Secure Operational Technology
Summit 2022 - APAC
Building Cyber Resilience in a Digital-First World
Welcome
Two years into the pandemic, organizations are still walking a fine line to balance the competing needs of productivity and safety, while accelerating their digital transformation journey. The convergence of IT and OT has led to an unprecedented 10X increase in ransomware in 2021. Manufacturing, utilities, transportation and critical infrastructure have all been targeted. Overcoming these challenges and building cyber resilience to minimize disruption from cyber threats have been given top priorities in the boardroom today.
Join us at the Fortinet Secure Operational Technology Summit to hear from CISOs, Asset Owners, Industrial Control System (ICS) vendors, IDC and Fortinet experts where we will discuss how organizations deal with the uncertainties of the continuing pandemic and how you can build cyber resilience to protect your digitalization plan.
Agenda
Thursday, 07 April 2022
09:15 AM SGT, 09:15 AM IST | 12:15 PM AEDT
Virtual Doors Open & Meet the Experts at the Exhibition Hall | 9:15 AM - 9:20 AM (SGT) | |
Welcome and Introductions | 9:20 AM - 9:30 AM (SGT) | |
The Future of Security for Industry 4.0 | 9:30 AM - 9:55 AM (SGT) | |
Top 5 Operational Technology (OT) Cybersecurity Challenges Facing CISOs in 2022 | 9:55 AM - 10:05 AM (SGT) | |
Panel Discussion: IT/OT Convergence – Cyber Security is not just about Technology | 10:05 AM - 10:40 AM (SGT) | |
Elevate Leadership, Cyber Strategies For Operational Resilience | 10:40 AM - 10:50 AM (SGT) | |
Panel Discussion: Rethinking the approach to Industrial Control Systems Security | 10:50 AM - 11:30 AM (SGT) | |
Secure Remote Access: The Why and the How | 11:30 AM - 11:40 AM (SGT) | |
Build Cyber Resilience with a Robust Defence in Depth Strategy | 11:40 AM - 12:00 PM (SGT) | |
Closing & Meet the Experts at the Exhibition Hall | 12:00 PM - 1:00 PM (SGT) |
Speakers

Police BG Benjamin D Santos, Jr
Director, Directorate for Controllership
Philippine National Police Command Center
09:20 - 09:30
(GMT +8)
Joe Sarno introduces Secure OT 2022. Building Cyber Resilience in a Digital-First World.

09:30 - 09:55
(GMT +8)
As companies move towards Industry 4.0, the need for data to support decisions, drive operational efficiency, improve product quality and optimize operations is more critical than ever. Manufacturers have long used process control data to control operational technology equipment on the shop floor. However, recently manufacturers have experienced extreme data growth with the accelerated adoption of technologies such as IoT sensors, robotics, edge devices, video, simulation, and digital twins. However, there is a cost to this level of automation and connectivity.
Recent years have seen a shift in the industry environment, with cyberattacks targeting operational technologies in manufacturing and industrial settings. Due to the interconnectedness of physical infrastructure with IT, this has created new cybersecurity risks, impacting organizations financially, affecting employee safety, and potentially with environmental consequences. Yet, according to IDC's 2021 manufacturing insights survey, 76% of Asia/Pacific manufacturers are not expecting to invest in OT security over the next two years. In addition, OT security is more than a technology challenge. Organizations need to acknowledge that the potential security perils are as much about human threats as technological. As a result, companies will need to leverage IT and operational expertise to address security, business, and operational requirements.
This session will cover:
- IDC's future predictions for security in the Industry 4.0 era
- Industry 4.0, operational connectivity, IT and OT security trends in industrial operations in Asia/Pacific
- Challenges, practices, use cases, and IDC guidance for building cybersecurity resilience across industrial organizations

09:55 - 10:05
(GMT +8)
As operational technology (OT) environments continue to digitally innovate, Internet of Things (IoT) or industrial IoT (IIoT) device use has exploded creating a new target-rich digital landscape for the bad actor. Today, meters, gauges, sensors and control systems from multiple vendors coexist and are all connected to the network, increasing process efficiency and expanding the attack surface. During this brief, we will investigate the top five trends that influence cybersecurity challenges for operational technology.

10:05 - 10:40
(GMT +8)
OT security is not just about technology. To effectively build cyber resilience into an OT network, organizations have to consider the 3 elements - people, process and technology when making changes to the existing OT security infrastructure. The industry panelists will discuss about the OT/IT team challenges, technology and how they maintain cyber resilience and stay ahead of the curve. Joe Robertson focuses on two key elements to OT Security: visibility and segmentation.
Panel:




Moderator:

10:40 - 10:50
(GMT +8)
The future of work for leaders includes strategies to solve big problems and being adaptable to change. This quick session will be focused on high priorities and lessons learned with strategies every leader can use to build cybersecurity resilience in their business.

10:50 - 11:30
(GMT +8)
As OT systems become more connected for driving productivity and enabling remote workforces, this introduces a whole new level of cyber security threats to what was once an air-gapped network. The ICS equipment experts will discuss the impacts and how their control systems are evolving in light of increasing security needs for end users.
Panel:




Moderator:

11:30 - 11:40
(GMT +8)
In the past, Industrial control networks had been physically segmented and isolated from the internet to limit cyber breaches. Today, with the increasing connectivity between systems and processes to the outside network to improve efficiency and support Work From Anywhere (WFA) strategy, companies are facing unprecedented cyber threats. Even in an air gap environment, it is not uncommon to see staff or equipment vendors using external flash drives or laptops to upload contents to a controller during maintenance, exposing the systems to malware attack.
In this session, you will learn why secure remote access should be part of your cyber security strategy and how you can implement it effectively.

11:40 - 12:00
(GMT +8)
Today, organizations are adopting defence in depth strategy to strengthen their OT security posture in response to the increasing ransomware attacks. However, the deployment of many point products to add layers of security for holistic protection has led to system complexity, affecting network latency and incident response time.
In this session, you will learn how a robust platform can simplify your security strategy and improve network performance.

12:00 - 13:00
(GMT +8)
Closing Session.
09:20 - 09:30
(GMT +5.30)
Joe Sarno introduces Secure OT 2022. Building Cyber Resilience in a Digital-First World.

09:30 - 09:55
(GMT +5.30)
As companies move towards Industry 4.0, the need for data to support decisions, drive operational efficiency, improve product quality and optimize operations is more critical than ever. Manufacturers have long used process control data to control operational technology equipment on the shop floor. However, recently manufacturers have experienced extreme data growth with the accelerated adoption of technologies such as IoT sensors, robotics, edge devices, video, simulation, and digital twins. However, there is a cost to this level of automation and connectivity.
Recent years have seen a shift in the industry environment, with cyberattacks targeting operational technologies in manufacturing and industrial settings. Due to the interconnectedness of physical infrastructure with IT, this has created new cybersecurity risks, impacting organizations financially, affecting employee safety, and potentially with environmental consequences. Yet, according to IDC's 2021 manufacturing insights survey, 76% of Asia/Pacific manufacturers are not expecting to invest in OT security over the next two years. In addition, OT security is more than a technology challenge. Organizations need to acknowledge that the potential security perils are as much about human threats as technological. As a result, companies will need to leverage IT and operational expertise to address security, business, and operational requirements.
This session will cover:
- IDC's future predictions for security in the Industry 4.0 era
- Industry 4.0, operational connectivity, IT and OT security trends in industrial operations in Asia/Pacific
- Challenges, practices, use cases, and IDC guidance for building cybersecurity resilience across industrial organizations

09:55 - 10:05
(GMT +5.30)
As operational technology (OT) environments continue to digitally innovate, Internet of Things (IoT) or industrial IoT (IIoT) device use has exploded creating a new target-rich digital landscape for the bad actor. Today, meters, gauges, sensors and control systems from multiple vendors coexist and are all connected to the network, increasing process efficiency and expanding the attack surface. During this brief, we will investigate the top five trends that influence cybersecurity challenges for operational technology.

10:05 - 10:40
(GMT +5.30)
Panel:




Moderator:

10:40 - 10:50
(GMT +5.30)
The future of work for leaders includes strategies to solve big problems and being adaptable to change. This quick session will be focused on high priorities and lessons learned with strategies every leader can use to build cybersecurity resilience in their business.

10:50 - 11:30
(GMT +5.30)
As OT systems become more connected for driving productivity and enabling remote workforces, this introduces a whole new level of cyber security threats to what was once an air-gapped network. The ICS equipment experts will discuss the impacts and how their control systems are evolving in light of increasing security needs for end users.
Panel:




Moderator:

11:30 - 11:40
(GMT +5.30)
In the past, Industrial control networks had been physically segmented and isolated from the internet to limit cyber breaches. Today, with the increasing connectivity between systems and processes to the outside network to improve efficiency and support Work From Anywhere (WFA) strategy, companies are facing unprecedented cyber threats. Even in an air gap environment, it is not uncommon to see staff or equipment vendors using external flash drives or laptops to upload contents to a controller during maintenance, exposing the systems to malware attack.
In this session, you will learn why secure remote access should be part of your cyber security strategy and how you can implement it effectively.

11:40 - 12:00
(GMT +5.30)
Today, organizations are adopting defence in depth strategy to strengthen their OT security posture in response to the increasing ransomware attacks. However, the deployment of many point products to add layers of security for holistic protection has led to system complexity, affecting network latency and incident response time.
In this session, you will learn how a robust platform can simplify your security strategy and improve network performance.

12:00 - 13:00
(GMT +5.30)
Closing Session.
12:25 - 12:30
(GMT +11)
Joe Sarno introduces Secure OT 2022. Building Cyber Resilience in a Digital-First World.

12:30 - 12:50
(GMT +11)
As companies move towards Industry 4.0, the need for data to support decisions, drive operational efficiency, improve product quality and optimize operations is more critical than ever. Manufacturers have long used process control data to control operational technology equipment on the shop floor. However, recently manufacturers have experienced extreme data growth with the accelerated adoption of technologies such as IoT sensors, robotics, edge devices, video, simulation, and digital twins. However, there is a cost to this level of automation and connectivity.
Recent years have seen a shift in the industry environment, with cyberattacks targeting operational technologies in manufacturing and industrial settings. Due to the interconnectedness of physical infrastructure with IT, this has created new cybersecurity risks, impacting organizations financially, affecting employee safety, and potentially with environmental consequences. Yet, according to IDC's 2021 manufacturing insights survey, 76% of Asia/Pacific manufacturers are not expecting to invest in OT security over the next two years. In addition, OT security is more than a technology challenge. Organizations need to acknowledge that the potential security perils are as much about human threats as technological. As a result, companies will need to leverage IT and operational expertise to address security, business, and operational requirements.
This session will cover:
- IDC's future predictions for security in the Industry 4.0 era
- Industry 4.0, operational connectivity, IT and OT security trends in industrial operations in Asia/Pacific
- Challenges, practices, use cases, and IDC guidance for building cybersecurity resilience across industrial organizations

12:50 - 13:00
(GMT +11)
As operational technology (OT) environments continue to digitally innovate, Internet of Things (IoT) or industrial IoT (IIoT) device use has exploded creating a new target-rich digital landscape for the bad actor. Today, meters, gauges, sensors and control systems from multiple vendors coexist and are all connected to the network, increasing process efficiency and expanding the attack surface. During this brief, we will investigate the top five trends that influence cybersecurity challenges for operational technology.

13:00 - 13:30
(GMT +11)
OT security is not just about technology. To effectively build cyber resilience into an OT network, organizations have to consider the 3 elements - people, process and technology when making changes to the existing OT security infrastructure. The industry panelists will discuss about the OT/IT team challenges, technology and how they maintain cyber resilience and stay ahead of the curve. Joe Robertson focuses on two key elements to OT Security: visibility and segmentation.
Panel:




Moderator:

13:30 - 13:40
(GMT +11)
The future of work for leaders includes strategies to solve big problems and being adaptable to change. This quick session will be focused on high priorities and lessons learned with strategies every leader can use to build cybersecurity resilience in their business.

13:40 - 14:10
(GMT +11)
As OT systems become more connected for driving productivity and enabling remote workforces, this introduces a whole new level of cyber security threats to what was once an air-gapped network. The ICS equipment experts will discuss the impacts and how their control systems are evolving in light of increasing security needs for end users.
Panel:




Moderator:

14:10 - 14:20
(GMT +11)
In the past, Industrial control networks had been physically segmented and isolated from the internet to limit cyber breaches. Today, with the increasing connectivity between systems and processes to the outside network to improve efficiency and support Work From Anywhere (WFA) strategy, companies are facing unprecedented cyber threats. Even in an air gap environment, it is not uncommon to see staff or equipment vendors using external flash drives or laptops to upload contents to a controller during maintenance, exposing the systems to malware attack.
In this session, you will learn why secure remote access should be part of your cyber security strategy and how you can implement it effectively.

14:20 - 14:30
(GMT +11)
Today, organizations are adopting defence in depth strategy to strengthen their OT security posture in response to the increasing ransomware attacks. However, the deployment of many point products to add layers of security for holistic protection has led to system complexity, affecting network latency and incident response time.
In this session, you will learn how a robust platform can simplify your security strategy and improve network performance.

14:30 - 16:0
(GMT +11)
Closing Session.
The Technology Track On-Demand Sessions will be available after the plenary sessions.
07 Apr (11:30AM) -
08 Apr (06:00 PM)
This session highlights some of the ransomware tools and techniques used in OT attacks and ransomware as a service. Learn how you can level up the defense and protect your organization from these attacks through segmentation, micro segmentation, email protection, sandboxing and many more.

An integrated and connected supply chain is the back-bone of many industries. In this session, we examined the cyber threats that are impacting supply chains today and how you can build operational resiliency and stay ahead of breaches.


Allowing remote access into the OT environment is a double edge sword. On one hand, it allows OT engineers to effectively and efficiently carry out their mission. On the other hand, it expands the attack surface area. Currently, most remote access uses IPSec VPN to secure access into the organisation. However, VPN also allows access to the entire organisation internal network. Leveraging on Fortinet’s Zero Trust Network Access (ZTNA), access is only allowed to specific application without direct access into the organisation internal network . Join us and find out more on how Fortinet can help secure your remote access effectively.

Andrew will be presenting on the Security of Critical Infrastructure Act amendments and their ramifications for critical infrastructure operators. As governments around the world head toward regulations and laws for critical infrastructure operators, there are some core capabilities and security controls that global cyber security standards mandate. Organisations that have commenced their security journey with a program of work aligned to one of the information security standards will already have core competency and capability with many requirements. Compliance with regulations can be achieved by understanding the requirements ensuring people, process and technology are appropriately deployed and in line with relevant standards.

Most organizations with Operational Technology (OT) networks are concerned about expanding attack surface and advanced threats. Fortinet provides a comprehensive solution to secure critical assets for organizations by providing integrated visibility, control, and response capabilities to support security standards such as NIST--Identify, Protect, Detect, Respond and Recover. The global OT Market opportunity are estimated at $8 ~ 14B by 2022 and the average deal size for OT is between $250K and $1M+ with multi-site, multi-year agreements. To capture this market, Fortinet strongly believes strongly in collaborating closly with partners. Come join our session to understand how partners like you can benefit from our ecosystem.

2021 Event Statistics
2400+ Registrants
40+ Industries
Industries including: Oil & Gas, Power & Utilities, Renewable Energy, Critical Infrastructures, Government, Rail, Pharma, Manufacturing, Life Sciences, and High Tech...
60+ Countries
Event Participants
Alliance Partner