Bridging the Gap: Securing Legacy OT, Mitigating Risk, and Enabling Digital Transformation

Logo
Presented by

Fredrik Nordling, Operational Technology Manager MES & OT, Epiroc IT

About this talk

Digital transformation is revolutionizing manufacturing and critical industries, driving unprecedented connectivity and efficiency. However, this evolution introduces complex security challenges, particularly in the realm of operational technology (OT). For CISOs, Heads of Cybersecurity, and IT/OT leaders, navigating IT/OT convergence, securing legacy systems, and ensuring regulatory compliance is paramount. Join our customer-led webinar to explore key OT security considerations for successful digital transformation. We'll discuss practical strategies to: Secure legacy OT systems through 2031 and beyond without disruptive upgrades, ensuring continuous operational uptime. Proactively prevent OT security incidents while maintaining operational stability and maximizing efficiency. Eliminate security complexity by streamlining protection and reducing resource demands. Achieve and maintain compliance with critical regulatory frameworks, including NIST CSF and ISA/IEC 62443. This session is designed for CISOs, Heads of Cybersecurity, OT Security, IT/OT Convergence, Digital Transformation, Risk, Project Managers (Smart Factory), Automation, SCADA, and ICS Security professionals. Gain actionable insights from real-world experiences and discover how to build a robust and compliant OT security posture that enables your organization's digital transformation journey. Moderators Christian Soegaard, Principal Cybersecurity North Europe, TXOne Lars Thoren, Cybersecurity Leader Nordics, TXOne Speakers Fredrik Nordling, Operational Technology Manager MES & OT, Epiroc IT Other speakers TBC
Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (2)
Subscribers (405)
TXOne Networks provides solutions for tackling security weaknesses prevalent across industrial environments. We listen to the needs of both leading
manufacturers and critical infrastructure operators to develop the best actionable approach within partnering companies. The result is customised
technology that goes beyond traditional security tools to mitigate complex challenges. Given the ICS environments are layered and composed of a variety of
equipment in different operating systems, TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission …