Looking to advance your OT security strategy? Join us at the Operational Technology Cybersecurity Conference to learn how you can reduce your operational risk and increase your network and cybersecurity resiliency. We will explore the convergence of cybersecurity across your IT and OT networks from the production facility to the board room. You’ll learn how to:

  • Minimize risk exposure in your digital transformation journey 
  • Identify, respond, and patch threats faster with threat intelligence
  • Industry leaders are prioritizing security in their client installs and projects 

Plus, hear from our customers and partners about how they are using the Fortinet Security Fabric to keep their production and critical infrastructure secure.


While Digital Transformation has accelerated for most organizations, it has also increased risk as the attack surface expands. Historically cybercriminals have focused on stealing data and ransomware. However, inadequate and outdated security has made OT environments an attractive and easy target.


As bad actors develop more sophisticated and destructive attacks and specifically target OT networks, asset owners must ensure all devices within their IT and OT production network remain safe, available, and secure. Register now for the Operational Technology Cybersecurity Conference and gain the knowledge you need to support you on your cybersecurity journey. 


Patrick Miller

President and CEO 

Jeff Zindel 

Vice President and General Manager of Cybersecurity

Dee Kimata 

Director Cybersecurity Offer Management

Patrick Hayes

Manager of Cloud Edge Compute and Virtualization



Digital transformation is causing a shift in the risk model for industrial security as the data produced by operations becomes as valuable (or more valuable) than the actual operations. With transformation comes gains in efficiency, productivity and new data used to inform decisions. Transformation also increases the number of connected devices, users and applications on the network attracting the attention of the bad actor and expanding the attack surface. During this session, we’ll explore:

  • Market trends impacting the risk equation for industrial organizations
  • Aligning cybersecurity strategy to risk model
  • Evolving cybersecurity maturing by integrating people, process and technology



Traditionally, OT network security plans relied upon a physical disconnect between OT and IT networks. But with the digital transformation of OT, connections to IT and Cloud environments are increasing. Although digital transformation is a clear trend with business benefits, the process brings with it a number of security challenges. Key takeaways from this session include: 

  • Understanding the risk of the evolving threat landscape targeting industrial environments
  • Applying application control signatures to reduce the attack surface for ICS and OT
  • Protecting vulnerable and unpatched OT systems from exploitation



In this session, we sit down with Honeywell to talk about how they prioritize security with their client installs, specifically using the Fortinet Security Fabric for network segmentation and micro segmentation to secure connectivity, data integrity, and industrial controls.



In this session, we sit down with Dee Kimata, Director of Cybersecurity Services at Schneider Electric, and talk about how they leverage the Fortinet Security Fabric in customer projects that require secure cloud connectivity, data integrity, and flexible control. The discussion will also offer an example of Schneider’s use of Fortinet as a manufacturer to apply threat intelligence and reduce own operational risk.



In this session, we sit down with Patrick Hayes, leader from Siemens, to talk about how they design security in with their energy customers leveraging the Fortinet Security Fabric.