Webinar

How Attacks Against OT Actually Start

  • March 17, 09:00-09:30 (CET)
  • Online

Real-world incident response insights into how IT systems, remote access, suppliers, and shared infrastructure expose Operational Technology (OT) environments.

This webinar explores how real-world attacks against OT environments begin, based on hands-on incident response experience rather than theory.

You will learn how attackers exploit IT systems, remote access, suppliers, and shared infrastructure to reach OT, and highlight the risks created by modern dependencies such as virtualization platforms.

The session also highlights why technologies like VMware have become a critical OT risk factor, and why understanding real attack paths is essential for building effective OT defense and early detection.

Your Speakers

Nicklas-Keijser-Truesec-expert-speaker

Truesec

Nicklas Keijser

Team Lead OT Detection Service