Archives

Demystifying Network Monitoring: Best Practices

As cyber threats proliferate across both enterprise and Operational Technology (OT) networks, organizations increasingly recognize the necessity of robust network monitoring. However, many acquire specialized OT monitoring tools under the flawed & set it and forget it assumption, expecting immediate, out-of-the-box effectiveness without further intervention. Moving beyond passive installation to a mature, tuned network monitoring…

When Expectations Meet Reality: The Anatomy of Cyber Incidents Affecting OT Organizations

Real world incident response experience shows that many attacks against OT centric organizations unfold differently than expected. There are several key reasons why reality diverges from initial assumptions, and understanding these gaps offers critical lessons for strengthening operational resilience.

Keynote Address

Securing What Matters | Operationalizing Cyber Resilience to Reduce OT Risk​

Security leaders can no longer rely on passive risk awareness or compliance alone. Achieving true resilience requires enhanced visibility, expedited decision-making, and the seamless integration of cybersecurity measures across all levels of the organization. Resilience must be engineered into people, processes, and technologies, creating a security culture that extends from the plant floor to the…

Physics, Policy & Priorities

Operational Technology (OT) environments face complex threats, driven by both evolving technology and persistent, fundamental risks. This panel brings together experts from IBM, Sygnia, and OPSWAT to discuss strategic and practical priorities for securing critical infrastructure. The session will explore key themes including: AI and Critical Infrastructure Security: We will examine the use of AI…

“Accelerate” for OT: What Actually Translates?

Overview This 50-minute Birds-of-a-Feather session explores a focused question: which practices and metrics from the DevOps “Accelerate” research (Forsgren, Humble, Kim) actually translate to OT environments, and which ones don’t? Rather than a traditional presentation, this is a structured, facilitator-led collaborative session where participants do the thinking together, using an “Adopt, Adapt, or Avoid” framework…

Secure Remote Access for Operational Technology 

In developing a business continuity plan, an important consideration is that the organization may not be capable of sustaining normal operations on-site. The ability to securely support employees and contractors working remotely is essential to ensuring OT business continuity. OT organizations also need secure remote access because they may need to commission new equipment, apply…

Why Isn’t AI Transforming Critical Infrastructure (Yet)?

This session will be structured as a facilitated Birds-of-a-Feather (BoF) discussion focused on identifying and characterizing barriers to AI adoption within critical infrastructure sectors. While AI capabilities have matured rapidly, adoption in operational environments (particularly those involving safety-critical OT systems) remains uneven. The purpose of this session is not to showcase a product or a…

Incident Response Table Top Exercise Using FEMA’s NIMS Incident Command System

UTSI will be facilitating a specialized Tabletop Exercise (TTX) utilizing ThreatGen technology and featuring a custom scenario. The TTX will run across three morning sessions, concluding with a final summary and awards presentation during the Level Zero closeout. This TTX can be used as part of the items needed for Type 3 or Type 4…

Building the Industry: A Founder Roundtable on the OT Cybersecurity Venture Ecosystem

“OT and ICS cybersecurity isn’t a future challenge—it’s being defined right now.” In this special closing session, Level Zero brings together six seasoned founders of emerging or investor backed OT cybersecurity companies for a candid roundtable on what it means to start and grow a venture in this space. From navigating early customers and patient…