Cybersecurity in Operational Technology (OT)

Join us for an insightful webinar on the critical topic of security in Operational Technology (OT) environments. As OT systems increasingly integrate with IT networks, they face unique challenges, including evolving cyber threats, aging infrastructure, legal & regulatory requirements and the need to maintain safety and operational continuity. This session will cover best practices for securing OT environments, strategies for mitigating risks, and insights into building a robust cybersecurity framework tailored to industrial systems. Whether you’re an IT professional, a plant manager, or a security leader, this webinar will equip you with actionable knowledge to safeguard your OT assets and ensure business resilience.

Date: Thursday 20 February 2025
Time: 12:30 – 1:00pm AEDT
Fee: See Pricing Info
Host: Gurvinder Pal Singh

Book Now >
cybersecurity icon

Key Topic Areas of Discussion

Each topic will include actionable insights and examples to help attendees protect their OT environments while supporting operational excellence.

Understanding the OT-IT convergence and its security implications

With OT systems increasingly connected to IT networks, the convergence introduces new vulnerabilities, such as exposure to external threats like ransomware and unauthorised access. This section will explore how blending IT and OT impacts security protocols, the importance of understanding this intersection, and how to balance functionality, performance, safety and security.

Common vulnerabilities and threats in OT systems

OT systems are often built on legacy infrastructure, making them susceptible to exploitation. We’ll discuss typical vulnerabilities, including outdated software, lack of encryption, and poor access control, alongside threats like malware, insider attacks, and physical tampering. Attendees will learn how to identify and prioritise these risks.

Practical steps for building a secure OT architecture

Building a secure OT system requires a layered approach to defence. This topic will cover practical measures such as network segmentation, implementing access control systems, applying patch management processes, and integrating robust monitoring tools to detect and respond to anomalies in real-time.

Incident response and threat mitigation strategies

Effective incident response is critical to minimise downtime and operational disruptions. This section will outline how to design and implement an OT-specific incident response plan, conduct regular drills, and ensure rapid recovery. Attendees will also learn about threat mitigation strategies like zero-trust principles and real-time threat intelligence integration.

Meet the host

Gurvinder Pal Singh has over 25 years of experience in cybersecurity enterprise architecture and assurance, Gurvinder is a seasoned professional known for providing top-tier cybersecurity solutions across the public and private sectors. His extensive background spans various industries, including finance, healthcare, aviation, telecommunications, transportation, and government agencies. Before starting his advisory and consulting career, he served in senior leadership roles and achieved significant results in directing and leading cybersecurity programs.

Read full trainer bio

Pricing Details

Vital Members are provided access to a number of complimentary webinars every year!
You can read more about the membership package which works best for you on our membership page. In the meantime, please see pricing below:

Non-Member
Sorry, you're missing out on membership perks.
$ 45 Per Webinar
Train Membership
Great! You're able to attend 3 FREE webinars per annum.
$ 3 x Free per annum
Grow Membership
Yay! You're able to attend 5 FREE webinars per annum.
$ 5 x Free per annum
Best Value
Lead Membership
Excellent! You're able to attend unlimited webinars.
$ Free per annum

Ready to book your webinar?

Simply click the register button here and our team will provide you with further details to access shortly.