This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of fernao magellan GmbH
Forums it-sa Expo Knowledge Forum A

OT security and vulnerability management: in a two-pack!

OT Security & Vulnerability Management – ​​discover and resolve vulnerabilities, cyber security strategies for digital transformation

calendar_today Tue, 22.10.2024, 09:45 - 10:00

event_available On site

place Forum, Booth 6-215

Action description

south_east

Speaker

south_east

Themes

Industry 4.0 / IoT / Edge Computing Managed Security Services / Hosting

Key Facts

  • Find and eliminate weak points#OT Security in the wake of advancing digitalization#Your cyber security strategy

Event

This action is part of the event Forums it-sa Expo

Action description

The lecture “OT Security & Vulnerability Management in a Double Pack” deals with the central challenges and solutions in the area of cybersecurity, i.e. classic IT, as well as the subject area of Operational Technology (OT). In an increasingly digitalized world, in addition to common IT systems, industrial control systems and critical infrastructures are increasingly exposed to cyber threats. Attackers make no distinction between vulnerabilities in IT or OT environments and exploit them to achieve their goals. This is why weak points in IT and OT systems must be identified and neutralized in a timely manner.

Only in a collaborative approach can the security risk be reduced.

- Find and eliminate weak points - 

The lecture focuses on identifying and resolving vulnerabilities in IT and OT systems. It quickly shows how companies can systematically uncover vulnerabilities in their networks. Which typical vulnerabilities are exploited by attackers and what measures are required to close these gaps. Proven and latest methods, technologies and fully managed services are discussed that help companies improve both their IT and OT security and protect their networks as a whole.


- OT Security in the wake of advancing digitalization - 

Advancing digitalization (Industry 4.0) brings advantages, but also considerable risks for OT security. The increasing connection of OT environments with IT networks opens up new attack vectors. The lecture highlights the challenges of IT-OT convergence and how these can be mastered through targeted security strategies. It explains how companies can build a robust OT security architecture and optimize collaboration between IT and OT teams to achieve shared security goals.


- Your cybersecurity strategy - 

Finally, approaches to an effective cybersecurity strategy for IT and OT environments are provided. Technical and organizational aspects are taken into account equally. Participants will learn how to tailor cybersecurity measures to the specific requirements of their systems. Topics such as risk analysis, continuous monitoring, incident response and the integration of security guidelines into everyday operations are taught in a practical manner. It also shows how companies can continually improve their cyber defenses to protect themselves against future threats.

This lecture is aimed at IT and OT managers, security officers and managers who want to secure their OT systems against growing threats.
... read more

Language: German

Questions and Answers: No

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.