BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//bsides-ot-uk-2025//speaker//CA9VQT
BEGIN:VTIMEZONE
TZID:GMT
BEGIN:STANDARD
DTSTART:20001029T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:GMT
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T020000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:BST
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-bsides-ot-uk-2025-D3EXLF@pretalx.com
DTSTART;TZID=GMT:20260410T134000
DTEND;TZID=GMT:20260410T142000
DESCRIPTION:The threats facing Operational Technology our outpacing the del
 ivery of secure solutions in our critical infrastructure. Organisations de
 ploying OT must now accept that connectivity is no longer an edge-case\, a
 nd the “walled garden” model no longer reflects the way our industrial
  environments operate. To accelerate transformation and meet the threat we
  must challenge some of these beliefs to build critical infrastructure sui
 table for a modern threat environment.\n\nIn this talk\, David G2 a NCSC C
 yber Physical Security Architect will introduce explain the context behind
  three new pieces of NCSC guidance - **Creating and Maintaining a Definiti
 ve View of Your OT Architecture**\, **Secure Connectivity Principles for O
 T**\, and **PAWs for OT**. Articulating how these documents fit together t
 o support a realistic\, defensible security posture for modern industrial 
 environments.\n\nDo not fear this won’t be a guidance recital.\n\nThis t
 alk aims to challenge some long‑held beliefs\, exploring why the traditi
 onal prioritisation of Availability\, Integrity and Confidentiality (AIC) 
 is often poorly suited to modern OT environments\; why safety consideratio
 ns are more nuanced than simply being “the most important factor”\; ho
 w patching can be possible in practice\; and how isolation is frequently m
 isunderstood. We will examine why these beliefs emerged\, what threats the
 y can blind organisations to\, and how they limit our ability to modernise
 \, operate efficiently\, and defend at scale\n\nThe aim is for attendees t
 o leave with:\n- A practical model for understanding their OT estate\, as 
 a system not just as assets.\n- Pragmatic approaches for securely enabling
  necessary connectivity rather than creating bespoke routes for all new co
 nnectivity.\n- Why Privileged Access Workstations (PAWs) matter more than 
 ever and how they translate to the OT environment.\n- Clear\, achievable s
 teps for uplifting brownfield environments without waiting for the next li
 fecycle refresh.\n- A forward-looking vision that looks for operators to d
 emand more of their vendors and integrators\, drives vendors to raise thei
 r security baseline\, and creates space for startups to innovate rather th
 an replicate the past.\n\nThe threats are already here\, the the old rules
  won't save us.
DTSTAMP:20260501T110750Z
LOCATION:Track 1
SUMMARY:Beyond Isolation: Modern OT Needs Modern Defences - David G2
URL:https://pretalx.com/bsides-ot-uk-2025/talk/D3EXLF/
END:VEVENT
END:VCALENDAR
