Defend, Sustain, Comply: Securing Your OT Infrastructure Amid NIS2 Requirements

Defend, Sustain, Comply: Securing Your OT Infrastructure Amid NIS2 Requirements

October 24th, 2024
Van der Valk Hotel, Utrecht

As cybersecurity challenges evolve, operational technology (OT) systems are increasingly vulnerable to threats. Ensuring compliance with the NIS2 directive is critical to protecting your infrastructure and maintaining business continuity. That’s why KPMG and Nozomi Networks are hosting an exclusive event tailored for OT and cybersecurity professionals to equip you with the insights and tools you need.

Why Attend?

This event is your chance to gain real-world, actionable insights from industry experts on securing your OT infrastructure while ensuring compliance with the NIS2 directive. Here's why you can't afford to miss it:

  • Enhance your OT security posture with strategies for early threat detection and continuous operations.
  • Assess your current cybersecurity investments and gain practical insights into your threat landscape, assets, and attack vectors.
  • Uncover hidden risks that may impact your business operations and NIS2 compliance.
  • Network with industry leaders and peers to exchange ideas and best practices in a collaborative environment.

Agenda

08:30 AM - Welcome & Complimentary Breakfast

09:00 AM - Insights to Ensure OT Resilience & NIS2 Reporting Amid Compromise

10:00 AM - Whiteboard Exercise: Addressing Hidden Assumptions Impacting NIS2 Compliance

10:45 AM - Coffee Break & Networking

11:15 AM - OT Network Security Deep Dive: Improve OT Security Posture & Build Confidence in NIS2 Reporting

12:15 PM - Closing & Key Takeaways

12:30 PM - Lunch & Networking

02:00 PM - End of Event

*Agenda is subject to change.


Secure Your Spot Now!

Seats are limited, and demand is high. Don’t miss this opportunity to get ahead of the evolving OT security landscape and NIS2 requirements.

Register today to reserve your spot for this must-attend event!

In Partnership With

No items found.

Speakers

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your OT and IoT asset discovery, inventory, and management.