We explore how to achieve effective operational technology security and maximize the return on investment.
One of the primary challenges in operational technology (OT) active defense is the ability to gain comprehensive and real-time visibility of the environment. Unlike traditional information technology (IT) environments, OT networks are often made up of specialized, proprietary and legacy systems that were not designed with security in mind. Many OT systems lack the ability to generate detailed logs or support modern security protocols, making it challenging to collect and analyze security data without disrupting critical operational processes.
Close collaboration between the IT and OT teams, and a combination of specialized expertise and advanced technologies, are needed to overcome the visibility challenge to achieve effective OT security.
Join us at this webinar with guest speaker Richard Asch, Head of Cyber Security, Western Power, as he shares learnings on overcoming this challenge and explores case studies to maximize the return on investment that stretches beyond just active defense.
Presenters
- Richard Asch, Head of Cyber Security, Western Power
- Eric Jost, EY Asean Energy Leader, EY Asia-Pacific Power & Utilities Leader
- Jaco Benadie, Partner, Technology Consulting – Cybersecurity, Ernst & Young Consulting Sdn Bhd
The EY Energy Cyber Smart Connect is an exclusive platform for senior leaders in the energy sector to be at the forefront of security issues. With the acceleration of energy transition, companies in the energy and resources sector are moving forward quickly with their digital transformation efforts to respond to evolving customer needs and create new revenues streams, while upgrading their infrastructure and creating operational efficiencies. Cybersecurity resilience needs to be incorporated into every aspect of the company to reduce the growing cyber risks that energy and resources companies face.
Who should attend?
- Cybersecurity senior executives
- Chief Information Officers
- Chief Information Security Officers
- Chief Technology Officers
- Chief Data Officers
- Chief Digital Officers
Look out for topics in upcoming sessions:
- Vulnerable software supply chain: the SBOM conundrum
- Global cyber skills shortage: do more with less – how?
- Digital transformation: the need for speed and connectivity
- Anywhere work models: information governance gaps
This webinar is complimentary and by invitation only.
This event is now over. Please contact the organizer to receive invites for future events.