OT security
Tuesday 17 December 2024

DESCRIPTION

In an era where operational technology (OT) is crucial to critical infrastructure and industrial processes, and where threats and challenges are constantly evolving, the question becomes increasingly vital: how do you build a robust and secure OT environment designed for resilience and growth?

Plenary program

  • Setting the scene: Operational technology (OT) is transforming industries by enabling automation and real-time data sharing, but the convergence of OT and IT also introduces new vulnerabilities. As threats grow more complex, industries must prioritize both innovation and robust security to ensure their critical infrastructure remains resilient and secure. What are the current trends and challenges in OT security – and how do we build robust and secure OT environments, designed for resilience and growth? CISO Platform board member Justin Broeders sets the scene for the OT Security workshop.
  • Inside information: Kirsten Dijkhuizen-Meeuwisse, CISO of Rijkswaterstaat, shares her experience with addressing OT security challenges, providing a unique opportunity to learn from an insider who deals with these issues daily.
  • Interactive panel discussion: Together with experts and thought leaders, we will discuss the future of OT security. By bringing different perspectives to the table and providing the opportunity to ask questions, we aim to engage in an insightful discussion on the trends and challenges of OT security.

Break-out sessions:

  1. The challenges of connecting IT & OT

As IT and OT systems become increasingly interconnected, organizations face new security challenges. During this breakout session, we will discuss how companies can coordinate their efforts to ensure security and mitigate vulnerabilities. We will discuss practical examples and solutions to strengthen collaboration between IT and OT teams.

  1. Are you prepared for NIS2? Risk management and compliance in OT security

The introduction of NIS2 and other essential regulations pose many questions for organizations with OT.  In this session, we will cover those regulations and discuss how companies can align their security practices with enterprise risk management strategies. Practical advice on managing compliance and demonstrating compliance with these evolving standards will also be covered.

  1. Learning from real-world cyber-attacks: threat detection and incident response in OT environments

As cyber threats keep evolving, advanced detection techniques and robust incident response plans must also be continuously assessed. In this session, we will discuss using behavioral analytics, anomaly detection, and other tools to identify threats early. Additionally, discussions will focus on creating incident response plans specifically tailored to OT systems and learning from recent, real-world cyber incidents.

  1. Building resilience and ensuring business continuity in OT environments

Businesses need to ensure that operations continue to run, even if things go wrong. We will discuss how organizations can build resilience and plan for a rapid and effective return to normal. In this session, we will share experiences and best practices to gain valuable insights.

 

Please note that the exact details of this workshop are subject to change. Changes may be made to speakers and content to improve your experience.

REGISTRATION

Register for one or more workshops

PROGRAM

  • Welcome
  • Plenary program
  • Break
  • Break-out session(s)
  • Drinks

SPEAKER(S)

Justin Broeders

Justin Broeders

CISO - Ministry of Finance

Kirsten Dijkhuizen- Meeuwisse

Kirsten Dijkhuizen- Meeuwisse

CISO - Rijkswaterstaat