IT/OT Security and Convergence Event - Jubail 

We are delighted to invite you for a private event conducted by Fortinet and partners Dragos and SITE. For the duration of the event, we will be diving into OT security and how it can protect your threat landscape from sophisticated attacks.

Effective OT Security is Not Negotiable

Digital innovation requires operational technology systems to interact with information technology systems. OT network components like control systems, SCADA, and industrial networks are being connected to IT network components such as processors, storage, and systems management. With IT-OT integration, the data collected by physical equipment and IIOT devices can be used to identify problems or increase efficiencies. 

However, connecting a previously air-gapped (not connected to the outside world) OT network to the internet via an IT network immediately exposes the OT network and all connected OT devices to the entire threat landscape. OT is generally not secure, since it was originally designed with the assumption it would not be exposed to threats. In addition, the rise of remote access to OT networks by third-party vendors further expands the attack surface and creates new vulnerabilities. 

15 March 2022



Opening and Welcome Note10:00 AM - 10:05 AM
Why OT Cybersecurity?10:05 AM - 10:15 AM
OT Network designers should start considering DPI, Application Control, Virtual Patching, Sandboxing, Deception Decoys, and Micro-Segmentation, Dedicated Security ASICS10:15 AM - 10:45 AM
The Effectiveness of SD-WAN and Use Cases10:45 AM - 11:00 AM
Break11:00 AM - 11:10 AM
Sector Overview: Oil and Natural Gas, Electric, and Water - DRAGOS11:10 AM - 11:20 AM
How operational technologies across all verticals are at risk from attacks like ransomware - DRAGOS11:20 AM - 11:35 AM
Current trends in the OT threat landscape in GCC - DRAGOS11:35 AM - 11:50 AM
Break11:50 AM - 12:00 PM
How to Manage Legacy Systems in the OT Environment - SITE12:00 PM - 12:30 PM
Lunch/Prayer12:30 PM - 3:00 PM