What happens when the systems you rely on every day suddenly stop working?
In industries where operations depend on physical infrastructure, such as manufacturing or energy, even a small vulnerability can lead to major disruptions. It can compromise safety, harm your reputation, and disrupt the flow of operations.
Building resilience isn’t just about defending against threats. It requires the ability to respond quickly and recover with confidence. At the same time, regulations like the EU’s NIS2 directive are changing expectations. They bring stricter reporting timelines and hold leadership directly responsible for cyber preparedness.
In this session, Hunt & Hackett and Xebia will share fresh perspectives on the way cybersecurity and business continuity work together, especially in environments where IT and Operational Technology (OT) are becoming more connected. You will learn how to strengthen operational resilience, secure OT environments, and approach compliance in a way that supports long-term continuity and confidence.
Key Takeaways
- Understanding OT Vulnerabilities: Learn why OT systems, often built on older infrastructure and increasingly interlinked with IT, can become prime targets for cybercriminals.
- Combining continuity & security: Learn how to blend business continuity plans with cybersecurity measures, creating a more resilient and efficient operation
- NIS2 & Executive Accountability: See how NIS2 places responsibility on C-level leaders, including strict timelines for reporting and clear penalties for non-compliance.
- Partnering for lasting security: Gain insights into how Xebia and Hunt & Hackett can help assess risks, close security gaps, and keep your organization compliant and resilient.
- Date: Tuesday, May 20
- Time: 13:30 - 17:00
- Location: Google Netherlands, Claude Debussylaan 34, 1082 MD Amsterdam
Program
- 13:30 Registration
- 13:30 Opening and Introduction
- 13:45 The Evolving OT Threat Landscape
- 14:15 Talk #2
- 14:45 Refreshments
- 15:00 Talk #3
- 15:30 Talk #4
- 16:00 Q&A
- 16:15 Borrel
- 17:00 End
Who Should Join?
This event is a must-attend for IT managers, CISOs, lead developers, engineering managers, seeking to enhance their understanding of cloud security and modernize their security operations. Don't miss this opportunity to stay ahead of the curve and elevate your expertise in cloud-native security.