Three Ways to Engage:

Visit our Prime Room
Demos & Partner Sessions
Join OT experts from Fortinet and Partners for Breakout Sessions and Demos.

Schedule Time
with our Experts
Meet with Fortinet's OT experts in our Venus Prime Room on the 3rd Floor!

Connect and Unwind During S4x26
Join Fortinet and industrial cybersecurity companies for networking opportunity.
Fortinet
Prime Room
Schedule:
Venus Prime Room (3rd Floor)
Join Fortinet's OT experts and our partners to hear the latest on cybersecurity for OT environments.
Monday, Feb 23
2:00 PM – 2:45 PM
Operationalizing OT Cybersecurity with IEC 62443
3:00 PM - 3:30 PM
Operationalizing Cyber Defense | The Fortinet Security Platform-driven OT SOC
4:00 PM – 4:30 PM
Secure Remote Access for Operational Technology
5:00 PM – 7:00 PM
Prime Room Happy Hour
Tuesday, Feb 24
8:15 AM - 8:45 AM
Virtual Patching for OT: An Essential for Vulnerability Mitigation
10:30 AM - 11:00 AM
Morning Break
11:30 AM – 12:15 PM
Using the Right Signals to Protect and Manage OT Network Traffic for Vulnerability Response
2:00 PM - 4:00 PM
Afternoon Break
Wednesday, Feb 25
8:15 AM - 9:00 AM
Integrating Asset Visibility and Network Security | Armis and Fortinet
10:30 AM - 11:00 AM
Morning Break
11:00 AM – 11:45 AM
Safeguarding Critical Infrastructure in the Transportation Sector
Thursday, Feb 26
9:00 AM - 9:45 AM
Operationalizing OT Cybersecurity with IEC 62443
10:00 AM - 10:45 AM
Virtual Patching for OT: An Essential for Vulnerability Mitigation
Session Details:
Operationalizing OT Cybersecurity with IEC 62443
The session discusses how IEC 62443 can be operationalized in operational technology (OT) environments using the Fortinet OT Security Platform. It focuses on translating IEC 62443 requirements into deployable security controls across a range of OT environments, bridging the gap between compliance requirements and real-world operational constraints in power substations, manufacturing plants, oil and gas facilities, and other critical infrastructure.
Participants will learn how Fortinet supports a defense-in-depth OT security architecture aligned with IEC 62443-2-1, 3-3, 4-1, and 4-2, while maintaining essential OT requirements such as high availability, deterministic communications, and compatibility with legacy OT protocols
Presenters:

Operationalizing Cyber Defense | The Fortinet Security Platform-driven OT SOC
This session discusses how organizations can design and operate an operational technology security operations center (OT SOC) using an integrated OT Security Platform to detect, investigate, and respond to cyber threats. It focuses on establishing OT SOC capabilities that deliver continuous visibility, threat detection, and incident response across a range of critical infrastructure sectors.
The session explains how OT-specific monitoring, protocol-aware detection, centralized logging, and automated response workflows enable effective OT CSOC operations, while aligning with regulatory and compliance requirements and supporting audit and reporting objectives.
Presenters:


Safeguarding Critical Infrastructure In The Transportation Sector
This session explores the evolving cybersecurity challenges faced by critical transportation systems, including railways, maritime operations, aviation, public transit networks (buses and trams), freight and logistics, highways, and emerging mobility solutions such as autonomous vehicles. Cyber threats to these systems can disrupt operations, compromise safety, and threaten economic stability. The session will examine vulnerabilities, risk mitigation strategies, and the role of cybersecurity technologies. We will also discuss emerging compliance and regulatory requirements, such as the EU NIS Directive, US TSA Cybersecurity Directives, and industry-specific cybersecurity standards, all of which impact cybersecurity practices within the transportation sector.
Presenters:


Secure Remote Access for Operational Technology
In developing a business continuity plan, an important consideration is that the organization may not be capable of sustaining normal operations on-site. The ability to securely support employees and contractors working remotely is essential to ensuring OT business continuity. OT organizations also need secure remote access because they may need to commission new equipment, apply critical patches, or deal with repairs and troubleshooting activities remotely. Additionally, OT organizations may perform remote monitoring and diagnostics or use remote operation centers to affordably take care of geographically distributed assets. Security is critical because a breach in an OT environment could lead to outages of services and the loss of human life or damage critical infrastructures. During this demonstration session, you’ll learn:
- Risks associated with unsecured remote access
- Key regulations and security standards around remote access requirements
- Security considerations when implementing remote access in OT environments
- Overview of technology solutions available for secure remote access
- FortiPAM Overview – Fortinet’ privileged access management solution to support secure remote access for OT
Presenters:

Virtual Patching for OT: An Essential for Vulnerability Mitigation
Protecting vulnerable devices, critical to operations, when patching is not an option increases risk A Next-Gen Firewall with integrated Intrusion Prevention (IPS) capability provides multiple protections for vulnerable OT devices, including segmentation, microsegmentation, OT application control, vulnerability protection and virtual patching. Driven by device identification and vulnerability profiling, these layered security measures ensure that necessary communications continue to flow while malicious attacks are blocked. In particular, Virtual Patching should now be considered an integral component of an organization’s patch management strategy. By automatically protecting vulnerable devices in the OT environment, virtual patching ensures timely protection against new threats, eliminating the window of opportunity and minimizing the risk for businesses, without incurring downtime in the production environment. During this demonstration, you will experience how virtual patching will address how organizations can reduce the exposure of their vulnerable OT assets using a defense-in-depth methodology.
Presenters:

Using the Right Signals to Protect and Manage OT Network Traffic for Vulnerability Response
Despite consensus on attack surface expansion and shared management challenges responding to attacks, there remains high degree of variation in security practices and capabilities, including practices for securing legacy and modern equipment. To protect the critical infrastructure in OT, industrial organizations need to harness the power of segmentation to secure their resources, systems, and users, as well as minimize the risk of attackers gaining access to their critical infrastructure. Join this demonstration to experience how the Fortinet OT Security Platform removes the risks associated with flat network architectures and supports operationalizing NIST, IEC 62443 and other cybersecurity frameworks to secure network traffic.
Presenters:

Integrating Asset Visibility and Network Security | Armis and Fortinet
Today’s networks connect a myriad managed and unmanaged devices, with little visibility or control over the risk they introduce to the business. Security teams struggle to understand where, what, and how these vulnerable devices are. Combining the Armis Platform with the Fortinet Security Fabric creates a unified visibility, analysis, and enforcement ecosystem that delivers simpler, stronger, and more efficient security controls. Integrating the Armis Platform’s device visibility with the Fortinet Security Fabric reduces your exposure to the risks of unmanaged and unknown devices and provides security teams with deeper device insights—all done without disrupting critical business operations.
Presenters:
Questions?
Contact our OT Marketing Team if you have any questions around the event or are interested in meeting the Fortinet team onsite.

