Thursday, OCTOBER 24th, 2024
OT Security: A New Approach to Leveraging Data to Protect Legacy OT Assets
5:30pm - 8pm CT | Dallas, TX
Event Overview
OT cybersecurity. As the threats and urgency have grown in recent years, so have two unique challenges: Gaining visibility into data across disparate, often air-gapped OT asset environments; and protecting OT legacy systems that cannot simply be updated and patched.
It’s a growing challenge, and your OT environments may be but one cyber incident away from downtime that can cripple your business and partnerships.
So, what is your enterprise doing today to protect your mission-critical OT assets – particularly legacy systems – and how does data analytics help you effectively to secure your current critical infrastructure and legacy assets? What new strategies and solutions
can you adopt to improve both objectives?
KEY TOPICS
-
Improve industrial cybersecurity and protect legacy assets.
-
Employ enhanced data analytics and intelligence to protect mission critical
assets from emerging threats. -
Demonstrate regulatory compliance with real-time data and configuration
Integrity visualization.
Request to Attend
By submitting this form you agree to our Privacy & GDPR Statement.
If you have any trouble submitting this form, please send an email to roundtables@ismg-events.com for assistance.
*Please note that this is an invitation-only event and space is limited. All requests to attend will be reviewed by our event staff and approved based on professional qualifications and event capacity. Additionally, these events will not be recorded and the Chatham House Rule will apply.
Join our Events Community ISMG Connect
Continue the conversation with your industry peers
Share your Feedback
Complete a brief 5-minute survey here
Moderator
Tom Field
SVP Editorial
ISMG
Sander Swinkels
CEO & Co-Founder
DTACT
Bert Willemsen
CEO and Co-Founder
aXite Security Tools
Speakers
Join us in this exclusive roundtable discussion sponsored by Dutch cybersecurity leaders aXite Security Tools and DTACT
This session will be:
- Chatham house rules
- Peer driven
- Pitch free
Subject matter expert
Sander Swinkels
CEO & Co-Founder
DTACT
several senior leadership roles at Caecus Ventures, Lynx Analytics and Palantir Technologies, among
others.
Subject matter expert
Bert Willemsen
CEO & Co-Founder
aXite Security Tools
while ensuring industrial data accuracy. He consults on security challenges for airports and critical
infrastructure and is a member of the ACI Europe Aviation Cybersecurity Committee. With extensive
experience in risk management across industries such as aviation, oil and gas, and food and beverage,
he integrates risk control with operational improvements to enhance efficiency.
Exclusive Sneak Peek: Get a Preview of this Roundtable
Venue
Truluck's
2401 McKinney Ave, Dallas, TX 75201
Underwritten by
DTACT is a privately-owned Dutch software company with deep expertise in National Security, Defense, and Cybersecurity. The company has developed a single platform, Raven, that integrates four products to help clients maximize performance from their internal or external data sources by making systems interoperable and data science easily accessible. Raven enables seamless data fusion, AI integration, and automation, delivering significant savings (30-70%) on technology use, data warehousing, SIEM/SOC efficiency, and cloud data management costs.
aXite Security Tools is a Dutch cybersecurity company with a focus on data-driven solutions for both Information Technology and Operational Technology (OT).The company consists of two connected departments: 1) aXite Consulting and 2) Security Tools International. aXite Consulting advices organizations and companies on topics concerning both physical- and cybersecurity. This regards both vital and non-vital infrastructure. Consulting activities include: cybersecurity(network) scanning, pen testing, hardening, intelligence, end-point and server detection and protection, and organizational security consulting. Security Tools is an OT security product. Using expertise of production processes, it combines IT, OT, IoT, Embedded Systems, Big Data and Artificial Intelligence to protect production sites or critical infrastructure against cyberattacks. The tool specifically monitors data communication at the lowest level at a specific location or position within (industrial) environments.
Rules of Engagement
By taking part in this discussion you agree that:
- These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
- If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
- These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.
Upcoming ISMG Events
January 28, 2025
January 30, 2025
Upcoming ISMG Events