Securing Operational Technology: Fast Response, Strong Recovery

May 20 | Google Amsterdam

What happens when the systems you rely on every day suddenly stop working?

In industries where operations depend on physical infrastructure, such as manufacturing or energy, even a small vulnerability can lead to major disruptions. It can compromise safety, harm your reputation, and disrupt the flow of operations.

Building resilience isn’t just about defending against threats. It requires the ability to respond quickly and recover with confidence. At the same time, regulations like the EU’s NIS2 directive are changing expectations. They bring stricter reporting timelines and hold leadership directly responsible for cyber preparedness. 

In this session, Hunt & Hackett and Xebia will share fresh perspectives on the way cybersecurity and business continuity work together, especially in environments where IT and Operational Technology (OT) are becoming more connected. You will learn how to strengthen operational resilience, secure OT environments, and approach compliance in a way that supports long-term continuity and confidence.

Key takeaways

  • OT Threats & Past Incidents: Real-world examples and key insights from past cyberattacks where OT was targeted, leading to major disruptions in operations and continuity.
  • Understanding OT Vulnerabilities: Learn why OT systems, often built on older infrastructure and increasingly interlinked with IT, can become prime targets for cybercriminals.
  • Combining continuity & security: Learn how to blend business continuity plans with cybersecurity measures, creating a more resilient and efficient operation
  • NIS2 & Executive Accountability: See how NIS2 places responsibility on C-level leaders, including strict timelines for reporting and clear penalties for non-compliance.

Practical Information

  • When:
    Tuesday, May 20
    13.30-17.00
  • Where:
    Google Amsterdam, Claude Debussylaan 34, 1082 MD Amsterdam
    Find on Google Maps
  • For whom:
    For C-level executives, IT management and those responsible for cyber security who want to strengthen operational resilience, secure OT environments, and navigate evolving regulations like NIS2 to ensure long-term business continuity and leadership accountability.

Sign up

 

Image

Program

The program is subject to change—further details will be shared in the coming days.

  • 13.30 – 14.00: Arrival & Registration
  • 14.00 – 14.15: Opening Remarks (15 mins)
  • 14.15 – 14.45: Talk #1
  • 14.45 – 15.15: Talk #2
  • 15.15- 15.30: Break
  • 15.30 – 16.00: Talk #3
  • 16.00 – 16.15: Interactive Session with Q&A (15 mins)
  • 16.15 - 17.00 :Borrel

Want to know more?