InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Securing the OT Factory Floor: Practical Cybersecurity Strategies and Tools

Presented by

Brad Reinboldt (NetAlly), Jim Crowley (OT Cyber Direct), Cam Cullen (BlastWave)

About this talk

Operational Technology (OT) environments are the backbone of modern manufacturing, energy, and industrial operations—making their security mission-critical. As factory floors become more connected, blending IT and OT systems, they also become prime targets for cyber threats. Unlike traditional IT networks, OT systems face distinct challenges: legacy equipment, limited visibility, rigid uptime requirements, and costly downtime risks. In this joint webcast, experts from NetAlly, BlastWave, and OT Cyber Direct will explore the evolving threat landscape for industrial operations, highlight the critical differences between IT and OT cybersecurity, and demonstrate practical, cost-effective tools that enhance visibility, enforce segmentation, and enable secure remote access—without disrupting production. Attendees will learn actionable strategies to strengthen their OT security posture and discover how purpose-built solutions can bridge the IT/OT gap efficiently and affordably. What You’ll Learn 1. The Unique Challenges of OT Cybersecurity • Why control systems are harder to secure than IT networks • How legacy devices and limited visibility increase risk • Balancing strong security with uptime and operational continuity 2. The Evolving OT Threat Landscape • Latest attack trends on industrial control systems (ICS) • Real-world breaches and their operational impact • Key compliance and regulatory drivers for OT protection 3. Bridging the IT/OT Security Divide • Aligning IT security policies with OT requirements • Strengthening collaboration across IT, OT, and security teams • Achieving visibility and control without adding risk 4. Practical, Budget-Friendly OT Security Strategies • How to prioritize your protection efforts • Using pre-tested, validated tools that work in live OT environments • Strengthening your network — not just monitoring it
NetAlly

NetAlly

8847 subscribers66 talks
Testing you can trust from a reliable Ally.
NetAlly helps network engineers and technicians better deploy, manage, maintain and secure complex wired and wireless networks. We simplify network testing, provide instant visibility, and enable seamless collaboration between site and remote personnel. For more information check out www.netally.com
Related topics