OT security succeeds when engineering, operations, and security share a destination—and a realistic path to get there. This interactive session helps attendees move from reactive work to a strategy that respects uptime, safety, and legacy constraints while still improving security outcomes. We’ll begin with a rapid overview of why OT programs slip into firefighting (misaligned…
Background:Cybersecurity risk has evolved from merely an IT issue to a core strategic and operational challenge, especially due to the convergence of IT and vulnerable, legacy Operational Technology (OT) systems. Recent, high-impact attacks (Colonial Pipeline, MWAA, Volt Typhoon) on critical infrastructure demonstrate that disruptions are inevitable and lead to severe financial, operational, and reputational costs,…
Abstract Coming Soon
Abstract Coming Soon
As Battery Energy Storage Systems (BESS) take on mission-critical grid roles, organizations need better ways to understand and communicate OT cyber risk. This session explores how Cyber-Informed Engineering (CIE) can be used to structure credible cyber scenarios, guide mitigations, and support early-stage risk quantifications. Attendees will gain practical frameworks for translating cyber risk into engineering,…
Abstract Coming Soon
This will be a working session where the participants suggest ideas for OT Cybersecurity concerns related to Unified Namespace (UNS) and then work through solving those. Depending on the time allotted, we will start with the top 5, and go from there.