Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of Rhebo GmbH
IT Security Talks Stream I

Risks in OT: results from OT monitoring and vulnerability assessments

The presentation by Rhebo and telent will cover cyber security in OT networks: Top 10 risks, IT-SiG 2.0 and practical insights.

calendar_today Tue, 11.06.2024, 14:30 - 15:00

event_available Digital

Action Video


Action description





Legislation, standards, regulations Industry 4.0 / IoT / Edge Computing SIEM / Threat Analytics / SOC Trend topic

Key Facts

  • OT Security
  • SOC
  • System for attack detection



This action is part of the event IT Security Talks

Action Video

grafischer Background

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

The presentation is a cooperation between Rhebo, a provider of an attack detection system for OT networks, telent, a provider of technology solutions and services in the field of critical infrastructures (KRITIS), and a German energy supply company (naming is currently under discussion).
The presentation is dedicated to the challenge of cyber security in industrial networks from practice for practice. Two levels will be highlighted in particular:
What risks and vulnerabilities are found in OT networks in the first place? The top 10 findings are categorised in terms of their criticality and prevalence and evaluated in the context of network structures. All data comes from over two dozen risk analyses and vulnerability assessments carried out by Rhebo in the operational technology of KRITIS and industrial companies in 2023.
What does a holistic cyber security structure according to IT-SiG 2.0 look like? This case study explains the steps and experiences of a German energy supply company towards an efficient security architecture across the entire distributed infrastructure. The focus here is on the question of how the requirements of the BSI guidance for ‘attack detection systems’ can be sensibly implemented.

The audience will gain a practice-based insight into the real risk exposure of many OT networks and learn lessons from successful OT security projects in KRITIS companies.

The presentation is aimed at security officers of industrial companies for whom OT security represents a new challenge, as well as managing directors who want to ensure legal compliance with existing (IT-SiG 2.0) and upcoming (NIS2) regulations as part of their operator responsibility. 

... read more

Language: German

Questions and Answers: Yes


show more

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.