them address the critical challenges facing the industry today in a smaller, yet targeted setting. These sessions offer an engaging interactive experience, encouraging and welcoming active participation from the group.
Panel Moderator:

Questions?
Contact our OT Marketing Team if you have any questions around the event or are interested in meeting the Fortinet team onsite.