Cyber Summit – Bridging IT & OT Security was a virtual event with a comprehensive range of information, networking opportunities and a broad transfer of knowledge on IT and OT security topics. The focus was on relevant cybersecurity services and solutions around OT security and topics such as convergence to IT, anomalies in the OT network or securing access. As a viewer, you have gained an insight into the various concepts and providers on the market.Â
Experts Who Were Part Of The Event
Get Access to the Presentations
benefit from the know-how of our experts
Our Speakers
Risk minimization through OT Managed Industrial Security Services
Orange Cyberdefense offers dedicated OT Managed Industrial Security Services to protect against cyber threats in industrial environments. By transforming data into meaningful information, our services maximize the analysis of OT network traffic to minimize risks.
Orange Cyberdefense offers dedicated OT Managed Industrial Security Services to protect against cyber threats in industrial environments. By transforming data into meaningful information, our services maximize the analysis of OT network traffic to minimize risks.
The effective bridging of IT and OT security within a SOC - a true story
In the presentation, Alexander Schmidt will talk about how Obrela can deliver much-needed convergence between IT and OT operations using its proprietary platform.
In the presentation, Alexander Schmidt will talk about how Obrela can deliver much-needed convergence between IT and OT operations using its proprietary platform.
Effective handling of OT cyber risks
Dragos' ICS/OT cybersecurity experts will show you how to run your KRITIS company or production operation successfully and efficiently in an increasingly networked age, take compliance requirements into account and avoid becoming an easy target for cyber attacks.
Dragos' ICS/OT cybersecurity experts will show you how to run your KRITIS company or production operation successfully and efficiently in an increasingly networked age, take compliance requirements into account and avoid becoming an easy target for cyber attacks.
Implementation of an OT cybersecurity program
Through a case study, you will learn how Dragos supports companies in the introduction and implementation of an OT cybersecurity program with solutions and threat intelligence tailored to customer requirements. solutions, services and threat intelligence tailored to customer requirements.
Through a case study, you will learn how Dragos supports companies in the introduction and implementation of an OT cybersecurity program with solutions and threat intelligence tailored to customer requirements. solutions, services and threat intelligence tailored to customer requirements.
Managed IT/OT security from TEHTRIS using the example of a KRITIS customer
Using the example of a critical IT/OT infrastructure, we will show you how to set up a central managed security solution (based on XDR, EDR, SIEM, NTA). Finally, we look at the added value in terms of resources and compliance (e.g. BSI SZA, B3S, ISO 27001, TISAX,...).
Using the example of a critical IT/OT infrastructure, we will show you how to set up a central managed security solution (based on XDR, EDR, SIEM, NTA). Finally, we look at the added value in terms of resources and compliance (e.g. BSI SZA, B3S, ISO 27001, TISAX,...).
IT & OT - OT Security in a Cyber Defense Center
Join our specialist in the search for attackers in OT environments and gain insights into the structure, development and under-the-hood view of the OT security environment.
Join our specialist in the search for attackers in OT environments and gain insights into the structure, development and under-the-hood view of the OT security environment.
Theresa MeiksnerCANCOM
Previous
Next