Gartner®: Hype Cycle™ for Security Operations, 2022 arrow btn
White logo
Contact us
Banner background
Virtual seminar

Zero Trust:
Strategies for
Securing Critical
Infrastructure and OT

Thursday, October 6, 2022
11AM ET | 8AM PT

Attacks on OT/ICS systems are increasing and the stakes have never been higher. An expert panel of practitioners, investors, and analysts will give an inside look into the industrial cybersecurity threat landscape and the challenges to securing our nation’s critical infrastructure.

The panel will discuss:

  • list circleWhy unique OT environments can’t be secured with traditional IT approaches
  • list circleThe drivers behind the increase in OT-specific attack vectors
  • list circleThe disruptive technologies driving investments during a down market.
  • list circleWhere the government is in all of this

By 2025, 30% of critical infrastructure organizations will experience a security breach that will result in the halting of operations- or mission-critical cyber-physical systems according to Gartner, Inc.

Critical infrastructure security has become a primary concern for governments around the world,

Join us for this Airgap Networks’ Half Day Virtual OT Seminar and hear from thought leaders on OT cybersecurity framework and practices across sectors who will share challenges and lessons learned for today and tomorrow.

Virtual Seminar Agenda

Session 1: Zero Trust: Strategies for Securing Critical Infrastructure and OT

The convergence of IT/OT introduces the expanding attack surface and blindsight on asset visibility and management. In operational technology (OT) environments, implementing ZT architecture is especially hard. In this session, we will go over the barriers to implementing ZT principles in ICS environments, and propose potential methods to leverage ZT concepts.

Presenters: John Kindervag (Creator of Zero Trust), Klint Walker (CISA of DHS)

Session 2: Protecting Information and System Integrity in Industrial Control System Environments: Cybersecurity for the Manufacturing Sector

Attendees will be introduced to the newly published NIST SP1800-10 Protecting Information and System Integrity in Industrial Control System Environments: Cybersecurity for the Manufacturing Sector and related resources.

Presenters: Michael Powell (NIST), Michael Pease (NIST)

Session 3: Understanding MITRE ATT&CK ICS and Securing ICS with Zero Trust Segmentation

ICS technologies are at the foundation of our nation’s critical infrastructure and are increasingly the target of sophisticated cyber threats. To help track and understand these threats, in early 2020 MITRE ATT&CK released a new matrix within ATT&CK focused on Industrial Control Systems (ICS). This talk will discuss ATT&CK as a whole, what makes ICS unique, and some of the use cases for the knowledge base.

Presenter: Jake Steele

Session 4: Lessons Learned from Incident Response in OT/ICS Environments

Cyber incidents in OT/ICS environments can be opportunistic, copying or modifying known attack paths to disrupt operations. They can also be highly sophisticated, going undetected, targeting centralized command and control of technologies, hijacking native functionality in process equipment, and masquerading as a legitimate activity. This session will review the autonomous ransomware defense from detecting with early ransomware detection, applying zero trust policy enforcement, to responding with Ransomware Kill Switch. Join us.

Presenter: Jeff McDaniel (Airgap)

Seminar Speakers

John Kindervag

Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy at ON2IT Cybersecurity

Klint Walker

Cyber Security Advisor at U.S. Department of Homeland Security

Michael Powell

Cybersecurity Engineer at the National Cybersecurity Center of Excellence (NCCoE) NIST

Michael Pease

Mechanical Engineer, Smart Connected Systems Division, NIST

Jake Steele

Senior Cybersecurity Engineer, MITRE's Cyber Infrastructure Protection Innovation Center (CIPIC)

Jeff McDaniel

Principal Security Engineer Airgap Networks

Learn More

Analyst Report

2022 SANS Protects: The Network

Read Reportright arrow

Zero Trust: Practical Approaches for Securing OT Networks

Learn Moreright arrow
White Paper

Zero Trust: How to Beat Adversaries at Their Own Game

Read Moreright arrow

Gartner®: Hype Cycle™ for Security Operations, 2022, Andrew Davies, 5 July 202

2 Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose

. GARTNER and Hype Cycle are registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Airgap.