

State of ICS/OT (Industrial Control Systems / Operational Technology) Threats and Driving Down Risk
Industrial environments face escalating threats that traditional IT security tools weren’t built to stop. From ransomware targeting PLCs to nation-state actors infiltrating critical infrastructure, the stakes for ICS/OT systems have never been higher.
Join Broadleaf Group and Dragos, the leader in OT cybersecurity, for a powerful session designed to unpack the evolving threat landscape in industrial control systems and operational technology—and more importantly, how to reduce risk across your organization.
This session will explore real-world OT cyber incidents, how adversaries are breaching industrial environments, and what steps security leaders can take to close the gaps between IT and OT security practices.
Broadleaf Group brings decades of cybersecurity integration experience across enterprise networks, while Dragos delivers deep expertise in OT threat detection and incident response. Together, we’ll reveal how organizations can unify their cyber strategy across IT and OT to protect what matters most.
In This Session, We’ll Cover:
The current state of ICS/OT cybersecurity threats, including attacker TTPs and risk trends
Real-world incident case studies from the Dragos frontlines
How to identify and secure your OT assets using tailored frameworks
Strategies to bridge IT and OT security without disrupting operations
Actionable next steps for building a mature OT cybersecurity program
Who Should Attend?
This webinar is ideal for:
CISOs, CIOs, and IT/OT Security Leaders
Security Architects and Analysts
Industrial Network and Infrastructure Engineers
IT Operations and Risk Management Professionals
Anyone responsible for protecting critical infrastructure or industrial environments
Why Attend?
Understand the Threat Landscape – Gain clarity on the latest ICS/OT attack vectors and adversary behaviors.
Learn from Experts – Hear directly from Dragos and Broadleaf Group’s cybersecurity leaders.
Bridge the IT/OT Divide – Get practical guidance on integrating OT into your security architecture.
Take Action – Walk away with a framework and next steps to reduce operational cyber risk.