Designed for executives, this non-technical track addresses key components of a successful OT security program. The discussions are intended to spark conversation and this guide highlights key takeaways on what works, what doesn’t and what’s next. https://accntu.re/3N7KmiZ
3. The Cybersecurity Imperative: Why embrace it?
Building an OT
security program
from the top down
Designed for executives, this non-
technical track addresses key
components of a successful OT security
program. The discussions are intended to
spark conversation and this guide
highlights key takeaways on what works,
what doesn’t and what’s next.
The agenda spans:
• organizational structure
• vendor selection
• OT SOC design
• reporting strategy
• communication imperatives
Session
Overview
Developing the next industrial cyber workforce
Navigating the booming vendor landscape
OT SOC Debate: Dedicated vs Integrated
How to execute at speed and demonstrate value
Communicating risk and reward to the board
Automation—In promise, in practice
Opening Keynote
Operation: Next ‘22
Fundamentals & Structure
Innovation & Technology
Case Study
Project Execution
Investment & Risk
Closing Keynote
Executive
Perspective
11. Ready to step into next?
Visit our website for expert
insights on OT cybersecurity
Discover more resources >
Learn about our purpose-
built OT Cyber Fusion Center
Partner with us to advance
your OT security program
Leverage our test facility > Engage our OT cyber team >
Take a virtual tour >
Contact our team >