Cyber-Physical Security: Cyber Risk Management Strategies for Connected OT & IT Networks

  • Date 04 Jun 2019

Cyber-Physical Security: Cyber Risk Management Strategies for Connected OT & IT Networks

04 Jun 2019, 16:30 - 17:25

Keynote Stage

In Conversation

Traditionally, IT and OT are separate functions with different priorities – confidentiality and privacy versus safety and availability. Most operational technology wasn’t designed to be connected to an IP network. And yet, as technology advances that is exactly what is happening – opening up new attack vectors ready to be exploited by criminals. High profile malware attacks such as Shamoon and Black Energy 3 have highlighted the cyber risks facing operational technology and industrial control systems. Cyber risk is now firmly on the risk register for different sectors of the business. But how can this translate to effective risk management for connected IT and OT networks?

During this presentation the panel of speakers will discuss how to build collaboration to ensure that robust risk management strategies are in place to deal with cyber-physical risk.

Learning Outcomes:

  1. Understand the scope and methodologies of blended cyber-physical attacks
  2. Discover how to encourage collaboration between IT & OT
  3. Learn strategies and tactics to create visibility across different technologies



  • Gavin Ellis



    Nuclear Decommissioning Authority

  • Matt Gordon-Smith



    Anglo American

    Matt Gordon-Smith is CISO at Anglo American, a FTSE100 mining company, managing information security requirements globally. Matt began his career in...

  • Shawn Scott


    Head of Information Security

    Thames Water

  • Talal Rajab


    Head of Cyber


    Talal is the Head of Programme for techUK's Cyber and National Security programmes. Talal manages strategic relationships between Government and...

Business Issues covered

  1. What will this session help you to do?
    • Deliver security to drive and enable business growth‎
    • Mitigate the effects of new vulnerabilities and exploits‎
    • Understand internal and external threats and keep a business secure‎


We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.