As digital transformation continues to gain pace, organizations are finding it hard to keep pace with the fast evolving threat landscape. It is no wonder that the IT and OT convergence has led to a 10X increase in ransomware attack volume in 2021. Manufacturing, utilities, transportation, healthcare and critical infrastructure have all been targeted.
Join us at the Fortinet ASIA - OT Demo Day to learn how you can better secure OT networks to enable digital innovations:
Thursday, 21 July 2022
SG/MY/HK/PH Time at 11:30 am (GMT +8)
ID/TH/VN/KH/LA Time at 10:30 am (GMT +7)
India Time at 09:00 am (GMT +5.30)
|Simplify OT Security and Reduce Cyber Risks with a Robust Platform||11:30 AM - 11:40 AM|
|Top 3 ways Ransomware enters an OT system||11:40 AM - 11:55 AM|
|Demo 1 – Intent-based Segmentation for IT/OT Network||11:55 AM - 12:05 PM|
|Demo 2 – Virtual Patching to protect legacy systems||12:05 PM - 12:15 PM|
|Demo 3 – Sandbox for OT Malware protection||12:15 PM - 12:25 PM|
|Closing and Lucky Draw||12:25 PM - 12:30 PM|
Simplify OT Security and Reduce Cyber Risks with a Robust Platform
In the past two years, organizations have been prioritizing digitalization to drive productivity and business agility. As a result, operational assets now are getting more connected to gain real-time operating visibility and control. This has inadvertently introduced outside threats to the once air-gapped OT systems. Outages of OT systems not only cause monetary losses for organizations but also physical risks for staffs and livelihoods. Protecting OT infrastructure is therefore key to stay ahead of the curve, protecting your digital investment.
In this session, Kelvin will discuss how you could leverage a robust platform to unify existing disparate solutions, simplify complex security and improve performance.
Top 3 ways Ransomware enters an OT system
Threat actors spend many hours inside corporate networks before going for the kill. Often, they collaborate behind the scenes, figure out what's everyone's role in their upcoming attack, share expertise and negotiate with each other about the future revenue. Many attacks go undetected until ransomware encrypts their systems or the threat actors sell the data on underground markets. Despite recent takedowns of various marketplaces by law-enforcement, hackers still continue to find vulnerable applications, services, and other vulnerable initial access vectors and exploit them for their purposes.
The session will showcase how hackers enumerate environments and launch attacks against their targets to infiltrate organizations, steal intellectual property and carry out additional attacks.
Demo 1 – Intent-based Segmentation for IT/OT Network
Segmentation is often first steps to build a cyber-resilience network. As networks and operations expand, organization has to ensure proper segmentation is in place. This would make it harder for threats to crossover to critical zones.
In this session, we will demonstrate how the micro-segmentation solution with our FortiGate NGFWs could easily create zones for assets such as Workstations and PLCs under the same VLAN. This micro-segmentation will increase the traffic control granularity by utilizing next-gen firewall policy and minimize the risks of lateral movement by external threat actors.
Demo 2 – Virtual Patching to protect legacy systems
Patch Management is key to protect industrial control system (ICS) from known vulnerabilities. However, patching for an ICS equipment often requires advanced planning and carefully thought out processes as cyber threat actors are known for using patches to create attack vectors into the systems.
In this session, we will demonstrate how IPS Virtual Patching with FortiGate NGFWs helps customers enforce their patch management policies on schedules and defend their systems against known threats.
Demo 3 – Sandbox for OT Malware protection
Increasing threats of vulnerabilities are steadily rising, particularly in sensitive areas such as OT systems and critical process network, putting vital infrastructure at risk. OT malware can range from modifying how an industrial process operates, through to disruptive or destructive attacks - what we call a cyber-physical attack.
In this session, we will demonstrate how AI-powered FortiSandbox integrated with Fortinet’s Security Fabric platform can help address the rapidly evolving and more targeted threats including ransomware, crypto-malware, and others across a broad digital attack surface. Specifically, it delivers real-time actionable intelligence through the automation of zero-day advanced malware detection and response.