Event
OT: Control risk, achieve compliance
Operational technology (OT) now runs far more than factories – from logistics to healthcare – and its tight coupling with IT brings both efficiency and new cyber risk. This webinar distils what’s unique about OT, what regulators expect, and how to turn a mixed, legacy-heavy environment into a managed, compliant one. We will explain how a critical asset inventory, zone definition and segmentation, and a pragmatic, standards-based programme aligned with IEC 62443 can help you meet NIS2 compliance […]
Date & time
January 13, 2026 - 10:00 - 11:00 (CET)
Where
Online
Language
English
Who should attend?
- OT operations & engineering — plant/production managers; automation, controls and maintenance engineers
- Security leadership & architecture — CISOs, OT security leads, ICS/network architects, plus SOC/incident response teams covering OT
- Risk, compliance & audit — NIS2 programme owners, risk managers and internal auditors
- Procurement & suppliers — procurement/vendor management; system integrators and managed service providers supporting OT
- Facilities & reliability — building automation/facilities managers; safety, quality, reliability and business continuity leads
Especially relevant for organisations in manufacturing, energy, water & wastewater, transport/logistics and healthcare.
Operational technology (OT) now runs far more than factories – from logistics to healthcare – and its tight coupling with IT brings both efficiency and new cyber risk. This webinar distils what’s unique about OT, what regulators expect, and how to turn a mixed, legacy-heavy environment into a managed, compliant one.
We will explain how a critical asset inventory, zone definition and segmentation, and a pragmatic, standards-based programme aligned with IEC 62443 can help you meet NIS2 compliance requirements.
We will share our experience and best practices for secure remote access, segmentation, patching Windows,
and lifecycle governance that respects safety and uptime constraints.
What you will learn
- Why OT security is different from IT
- Real world OT challenges: insecure remote access, flat networks, protocol quirks, maintenance windows
- Management approaches that work in practice: governance, change control, maintenance planning, backup/restore,
secure remote access patterns - Standards-based programme with IEC 62443: what parts matter most (secure development/components)
- Risk & compliance in practice: asset inventory, zones & conduits, segmentation, monitoring, continuous improvement; evidence for audits (NIS2).
Join our webinar and walk away with a concise checklist to make OT a source of pride—not headaches.
Related