Abstract
Operational Technology has moved from isolated industrial networks to interconnected cyber-physical ecosystems, driven by digitization, remote operations and IT-OT convergence. This shift has expanded the attack surface dramatically where malware, ransomware, supply chain compromise and even misconfigurations can translate into physical disruption, safety risks and prolonged downtime. For enterprise CISOs, the challenge is no longer only about detecting threats but designing architectures that remain resilient when prevention fails.
This session will cover: Deploying passive monitoring and anomaly detection in live OT environments; Zero Trust in OT: Adapting Principles for Cyber-Physical Systems; Architecting for Defense: Segmentation and Network Design.