Featured
Analyzing the Latest Trends and Risks in Cybersecurity for OT Systems
Featuring speakers from Fortinet, Rockwell Automation, ServiceNow and Armis
In recent years, businesses have gained transformative new capabilities by introducing the latest digital technologies to their OT environments. But increasing network connectivity also brings greater complexity to OT Security.
The 2024 State of Operational Technology and Cybersecurity Report shows that OT security postures are starting to mature at many organizations. But there’s still more work to be done to keep pace with the volume and sophistication of cyberattacks that specifically target OT systems.
Our panel of experts take a deep dive into the findings of this year’s report to discuss:
- An analysis of the spike in OT intrusions as well as the worsened outcomes seen post-attack
- Why responsibility for OT Security being elevated to executive leadership levels rank as a significant trend
- The key areas where OT Security postures are showing signs of maturity, as well as the areas that still need more attention
- This year’s five best practices and tips for improving the protection of OT systems
All episodes
-
Building Cyber Resilience in the Power & Utilities Industry
Claudia Glover, Tech Monitor; Agustin Valencia, Fortinet; Swantje Westpfahl, Institute for Security and Safety
State-sponsored threat actors, financially motivated cyber criminals, and amateur hackers will continue to be enticed by the massive impact that can result from an attack on a nation’s critical infrastructure. The risk of a successful attack could be severe — damaged power grids could leave cities in the dark, or even put lives at risk.
A recent study shows that attacks against energy utilities are among the top three most targeted sectors for cyberattacks in the United States. In addition, Europe, Australia, and Japan have reported an increase in threats against critical infrastructure. The threat is global and the risk alarming.
This exclusive Tech Monitor webinar, in association with Fortinet, will dissect the strategies security leaders can adopt to thwart these malicious attacks and stay ahead of the hackers, as well as the suite of integrated and automated technologies available to them.
Questions for discussion include:
- What are the main cybersecurity challenges facing the power and utilities sector right now? What is the current threat landscape?
- How is the ongoing modernisation of Critical Infrastructures impacting on the threat landscape?
- What strategies are security leaders adopting to effectively combat cyber-attacks? What innovative technologies are available to them?
- To what extent must technology be paired with business strategy? What must be considered to ensure you receive buy-in from the board?Speakers:
Claudia Glover, Senior Reporter, Tech Monitor
Agustin Valencia, OT Business Development Manager (BDM), Fortinet
Swantje Westpfahl, Director (CEO) of the Institute for Security and Safety -
NextGen OT Cybersecurity for Regulatory Compliance Success
Antoine D’Haussy, OT Security Practice Head EMEA, Fortinet; Jeff Foley, Chief Technology Evangelist of Cybersecurity, Siemens
NextGen OT Cybersecurity for Regulatory Compliance Success with Fortinet and Siemens.
The OT threat landscape is evolving at a rapid rate. OT asset owners and operators who are responsible for keeping critical infrastructures operational are facing numerous and complex cyber threats. With new compliance requirements, budget restrictions and an ever-expanding attack surface, organizations need integrated and orchestrated tools to secure critical infrastructures efficiently. This joint Siemens and Fortinet webinar will look at real-world implementations and address the following areas:
- OT threat landscape evolution
- Defense in Depth concepts and compliance mapping to OT standards
- Siemens Ruggedcom with Fortinet integration evolutions
- What a successful deployment of OT cybersecurity looks like -
The State of OT and Cybersecurity 2023 Research Findings
Richard Springer, Fortinet; Brian Dunphy, Claroty, Steven Webb, Westlands Advisory
OT continues to be a target by cybercriminals at a high rate. In fact, a recent study reveals that 75% of OT organizations experienced at least one intrusion in the last year. The research revealed nearly one-third of respondents reported being victims of a ransomware attack in the last year (32%, unchanged from 2022).
To tackle common OT security challenges, industrial organizations can reduce complexity by adopting a cybersecurity platform strategy. Listen in as a panel of operational technology leaders unpack the key findings of The 2023 State of Operational Technology and Cybersecurity Report. The panel will explore the impact on industrial asset owners and operators as physical and cyber processes converge.
Speakers:
- Richard Springer, Product Marketing Director, OT Solutions, Fortinet
- Brian Dunphy, VP of Product Management, Claroty
- Steven Webb, Managing Partner, Westlands Advisory -
The Power of Tech Integration for Advanced OT Threat Detection and Response
Phil Page, Dir. of BD & Partner Technologies, Nozomi Networks; Dino-Boris Dougoud, CSE OT EMEA, Fortinet
As the OT threat landscape continues to evolve, staying ahead of potential cyberattacks is crucial. Learn how the easy-to-implement technical integration of Nozomi Networks and Fortinet can enhance your organization’s security posture and proactively defend your OT environment against emerging threats.
Join our technical experts as they discuss the latest integration to:
- Visualize, detect and respond to threats by leveraging ICS IDS, NGFW, NAC, and SIEM integration
- Design network security architecture that maximizes effectiveness and optimizes total cost of ownership (TCO)
- Learn about real-world implementations of Nozomi Networks and Fortinet integrated solutions in diverse OT environments -
Threat Intelligence Roundup: Emerging Threats Impacting Operational Technology
Geri Révay, Security Researcher at Fortiguard Labs, Fortinet
Industrial organizations are on alert as bad actors see critical infrastructure as low hanging fruit for attack. Ransomware variants, phishing emails, wiper malware and more show up as tactics used to disrupt operational environments. As digital transformation increases the number of users, devices and applications connecting to the network. This has increased the number of staff accessing critical infrastructure like meters, sensors and control systems from their remote offices. For many organizations, this positively affects efficiency. It has also increased risk and elevated the importance of a cyber-readiness plan for industrial organizations.
During this webinar, security strategist Geri Révay will discuss the:
- Ransomware tools and techniques used to disrupt critical infrastructure including ransomware-as-a-service
- Common tactics targeting remote access to critical infrastructure and the protection needed to prevent unauthorized access to your most critical systems
- Benefits of using threat intelligence to improve situational awareness on known and unknown threats to enable identification, relevance, response and patching as necessary. -
Is Zero Trust Right for OT, Right Now?
Brian Wrozek, Principal Analyst, Forrester; Fortinet's Rich Springer and Eric Schwake
Digital transformation has allowed businesses of all varieties to expand and take advantage of connectivity and remote access, with OT environments included. The difference for OT versus the masses - many previously air-gapped systems are colliding with the internet creating security and production risks, exposing vulnerabilities and creating opportunities for bad actors.
So, what happens with this absolute need to shift from a legacy implied trust model to a Zero Trust model? And how can this be implemented seamlessly across and within critical infrastructures?
We encourage you to join this timely and intuitive discussion with our special guest from Forrester providing an analyst perspective on Zero Trust trends, what to pay attention to and the short- and long-term value. Plus, a unique perspective from both parties on:
• Common misconceptions of Zero Trust in OT
• Key criteria and strategies for approaching Zero Trust implementation
• Aspects of successfully deploying Zero Trust in OT environmentsSpeakers:
Brian Wrozek Principal Analyst, Forrester
Rich Springer Director Marketing of OT Solutions, Fortinet
Eric Schwake Director of Product Marketing, Fortinet -
Key OT Trends and Challenges and How to Respond to Them
Fortinet OT Experts: Antoine D'Haussy, Daniele Mancini, Ronen Shpirer
OT assets owners, vendors, and the larger OT ecosystem is evolving at an ever-increasing pace. Convergence, advanced wireless, the sustainability journey, the threat landscape, and changing regulation are all at play.
This session will focus on determining the cybersecurity impact and what is needed to be able to securely enable your OT evolution?Speaker:
Antoine D'Haussy, OT Security Practice Head EMEA
Daniele Mancini, EMEA Field CISO
Ronen Shpirer, Director, Telco Solutions Marketing -
Threat-Informed Defense for Industrial Control Systems
Derek Manky, Global VP Threat Intelligence, Fortinet
As digital transformation grows, so does the number of users, devices and applications connected across the operational technology, information technology, and cloud domains. This increases the number of remote users accessing critical systems like meters, sensors, and industrial control systems.
During this session, we will look at the:
- Threat landscape of increased cyber risk
- Threats impacting critical infrastructure organizations
- Value of a threat-informed defense strategy for securing -
Unified SASE for OT Asset Owners
Antoine d'Haussy, EMEA OT Head of Practice & Daniele Mancini, EMEA Field CISO, Fortinet
OT asset owners and vendors drive innovation and enable increased efficiency, lower cost of ownership and a better ROI through adoption of various cutting-edge technologies. Cybersecurity is no different.
This session will introduce Fortinet’s SASE solution and how it enables a wide breath of dynamic cybersecurity capabilities in an OT ecosystem with simplicity, flexibility, and cost effectiveness.
-
OT Risk Management and NIS2 Compliance
Fortinet OT Experts: Antoine D'Haussy, OT Security Practice Head EMEA & Daniele Mancini, EMEA Field CISO
With the NIS directive being enforced in all EU countries and its version 2 taking effect on October 2024, Information Sharing and Cyber Risk Management in compliance with OT cybersecurity frameworks are critical for Critical Infrastructures across several industrial vertical. This session will look at what does this directive mean for asset owners, and what is needed to get ready to comply?
-
Network and Micro-Segmentation with Schneider Electric & Fortinet
John Maddison, CMO, Fortinet & Jay Adballah, VP of Cybersecurity Solutions, Schneider Electric
In this session, Schneider Electric discusses how they prioritize security with their client installs, specifically using the Fortinet Security Fabric for network segmentation and micro segmentation to secure connectivity, data integrity, and industrial controls.
-
Cybersecurity at the Edge for OT LAN and Edge Networks
Rod Locke, Director of Product Management, Fortinet
Industrial asset owners experience unique challenges and security considerations when securing their network perimeter, focusing on OT LAN and Edge Networks. Want to learn about threats and vulnerabilities affecting critical networks, along with mitigation strategies?
This session will explore:
- Fortinet’s Security Fabric Platform approach for integrated security management of the LAN and Edge Networks in OT
- The benefits of a unified approach for configuration, maintenance, and security operations
- LAN Edge and SASE extensions, highlighting how these enable the extension of unified security across the smallest and most remote sites. -
Fortifying Operational Technology with SANS Institute
Jason Dely, Certified Instructor, SANS
During this keynote, Jason Dely will explore how organisations can evaluate tools to properly assess cyber risk posture and effectively prioritize the most pressing vulnerabilities to safeguard operations and productions.
- Learn about how critical infrastructures rely on ICS and OT for uninterrupted services, and the impact of these technologies on a nation's economy
- Discover the security gaps and technological flaws in critical infrastructures
- Gain knowledge on implementing comprehensive risk management strategies -
The Imperative for an Integrated NOC/SOC Approach
Aasef Iqbal, Senior Director of Product Management, Fortinet
In the face of continually evolving cyber threats, organizations are compelled to adopt a unified and integrated approach to network operations centers (NOC) and security operations centers (SOC).
This session explores the need for synergy between NOC and SOC functions in response to the dynamic nature of modern cyber threats. By examining the challenges posed by siloed operations, the session sheds light on the benefits and strategic advantages of fostering collaboration and integration between NOC and SOC teams across IT and OT environments.
Aasef will share insights into how Fortinet’s Security Fabric Platform approach enhances threat detection, incident response, compliance assurance, and overall organizational resilience while lowering the total cost of ownership for SecOps infrastructure.
-
Can You Secure OT Without SASE?
Daniele Mancini, EMEA Field CISO, Fortinet; Ricardo Ferreira, EMEA Field CISO, Fortinet
Building a Comprehensive and Resilient OT Cybersecurity Strategy
OT asset owners need a comprehensive Cybersecurity strategy that includes threat detection, response, and recovery mechanisms customized to the specific needs of OT environments.
In this webinar, we will examine the role of SASE & Security Operations for OT, including:
- The complexities, advantages, and strategic ramifications asset owners need to consider
- How OT organizations can deliver an all-encompassing, adaptable, and effective security solution for distributed, Cloud-oriented IT and OT environments
- How to avoid common pitfalls in the implementation these solutions to maximize efficacy and success -
What the O-PAS Standard means for Oil & Gas
Aasef Iqbal, Sr. Director, Product Management, Fortinet; Rod Locke, Director of Product Management, Fortinet
The Open Process Automation Forum (OPAF) has defined an open, interoperable, and secure architecture for the process automation industry, using existing and emerging standards – a standard of standards, O-PAS. The oil and gas industry has embraced the standard to support open and secure implementation of their operational technology infrastructure. During this webinar, we will dive into the standard, its history, and how the Fortinet OT Security Platform can enable cybersecurity across O-PAS. During this session you will learn about:
- What’s OPAF – OPAS?
- O-PAS Security Requirements
- O-PAS and IEC 62443
- Security Certification Requirements for Vendors
- Example Security Implementation
- Where Fortinet Can Help? -
A(I)-Z in Automotive: How Big Technology is helping drive into the new era
Daniele Mancini, EMEA Field CISO, Fortinet; Isobel Bowdery, Vertical Marketing Manager, Fortinet
A(I)-Z in Automotive: How Big Technology is helping drive into the new era - will feature Daniele Mancini, EMEA Field CISO, who will discuss about how Artificial intelligence (AI) is taking the world by storm and the automotive sector is no exception.
-
Accelerating towards the Future of Automotive Cloud
Isobel Bowdery, Vertical Marketing Manager, Fortinet; Sherelle Farrington, Solutions Marketing – Cloud (EMEA), Fortinet
In the session Accelerating towards the Future of Automotive Cloud you will hear about the role that cloud plays in automotive and what should automotive organizations prioritize when it comes to cloud security.
-
OT Security: It Takes A Platform
Richard Springer, Director Marketing, OT Solutions, Fortinet; Rod Locke, Director of Product Management, Fortinet
It Takes a Platform: Securing Cyber-Physical Systems with the Fortinet Security Fabric OT Security Platform
The Fortinet OT Security Platform provides a broad, integrated, and automated platform addressing the challenges of IT-OT convergence and tailored to the constraints found in OT and IT.
Solutions to convergence challenges include:
- Customizing products to unique OT environmental conditions, such as rugged firewalls and switches
- Advanced threat protection offerings including endpoint protection, deception, sandboxing
- SecOps tools that can scale across IT and OT -
Optimizing Operational Technology in Automotive
Isobel Bowdery, Vertical Marketing Manager, Fortinet & Richard Springer, Director Marketing, OT Solutions, Fortinet
Automotive is increasingly connected. Legacy technology in the automotive industry has proven to be durable, but this durability has become a security risk in today’s connected world. Listen to Richard Springer, Operational Technology director as he discusses all things automotive.
-
Safe and Secure Connectivity on the Move with FortiExtender Vehicle
Rod Locke, Director of Product Management Fortinet; Pat Vitalone, Director, Product Marketing Fortinet
From first responders to transit and logistics, connected fleets have become the new normal. But when adding point connectivity solutions that are not integrated with the rest of the network or security, fleets are forced into an operational silo, which creates complexity and risk. This makes it tough for IT and OT teams to manage and ensure secure connectivity in company vehicles. To be secure and efficient, connectivity for fleets must be part of a unified platform that integrates with other network components, such as back office systems, security, OT and IoT, and wireless access.
This webinar will take a detailed look at how FortiExtender Vehicle provides secure and reliable connectivity and opportunities for securing vehicles including:
- Uninterrupted network access for fleets, emergency vehicles and public service vehicles
- Optimized operations and overall efficiency extending wireless connectivity to vehicles and industrial applications
- Improve safety offering secure WAN, Wi-Fi and LTE connectivity for industrial and operational applications in rugged environments -
Analyzing the Latest Trends and Risks in Cybersecurity for OT Systems
Featuring speakers from Fortinet, Rockwell Automation, ServiceNow and Armis
In recent years, businesses have gained transformative new capabilities by introducing the latest digital technologies to their OT environments. But increasing network connectivity also brings greater complexity to OT Security.
The 2024 State of Operational Technology and Cybersecurity Report shows that OT security postures are starting to mature at many organizations. But there’s still more work to be done to keep pace with the volume and sophistication of cyberattacks that specifically target OT systems.
Our panel of experts take a deep dive into the findings of this year’s report to discuss:
- An analysis of the spike in OT intrusions as well as the worsened outcomes seen post-attack
- Why responsibility for OT Security being elevated to executive leadership levels rank as a significant trend
- The key areas where OT Security postures are showing signs of maturity, as well as the areas that still need more attention
- This year’s five best practices and tips for improving the protection of OT systems