European OT Cybersecurity Workshop

13-15
juni
Datum:
13 juni 2023 - 15 juni 2023
Tijd:
18:00 - 18:00 hrs
Locatie:
The Hague Marriott Hotel 30 Johan de Wittlaan 2517 JR Den Haag
Georganiseerd door:
Booz Allen Hamilton

Join your peers and the Global Information Sharing and Analysis Center (ISAC) communities at this invite-only, peer-sharing workshop for a series of discussions that will cover the entire OT cybersecurity journey, from building a business case to ENABLE your OT cybersecurity strategy and roadmap, to learning about best practices and technical innovations to IDENTIFY risks, PROTECT your OT environment, and DETECT potential security threats. Finally, we’ll walk through an OT cybersecurity incident response scenario to practice how to RESPOND and RECOVER from an IT/OT cybersecurity event.

  • June 13th - Networking Dinner
  • June 14th - Full-Day Program with an Evening Reception
  • June 15th - Full-Day Program including OT Incident Response Scenario Tabletop exercise

 

Peer-sharing workshops are excellent networking opportunities to hear best practices and lessons learned from peers facing similar issues in other industries. Please remember that effective OT Community sharing takes people from OT, IT, InfoSec, Engineering, and the Business, so please share this registration site with colleagues who will enhance the conversation. Chatham House Rule governs the sharing, there are no vendors or press, and no one will try to sell you anything.

Note: Chatham House Rule helps create a trusted environment to understand and resolve complex problems. The guiding spirit is to share the information you receive but not reveal the identity of who said it.

 

ENABLE

  • Building the Business Case for OT Cybersecurity Transformation

IDENTIFY

  • Best Practices in Building a Comprehensive OT Inventory
  • Managing Supply Chain and Third Party Risk

PROTECT

  • Defense-in-Depth with OT Network Segmentation
  • Planning and Executing Global Implementations

DETECT

  • Establishing an OT Threat Detection Program
  • Maximize Your Value from OT Passive Monitoring Tools

RESPOND / RECOVER

  • IT/OT Cybersecurity Incident Response Tabletop Exercise