Thursday, OCTOBER 24th, 2024

OT Security: A New Approach to Leveraging Data to Protect Legacy OT Assets

5:30pm - 8pm CT | Dallas, TX

Event Overview

OT cybersecurity. As the threats and urgency have grown in recent years, so have two unique challenges: Gaining visibility into data across disparate, often air-gapped OT asset environments; and protecting OT legacy systems that cannot simply be updated and patched.

It’s a growing challenge, and your OT environments may be but one cyber incident away from downtime that can cripple your business and partnerships.

So, what is your enterprise doing today to protect your mission-critical OT assets – particularly legacy systems – and how does data analytics help you effectively to secure your current critical infrastructure and legacy assets? What new strategies and solutions
can you adopt to improve both objectives?

KEY TOPICS

  • Improve industrial cybersecurity and protect legacy assets.

  • Employ enhanced data analytics and intelligence to protect mission critical
    assets from emerging threats.

  • Demonstrate regulatory compliance with real-time data and configuration
    Integrity visualization.

Request to Attend

By submitting this form you agree to our Privacy & GDPR Statement.

If you have any trouble submitting this form, please send an email to roundtables@ismg-events.com for assistance.

*Please note that this is an invitation-only event and space is limited. All requests to attend will be reviewed by our event staff and approved based on professional qualifications and event capacity. Additionally, these events will not be recorded and the Chatham House Rule will apply.

Join our Events Community ISMG Connect

Continue the conversation with your industry peers

Share your Feedback

Complete a brief 5-minute survey here

Moderator

 

Tom Field

SVP Editorial

ISMG

 

Sander Swinkels

CEO & Co-Founder

DTACT

 

Bert Willemsen

CEO and Co-Founder

aXite Security Tools

Speakers

Join us in this exclusive roundtable discussion sponsored by Dutch cybersecurity leaders aXite Security Tools and DTACT

This session will be:

  • Chatham house rules
  • Peer driven
  • Pitch free

Subject matter expert

Sander Swinkels

CEO & Co-Founder

DTACT

Swinkels is a former chief of intelligence at the national level and a veteran. Prior to DTACT, he has held
several senior leadership roles at Caecus Ventures, Lynx Analytics and Palantir Technologies, among
others.

Subject matter expert

Bert Willemsen

CEO & Co-Founder

aXite Security Tools

Willemsen leads the development of solutions that protect technical installations from cyberthreats
while ensuring industrial data accuracy. He consults on security challenges for airports and critical
infrastructure and is a member of the ACI Europe Aviation Cybersecurity Committee. With extensive
experience in risk management across industries such as aviation, oil and gas, and food and beverage,
he integrates risk control with operational improvements to enhance efficiency.

Exclusive Sneak Peek: Get a Preview of this Roundtable

Venue

Truluck's

2401 McKinney Ave, Dallas, TX 75201

Underwritten by

DTACT is a privately-owned Dutch software company with deep expertise in National Security, Defense, and Cybersecurity. The company has developed a single platform, Raven, that integrates four products to help clients maximize performance from their internal or external data sources by making systems interoperable and data science easily accessible. Raven enables seamless data fusion, AI integration, and automation, delivering significant savings (30-70%) on technology use, data warehousing, SIEM/SOC efficiency, and cloud data management costs.

aXite Security Tools is a Dutch cybersecurity company with a focus on data-driven solutions for both Information Technology and Operational Technology (OT).The company consists of two connected departments: 1) aXite Consulting and 2) Security Tools International. aXite Consulting advices organizations and companies on topics concerning both physical- and cybersecurity. This regards both vital and non-vital infrastructure. Consulting activities include: cybersecurity(network) scanning, pen testing, hardening, intelligence, end-point and server detection and protection, and organizational security consulting. Security Tools is an OT security product. Using expertise of production processes, it combines IT, OT, IoT, Embedded Systems, Big Data and Artificial Intelligence to protect production sites or critical infrastructure against cyberattacks. The tool specifically monitors data communication at the lowest level at a specific location or position within (industrial) environments.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025

January 30, 2025

The Anatomy of Cyber Resilience: What It Is, What It Isn't, Why It Matters, and How to Achieve It

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025