WELCOME
Is the convergence of IT and OT keeping you up at night? As Artificial Intelligence and advanced analytics increasingly integrate into Operational Technology (OT) infrastructure, your critical industrial systems are more exposed than ever before. Traditional security approaches simply aren't enough to combat today's sophisticated cyber threats.
Join us in this demo day webinar to discover how you can robustly protect your vital OT environment.
Key takeaways:
- Bridging the Gap: Understand the escalating risks driven by IT/OT convergence and how to build a unified security posture.
- Fortinet's platform: Help you meet the stringent IEC 62443 and NIST framework requirements, ensuring compliance and adherence to industry best practices.
- Advanced strategies and technologies: To safeguard your industrial control systems from ransomware, malware, and targeted attacks.
- Real-World Applications: Learn how Fortinet supports modern industrial operations with enhanced visibility, segmentation, incident response, and threat intelligence.
🎁 Exciting Giveaway —Join us for a chance to win Skyzer PD 166 - 65W Desktop 5-in-1 wireless charging station or Philips Hand Held Massage Gun – PPM7311 – exclusive prizes up for grabs!
Thursday, August 14, 2025
- India Time at 09:00 am (GMT +5.30)
- SG/MY/HK/PH Time at 11:30 am (GMT +8)
- ID/TH/VN/KH/LA Time at 10:30 am (GMT +7)
- AEST Time at 1:30 pm (GMT +10)
- NZST Time at 3.30 pm (GTM +12)
Welcome Message and Keynote | 11:30 AM - 11:35 AM | SGT | |
Fortifying the Industrial Edge: A Framework-Based Approach with Fortinet OT Security | 11:35 AM - 11:45 AM | SGT | |
Demo 1 - Ruggedized Next-Generation Firewalls and FortiLink | 11:45 AM - 12:05 PM | SGT | |
Demo 2 - FortiAnalyzer with OT View & ML threat detection via Threat Intelligent Platform | 12:05 PM - 12:15 PM | SGT | |
Demo 3 – Secure Remote Access | 12:15 PM - 12:35 PM | SGT |
SPEAKERS
Welcome Message and Keynote
Kick off the Fortinet APAC Demo Day – Operational Technology Edition with a warm Welcome Message from Michael Murphy, followed by an insightful Keynote by Eddy Lek.
In the keynote, Eddy will explore how industrial organizations can strengthen cybersecurity at the edge through a framework-aligned strategy. Learn how Fortinet leverages the NIST Cybersecurity Framework and IEC 62443 to address the unique challenges of OT environments—enabling secure remote access, network segmentation, and AI-powered threat detection across critical infrastructure.
Discover how Fortinet empowers IT and OT teams to converge, collaborate, and secure operations in the age of automation and intelligence.


Demo 1: Ruggedized Next-Generation Firewalls and FortiLink
See how Fortinet's purpose-built, ruggedized FortiGate next-generation firewalls provide resilient security at the industrial edge, supporting the critical requirements for network segmentation (aligned with IEC 62443 Zones and Conduits) and the Protect function of the NIST CSF.
Key Highlights:
• Micro-segmentation with FortiGate and FortiSwitch
• Centralized network access control via FortiLink

Demo 2: FortiAnalyzer with OT View & ML threat detection via Threat Intelligent Platform
Gain enhanced visibility and OT-specific threat intelligence—critical for the Identify and Detect functions of the NIST Cybersecurity Framework and the monitoring and auditing requirements of IEC 62443.
Key Highlights:
• Ingest logs from FortiGates with an OT-centric view, including MITRE ATT&CK for ICS and other OT-relevant data
• Leverage machine learning to detect abnormal network behavior
• New: Fortinet Threat Intelligence Platform to extend SOC capabilities and integrate with broader cybersecurity tools

Demo 3: Secure Remote Access (SRA)
Learn how to enable secure, controlled remote access to OT systems for maintenance, monitoring, and operational needs—addressing critical requirements in the Access Control category of the NIST CSF Protect function and IEC 62443’s Identification & Authentication Control and Use Control standards.
Key Highlights:
• Agentless, secure connectivity for remote users
• Secrets management for credential protection
• Session recording for auditing and compliance
