WHAT
Organizations in industries ranging from manufacturing to utilities face new risks from attacks on cyber-physical systems. If you’re looking to add or improve your operational technology (OT) security, join us at the Operational Technology Security Summit to learn strategies for reducing risk and increasing your network and cybersecurity resiliency.
Sessions will discuss IT and OT network convergence and the importance of using OT-specific solutions that can integrate multiple data sources to automate security and speed intrusion detection time. You’ll learn about:
-
Protecting endpoints and implementing security controls and policy enforcement
-
Setting up segmentation and microsegmentation to reduce risks
-
Deploying centralized monitoring, logging, and reporting across IT and OT systems
-
Mitigating threats, vulnerabilities, and zero-day exploits with real-time, up-to-date, threat intelligence
You’ll also hear from Fortinet customers and partners about how they are using the Fortinet OT Security Platform to secure their production environments and critical infrastructure.
WHY
As industrial organizations continue to digitize their operations, they are pulling production data from across their operations into IT systems. As more OT systems are connected to enterprise IT networks, this data can be shared to help drive business growth. But with this increased connectivity comes increased risk. Because many OT environments have inadequate and outdated security, cybercriminals are increasingly attacking cyber-physical systems in manufacturing, energy, utility and other industries.
The Fortinet OT Security Summit includes sessions that explain how you can set up an integrated cybersecurity strategy that covers your IT and OT networks. You’ll learn how to protect your unique legacy systems, secure the expanding attack surface, and keep remote employees, vendors, and service providers safe from attacks. Register now for the Operational Technology Security Summit and gain the knowledge you need to ensure that everything within your IT and OT production networks stays safe, available, and secure.
FEATURED SPEAKERS
AGENDA
Critical infrastructures, including national critical infrastructure, offer many essential services to communities and nations. In some cases, a nation’s economy depends on these infrastructures. They rely on industrial control systems (ICS) and operational technology (OT) to provide uninterrupted and reliable services.
These infrastructures often contain security gaps and flaws in technology implementations leading to succesful cyberattacks. Some of them rely on the concept of air-gap networks to thwart cyber intrusions. However, due to interconnections between internal and external networks and the expansion of services, air-gap implementations are fading away. As a result, ICS that are not designed with security in mind are exposed to external threats, compromising the resiliency of the infrastructure.
Strategic readiness should be underpinned by the notion that eventually, a cyberattack will happen, and when it occurs, you should be proactively ready to respond. Fortifying operational technology is essential to make these infrastructures cyber-resilient and available to serve.
During this keynote, Jason Dely will speak about implementing a comprehensive and proactive risk management strategy. He will discuss evaluating tools to properly assess the cyber risk posture and effectively prioritize the most pressing vulnerabilities to safeguard these infrastructures from cyberattacks and make them cyber-resilient.
Speakers
In this session we sit down with Honeywell to discuss how the growing operational risk and the expanding compliance requirements play a critical role in their clients' industrial controls security strategy.
Speakers
Critical infrastructure organizations are on alert as bad actors see these infrastructures as attractive target for cyber-attacks. Ransomware variants, phishing emails, wiper malware and more show up as tactics used to disrupt services offered by these infrastructures. As digital transformation grows, so does the number of users, devices and applications connect across the operational technology, information technology, and cloud domains. This increases the number of remote users accessing critical systems like meters, sensors, and industrial control systems. While for many critical infrastructure owners and operators, this positively contributes to operational efficiency, it has also increased cyber risk and expanded the attack surface introducing known and unknown threats to the critical systems. During this session, we will look at the threats impacting critical infrastructure organizations and discuss the value of a threat-informed defense strategy for securing these organizations.
Speakers
In this session we sit down with Schneider Electric to talk about how they prioritize security with their client installs, specifically using the Fortinet Security Fabric for network segmentation and micro segmentation to secure connectivity, data integrity, and industrial controls.
Speakers
Industrial asset owners experience unique challenges and security considerations when securig their network perimeter, focusing on OT LAN and Edge Networks. With the increasing integration of IT/OT environments and the exposure of the network perimeter to external networks, this session explores threats and vulnerabilities affecting critical networks, along with mitigation strategies. Rod will introduce Fortinet’s Security Fabric Platform approach for integrated security management of the LAN and Edge Networks in OT, discussing the benefits of a unified approach for configuration, maintenance, and security operations. Additionally, he will explore LAN Edge and SASE extensions, highlighting how these enable the extension of unified security across the smallest and most remote sites.
Speakers
In this session we sit down with Rockwell Automation to talk about the importance of implementing a zero trust strategy for industrial networks to design in security.
Speakers
OT asset owners and vendors drive innovation and enable increased efficiency, lower cost of ownership and a better ROI through adoption of various cutting-edge technologies. Cybersecurity is no different. This session will introduce Fortinet’s SASE solution and how it enables a wide breath of dynamic cybersecurity capabilities in an OT ecosystem with simplicity, flexibility, and cost effectiveness.
Speakers
In the face of continually evolving cyber threats, organizations are compelled to adopt a unified and integrated approach to network operations centers (NOC) and security operations centers (SOC). This session explores the need for synergy between NOC and SOC functions in response to the dynamic nature of modern cyber threats. By examining the challenges posed by siloed operations, the session sheds light on the benefits and strategic advantages of fostering collaboration and integration between NOC and SOC teams across IT and OT environments. An integrated NOC/SOC reduces alert fatigue and enables efficient security automation. Aasef will share insights into how Fortinet’s Security Fabric Platform approach enhances threat detection, incident response, compliance assurance, and overall organizational resilience while lowering the total cost of ownership for SecOps infrastructure.
Speakers
As digital transformation drives change in operations, industrial organizations are leveraging production data to improve efficiency and inform decisions. With transformation comes an increase in OT systems connected to enterprise IT networks, expanding the attack surface and introducing increased risk to the business. During this session, we will explore three customer case studies and how they designed-in security so OT production networks stay safe, available, and secure.
Speakers
OT EXPERT LINEUP