Secure Operational Technology Summit 2023
APAC Virtual Event
Securing the Future of Digital Transformation
Welcome
Digital Transformation has been gaining pace across all industries since the pandemic. Even as the world enter into new normal amid the economic uncertainty, digital initiatives continue to retain its priority on the agenda of most organizations driven by the needs to build more resilient and efficient operations to stay ahead of the curve.
Industry 4.0 is the evolution of Cyber-Physical Systems (CPS) that helps unlock digital transformation and has been adopted across most industries in APAC, including process/discrete manufacturing, energy and utilities, mining, logistics and transportation, building management, healthcare and others. Its goal is to enable autonomous decision-making processes, raising operational excellence to the next level. While this helps organizations to thrive globally in the new normal, the increased Operational Technology (OT) network connectivity invariantly exposes their OT network to more cyber attacks. With the increased IT/OT network convergence, organizations have to rethink about their approach to OT security to build a more cyber resilient operation.
Join us at the Fortinet Secure Operational Technology Summit to hear from CISOs, customers, and Fortinet experts where we will discuss how organizations transform their OT security in the Industry 4.0 era and how you can secure the future of your digital transformation plan.
- The Industry 4.0 and OT Security trends in APAC
- Most common cyber attacks on OT systems
- Best Practices for Securing the complex and distributed OT infrastructure
- How-to get started for your OT security journey
Agenda
Wednesday, 15 March 2023
09:15 AM SGT, 09:15 AM IST | 12:15 PM AEDT | 02:15 PM NZDT
Virtual Doors Open & Meet the Experts at the Exhibition Hall | 9:15 AM - 9:25 AM | |
Welcome and Introductions | 9:25 AM - 9:30 AM | |
Global Best Practices for Securing OT Infrastructure | 9:30 AM - 9:50 AM | |
Industry 4.0 and the Importance of OT Security in APAC | 9:50 AM - 10:10 AM | |
Most prevalent Cyber Attacks Targetting OT Systems in 2022 | 10:10 AM - 10:30 AM | |
On the Road to Net Zero: OT Security as a key enabler | 10:30 AM - 10:50 AM | |
Securing the Future of Digital Transformation with Fortinet Security Fabric | 10:50 AM - 11:00 AM | |
Panel Discussion: Industrial 4.0 and the OT Cyber Security in APAC | 11:00 AM - 11:30 AM | |
Closing & Meet the Experts at the Exhibition Hall | 11:30 AM - 12:30 PM |
Speakers
Urvish Acharya, CISSP, CISA, DCPLA
Head of IT Governance & Risk
Birla Carbon, an Aditya Birla Group Company
09:25 - 09:30
(GMT +8)
09:30 - 09:50
(GMT +8)
The increased connectivity of OT systems to the outside world has led to a surge in cyber-attacks across the globe last year. Today, meters, gauges, sensors and control systems from multiple vendors coexist and are all connected to the network, increasing process efficiency and expanding the attack surface. Staying ahead of evolving cyber threats is paramount for an organization’s success. CISOs at top industrial organizations often prioritize cybersecurity as an critical component to their digital transformation plans. During this brief, we will explore best practices pursued by global organizations to reduce cyber risks and improve operational efficiencies including
- Informing decisions with proactive threat intelligence to stay ahead of potential threats
- Establishing network controls to enforce policies for users, devices and applications using segmentation and micro segmentation
- Reducing organization risk with layered defense
09:50 - 10:10
(GMT +8)
Late in 2022 IDC predicted that by 2025, 50% of organizations will increase the use of IoT and OT cybersecurity solutions at the edge, cutting OT cybersecurity breaches in half.
Operational Technology (OT) has been evolving since the industrial age began to the extent that some of the most advanced factories today operate with minimal human intervention, allowing the robotic technologies to undertake most, if not all, the manufacturing process. In critical industries such as power generation and distribution, and water treatment and distribution OT has revolutionized how we can access these services with great ease.
Meanwhile the rise of Information Technology (IT) was driven by a need to do business faster, more effectively, at greater scale and with fewer errors and, for the most part, IT has delivered to these requirements.
Today, due to the demands of a Digital First strategy and Industry 4.0, the need to integrate IT and OT more deeply has become a business strategy, however security is today the greatest concern and challenge to this IT/OT integration effort. Until recently the differences between what IT security could address and what OT integration required meant that the ability to deeply integrate these two, seemingly complementary technologies, was considered too much of a risk to the OT side of things and was often shelved as a project for a later date.
That later date has now arrived! Digital First demands the integration of OT and IT, and the uprising of a new batch of OT-specific malware threats means that whilst the security issue has not gone away, the strategy and approach to dealing with this has changed and, along with the business imperative, the time to act is now.
IDC has been studying this situation for several years and is now providing guidance on why organizations need to accelerate this IT/OT convergence, what are the consideration that need to be taken to secure OT and IT integration.
10:10 - 10:30
(GMT +8)
In recent years, we have seen a rise in the sophistication and quantity of cyber attacks on OT infrastructure. OT is particularly vulnerable as threats from that past that required a physical presence through a USB file transfer (or the like) are now using the power of the combine cyber/physical environments to attack OT equipment. Cybercrime such as Ransomware is becoming more like APT attacks. Advanced, persistent, and targeted in nature. Attackers are spending more time on the weaponization phase of the ATT&CK framework pre-ATT&CK. Many attacks go undetected until ransomware encrypts their systems or the threat actors sell the data on underground markets
In this brief, we will discuss about the most prevalent cyber attacks targeting OT systems in 2022 and show you how to protect your critical infrastructure - securing both modern and legacy equipment – without impacting the safety and uptime goals of the business.
10:30 - 10:50
(GMT +8)
Digital transformation is causing a shift in the risk model for industrial security as the data produced by operations becomes more connected to the internet. With transformation comes gains in efficiency, productivity and new data used to inform decisions. Transformation also increases the number of connected devices, users and applications on the network attracting the attention of the bad actor and expanding the attack surface. During this session, we’ll explore:
- Market trends impacting the risk equation
- Aligning cybersecurity strategy to risk model
- How Key challenges were overcome along the OT Security Journey
10:50 - 11:00
(GMT +8)
Industry 4.0 is a journey for organizations to progressively transform their process and operations to do more with less. While digital transformation has brought tremendous benefits to organizations, the expanded attack surface due to IT/OT convergence has also increased the risks of cyber breaches to OT networks. Compounding the challenges, the point security product deployments and legacy OT systems have led to system complexity, affecting performance and overall security.
In this session, you will learn how Fortinet Security Fabric can simplify your security strategy and improve efficiencies.
11:00 - 11:30
(GMT +8)
As more OT systems get connected to the outside network, the once air-gapped networks are now exposed to cyber attacks. As a result, the industry sectors were seeing a surge in cyber breaches in 2022 as they embark on their Industry 4.0 journey. Based on a recent OT security survey in Asia, it was reported that 9 out of 10 organizations had experienced at least one intrusion last year. Although the maturity level of OT security differs across different industries, one certain thing is that reducing cyber risks is paramount in a Digital-First economy.
During the panel session, the panelists will discuss about best practices of OT security including
- How do organizations define their Industrial 4.0 strategies? Any changes in priorities before and after COVID-19?
- What are the various security considerations when outlining plans for Industrial 4.0?
- How do organizations streamline their processes and team to cover OT security when security was predominately focused only on the IT network previously?
Panel:
Moderator:
11:30 - 12:30
(GMT +8)
Closing Session.
09:25 - 09:30
(GMT +5.30)
09:30 - 09:50
(GMT +5.30)
The increased connectivity of OT systems to the outside world has led to a surge in cyber-attacks across the globe last year. Today, meters, gauges, sensors and control systems from multiple vendors coexist and are all connected to the network, increasing process efficiency and expanding the attack surface. Staying ahead of evolving cyber threats is paramount for an organization’s success. CISOs at top industrial organizations often prioritize cybersecurity as an critical component to their digital transformation plans. During this brief, we will explore best practices pursued by global organizations to reduce cyber risks and improve operational efficiencies including
- Informing decisions with proactive threat intelligence to stay ahead of potential threats
- Establishing network controls to enforce policies for users, devices and applications using segmentation and micro segmentation
- Reducing organization risk with layered defense
09:50 - 10:10
(GMT +5.30)
Late in 2022 IDC predicted that by 2025, 50% of organizations will increase the use of IoT and OT cybersecurity solutions at the edge, cutting OT cybersecurity breaches in half.
Operational Technology (OT) has been evolving since the industrial age began to the extent that some of the most advanced factories today operate with minimal human intervention, allowing the robotic technologies to undertake most, if not all, the manufacturing process. In critical industries such as power generation and distribution, and water treatment and distribution OT has revolutionized how we can access these services with great ease.
Meanwhile the rise of Information Technology (IT) was driven by a need to do business faster, more effectively, at greater scale and with fewer errors and, for the most part, IT has delivered to these requirements.
Today, due to the demands of a Digital First strategy and Industry 4.0, the need to integrate IT and OT more deeply has become a business strategy, however security is today the greatest concern and challenge to this IT/OT integration effort. Until recently the differences between what IT security could address and what OT integration required meant that the ability to deeply integrate these two, seemingly complementary technologies, was considered too much of a risk to the OT side of things and was often shelved as a project for a later date.
That later date has now arrived! Digital First demands the integration of OT and IT, and the uprising of a new batch of OT-specific malware threats means that whilst the security issue has not gone away, the strategy and approach to dealing with this has changed and, along with the business imperative, the time to act is now.
IDC has been studying this situation for several years and is now providing guidance on why organizations need to accelerate this IT/OT convergence, what are the consideration that need to be taken to secure OT and IT integration.
10:10 - 10:30
(GMT +5.30)
In recent years, we have seen a rise in the sophistication and quantity of cyber attacks on OT infrastructure. OT is particularly vulnerable as threats from that past that required a physical presence through a USB file transfer (or the like) are now using the power of the combine cyber/physical environments to attack OT equipment. Cybercrime such as Ransomware is becoming more like APT attacks. Advanced, persistent, and targeted in nature. Attackers are spending more time on the weaponization phase of the ATT&CK framework pre-ATT&CK. Many attacks go undetected until ransomware encrypts their systems or the threat actors sell the data on underground markets
In this brief, we will discuss about the most prevalent cyber attacks targeting OT systems in 2022 and show you how to protect your critical infrastructure - securing both modern and legacy equipment – without impacting the safety and uptime goals of the business.
10:30 - 10:50
(GMT +5.30)
Digital transformation is causing a shift in the risk model for industrial security as the data produced by operations becomes more connected to the internet. With transformation comes gains in efficiency, productivity and new data used to inform decisions. Transformation also increases the number of connected devices, users and applications on the network attracting the attention of the bad actor and expanding the attack surface. During this session, we’ll explore:
- Market trends impacting the risk equation
- Aligning cybersecurity strategy to risk model
- How Key challenges were overcome along the OT Security Journey
10:50 - 11:00
(GMT +5.30)
Industry 4.0 is a journey for organizations to progressively transform their process and operations to do more with less. While digital transformation has brought tremendous benefits to organizations, the expanded attack surface due to IT/OT convergence has also increased the risks of cyber breaches to OT networks. Compounding the challenges, the point security product deployments and legacy OT systems have led to system complexity, affecting performance and overall security.
In this session, you will learn how Fortinet Security Fabric can simplify your security strategy and improve efficiencies.
11:00 - 11:30
(GMT +5.30)
As more OT systems get connected to the outside network, the once air-gapped networks are now exposed to cyber attacks. As a result, the industry sectors were seeing a surge in cyber breaches in 2022 as they embark on their Industry 4.0 journey. Based on a recent OT security survey in Asia, it was reported that 9 out of 10 organizations had experienced at least one intrusion last year. Although the maturity level of OT security differs across different industries, one certain thing is that reducing cyber risks is paramount in a Digital-First economy.
During the panel session, the panelists will discuss about best practices of OT security including
- How do organizations define their Industrial 4.0 strategies? Any changes in priorities before and after COVID-19?
- What are the various security considerations when outlining plans for Industrial 4.0?
- How do organizations streamline their processes and team to cover OT security when security was predominately focused only on the IT network previously?
Panel:
Moderator:
12:00 - 13:00
(GMT +5.30)
Closing Session.
12:25 - 12:30
(GMT +11)
12:30 - 12:50
(GMT +11)
The increased connectivity of OT systems to the outside world has led to a surge in cyber-attacks across the globe last year. Today, meters, gauges, sensors and control systems from multiple vendors coexist and are all connected to the network, increasing process efficiency and expanding the attack surface. Staying ahead of evolving cyber threats is paramount for an organization’s success. CISOs at top industrial organizations often prioritize cybersecurity as an critical component to their digital transformation plans. During this brief, we will explore best practices pursued by global organizations to reduce cyber risks and improve operational efficiencies including
- Informing decisions with proactive threat intelligence to stay ahead of potential threats
- Establishing network controls to enforce policies for users, devices and applications using segmentation and micro segmentation
- Reducing organization risk with layered defense
12:50 - 01:10
(GMT +11)
Late in 2022 IDC predicted that by 2025, 50% of organizations will increase the use of IoT and OT cybersecurity solutions at the edge, cutting OT cybersecurity breaches in half.
Operational Technology (OT) has been evolving since the industrial age began to the extent that some of the most advanced factories today operate with minimal human intervention, allowing the robotic technologies to undertake most, if not all, the manufacturing process. In critical industries such as power generation and distribution, and water treatment and distribution OT has revolutionized how we can access these services with great ease.
Meanwhile the rise of Information Technology (IT) was driven by a need to do business faster, more effectively, at greater scale and with fewer errors and, for the most part, IT has delivered to these requirements.
Today, due to the demands of a Digital First strategy and Industry 4.0, the need to integrate IT and OT more deeply has become a business strategy, however security is today the greatest concern and challenge to this IT/OT integration effort. Until recently the differences between what IT security could address and what OT integration required meant that the ability to deeply integrate these two, seemingly complementary technologies, was considered too much of a risk to the OT side of things and was often shelved as a project for a later date.
That later date has now arrived! Digital First demands the integration of OT and IT, and the uprising of a new batch of OT-specific malware threats means that whilst the security issue has not gone away, the strategy and approach to dealing with this has changed and, along with the business imperative, the time to act is now.
IDC has been studying this situation for several years and is now providing guidance on why organizations need to accelerate this IT/OT convergence, what are the consideration that need to be taken to secure OT and IT integration.
01:10 - 01:30
(GMT +11)
In recent years, we have seen a rise in the sophistication and quantity of cyber attacks on OT infrastructure. OT is particularly vulnerable as threats from that past that required a physical presence through a USB file transfer (or the like) are now using the power of the combine cyber/physical environments to attack OT equipment. Cybercrime such as Ransomware is becoming more like APT attacks. Advanced, persistent, and targeted in nature. Attackers are spending more time on the weaponization phase of the ATT&CK framework pre-ATT&CK. Many attacks go undetected until ransomware encrypts their systems or the threat actors sell the data on underground markets
In this brief, we will discuss about the most prevalent cyber attacks targeting OT systems in 2022 and show you how to protect your critical infrastructure - securing both modern and legacy equipment – without impacting the safety and uptime goals of the business.
01:30 - 01:50
(GMT +11)
Digital transformation is causing a shift in the risk model for industrial security as the data produced by operations becomes more connected to the internet. With transformation comes gains in efficiency, productivity and new data used to inform decisions. Transformation also increases the number of connected devices, users and applications on the network attracting the attention of the bad actor and expanding the attack surface. During this session, we’ll explore:
- Market trends impacting the risk equation
- Aligning cybersecurity strategy to risk model
- How Key challenges were overcome along the OT Security Journey
01:50 - 02:00
(GMT +11)
Industry 4.0 is a journey for organizations to progressively transform their process and operations to do more with less. While digital transformation has brought tremendous benefits to organizations, the expanded attack surface due to IT/OT convergence has also increased the risks of cyber breaches to OT networks. Compounding the challenges, the point security product deployments and legacy OT systems have led to system complexity, affecting performance and overall security.
In this session, you will learn how Fortinet Security Fabric can simplify your security strategy and improve efficiencies.
02:00 - 02:30
(GMT +11)
As more OT systems get connected to the outside network, the once air-gapped networks are now exposed to cyber attacks. As a result, the industry sectors were seeing a surge in cyber breaches in 2022 as they embark on their Industry 4.0 journey. Based on a recent OT security survey in Asia, it was reported that 9 out of 10 organizations had experienced at least one intrusion last year. Although the maturity level of OT security differs across different industries, one certain thing is that reducing cyber risks is paramount in a Digital-First economy.
During the panel session, the panelists will discuss about best practices of OT security including
- How do organizations define their Industrial 4.0 strategies? Any changes in priorities before and after COVID-19?
- What are the various security considerations when outlining plans for Industrial 4.0?
- How do organizations streamline their processes and team to cover OT security when security was predominately focused only on the IT network previously?
Panel:
Moderator:
02:30 - 03:30
(GMT +11)
Closing Session.
2022 Event Statistics
3500+ Registrants
1900+ Attendees
40+ Industries
60+ Countries
Industries including: Oil & Gas, Power & Utilities, Renewable Energy, Critical Infrastructures, Government, Rail, Pharma, Manufacturing, Life Sciences, and High Tech...
Event Participants