Best Practices in Securing Operational Technology

FEATURED SPEAKER

Ali Aziz

CISO at nemlig.com

AGENDA OF THE EVENT

Operational Technology (OT) has become a critical frontier in cybersecurity. As digital transformation continues to accelerate, the integration of IT and OT systems exposes new vulnerabilities that attackers are eager to exploit. From manufacturing floors to logistics operations, these systems are often the backbone of business operations- and an attractive target for the bad actors, who seek to disrupt, extort, or sabotage.

This provides you with an opportunity to engage with CISO’s, top cybersecurity leaders and peers to explore the pressing risks and mitigation in OT security. With insights from industry experts, including our keynote speaker from nemlig.com, and our partner Fortinet, we aim to unpack this issue collectively, focusing on experience driven and actionable insights.

09.00 - 09.40

Welcome and breakfast

09.40 - 09:45

Iouri Engberg

Community Director at twoHundred

Welcome by twoHundred

09.45 - 10.45

Ali Aziz

CISO at nemlig.com

To set the tone for the day Ali will address the topic from the lens of nemlig.com as well as providing a broader perspective, including the following elements:

-Practical attack scenarios: attack chains relevant to OT environments, showcasing how vulnerabilities are exploited.
-Impact and consequences: potential business, operational, and reputational impacts of successful OT attacks.
-Actionable Recommendations: high-level advice and practical steps organizations can take to OT security and mitigate risks.

10.50 - 11.50

Group discussion hosted by Fortinet

11.50 - 12:00

Iouri Engberg

Community Director at twoHundred

Summary and thanks for today!

09.00 - 09.40

Welcome and breakfast

09.40 - 09:45

Iouri Engberg

Community Director at twoHundred

Welcome by twoHundred

09.45 - 10.45

Ali Aziz

CISO at nemlig.com

To set the tone for the day Ali will address the topic from the lens of nemlig.com as well as providing a broader perspective, including the following elements:

-Practical attack scenarios: attack chains relevant to OT environments, showcasing how vulnerabilities are exploited.
-Impact and consequences: potential business, operational, and reputational impacts of successful OT attacks.
-Actionable Recommendations: high-level advice and practical steps organizations can take to OT security and mitigate risks.

10.50 - 11.50

Group discussion hosted by Fortinet

11.50 - 12:00

Iouri Engberg

Community Director at twoHundred

Summary and thanks for today!

EVENT PARTNER

OTHER UPCOMING EVENTS

PAST EVENTS