As organizations digitally transform, they must also undergo a security transformation to protect against evolving and advanced cyber threats. Awareness of any device, anywhere on the network and determining the degree of trust is the first best practice for improving an organization’s OT security posture. Trust is no longer implicit for users, applications, or devices attempting to access the network. 

Attackers, once on target, move north-south and east-west to assess and determine their next play. Network segmentation limits an attackers movement dynamically controlling their access based on business intent, behavior, and risk. As you gain visibility and control, it is valuable to leverage the data being collected for continuous analysis, learning what, where, when, who, how the users, devices and applications are behaving on the network. This insight leads to actionable intelligence used to improve efficiencies, create competitive advantage, enforce policies and detect known and unknown threats.  

Key take-aways from this presentation include:

• Visibility — The importance of clear visibility to all devices, users, and applications on the network. Do you know what is on the network, what it is doing, should it be doing that?

• Control — Enhanced OT network and asset threat contextual information.

• Analytics — Centralized visibility, correlation, and automated response and remediation. Safe, secure and reliable operations in large, complex industrial networks with strengthened IT, OT, and IoT security.

Attendees are eligible to receive 1 CPE credit.

Generously supported by:

Speakers
speaker photo
Christopher Blauvelt
Director, Operational Technology, Fortinet

Chris brings more than 10 years of cybersecurity and critical infrastructure experience working in the renewable energy industry.  He was directly involved in the development, construction, and operations of wind and solar power plants and their high voltage systems. His work within the energy and utility industry has also afforded him experience in the development and maintenance of substation protection, automation, and control systems. Chris has a master’s degree in electrical engineering from Clarkson University with thesis work in substation protection, automation, and control involving the IEC61850 family of protocols.  When he is not working, Chris enjoys hobby electronics and spending time in the outdoors.

speaker photo
Ryan Bowery
Principal Solutions Engineer, Claroty

Ryan Bowery is a Principal Solutions Engineer with extensive hands-on experience implementing, advising and providing thought leadership on Industrial Cybersecurity in OT and ICS environments such as Petro Chemical, Manufacturing, Food & Bev, Automotive, etc. Ryan helps companies reveal, protect, and manage their OT, IoT, IIoT and XIoT assets to provide visibility, threat detection, risk and vulnerability management, and secure remote access.

Moderator
speaker photo
Tom Bechtold
Digital Event Director, SecureWorld

Tom has been part of the SecureWorld team for over 14 years. He has launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the Remote Sessions webcasts while also working closely with the SecureWorld event directors to build relevant agendas at the regional conferences.