BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//bsides-ot-uk-2025//speaker//SEFLM7
BEGIN:VTIMEZONE
TZID:GMT
BEGIN:STANDARD
DTSTART:20001029T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:GMT
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T020000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:BST
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-bsides-ot-uk-2025-XBSGRD@pretalx.com
DTSTART;TZID=GMT:20260410T100000
DTEND;TZID=GMT:20260410T104000
DESCRIPTION:Having spent several years securing downstream oil infrastructu
 re from cyber attacks\, I can confidently say that traditional IT approach
 es to cyber security do not translate well into OT environments. We can sp
 end a decade trying to force that square peg into a round hole\, or we can
  do something different. After all\, have those IT approaches even worked 
 in IT?...\n\nIn this talk I'll take you through several lessons we learned
  out in the field\, securing critical OT infrastructure. We'll talk about 
 how went about securing OT networks\, how we utilised zero day vulnerabili
 ties to our advantage\, why we don't consider patching systems to be that 
 important\, how we handle topics like security testing\, and how to implem
 ent effective detection capabilities all without disrupting operations or 
 compromising safety.\n\nThis talk is us learning out loud in the field of 
 OT security\, sharing our experiences in order to contribute to collective
  shared wisdom. I hope to leave you with some insights and examples from o
 ur own journey that you can take away and use on\, and maybe challenge\, y
 our own approaches to OT security.
DTSTAMP:20260501T095832Z
LOCATION:Track 1
SUMMARY:Square Pegs and Round Holes: What Actually Works in OT Security - J
 ohn Fitzpatrick
URL:https://pretalx.com/bsides-ot-uk-2025/talk/XBSGRD/
END:VEVENT
END:VCALENDAR
