Skip to content

OT.SEC.CON: Where Cyber Meets the Physical World, and Failure Is No Longer an Option

Cybersecurity has outgrown the SOC. As attacks spill into water systems, hospitals, and critical infrastructure, OT.SEC.CON will bring together the practitioners, policymakers, and operators redefining what defense looks like when cyber risk becomes physical risk.

In 2023, a well-funded, well-intentioned initiative set out to improve cybersecurity across U.S. water utilities. Backed by major institutions and designed to help one of the most vulnerable sectors in critical infrastructure, it had all the right ingredients — visibility, funding, and urgency.

The results tell a different story: Out of 113 utilities that enrolled, only 43 completed the program.

The lack of success reflects a deeper truth the cybersecurity industry has been slow to confront: you cannot solve operational technology (OT) and critical infrastructure risk with the usual mix of awareness campaigns, generic training, or IT-first thinking. These environments are constrained, understaffed, and deeply physical. They require hands-on expertise, sustained investment, and a fundamentally different approach to defense.

And yet, too often, the industry continues to treat them like just another vertical.

Pilot Program to Boost Water Utility Cybersecurity Falls Short
The tens of thousands of at-risk water utilities across this country are still out there — now slightly more aware of how exposed they are, which isn’t exactly progress.

Meanwhile, the stakes are rising. Attacks are no longer contained to networks and endpoints. They ripple outward — into hospitals, water systems, transportation, and energy grids. Nation-state and gray-zone actors are increasingly targeting these environments not just for disruption, but for strategic leverage.

From Cybersecurity to Operational Resilience

This is the backdrop for OT.SEC.CON. The event is a recognition that the lines between cyber, physical, and human risk have collapsed.

The agenda brings together leaders working at the intersection of IT, OT, and real-world operations, people who understand that protecting infrastructure means understanding how systems actually function, how failures cascade and how attackers exploit the gaps between teams, technologies, and assumptions.

You Don’t Have to Be Interesting to Get Hit: Opportunistic CPS Attacks Against Critical Infrastructure
Critical infrastructure organizations reported thousands of incidents in the covered period, and year-over-year data shows a roughly 180% increase in the exploitation of vulnerabilities as an initial access path, concentrated heavily on edge devices and remote access infrastructure.

Sessions span the realities security teams are grappling with right now:

  • Securing industrial control systems in environments that can’t simply be patched or taken offline
  • Managing risk across IT/OT convergence, where visibility is incomplete and ownership is unclear
  • Responding to incidents where cyber events have immediate physical consequences
  • Addressing the human layer — operators, engineers, and frontline staff who are now part of the security equation

The speakers themselves reflect this evolution — practitioners, operators, and strategists who aren’t theorizing about risk, but actively managing it in environments where downtime can quickly turn dangerous.

Sessions include:

Why This Matters Now

The failure of programs like the water utility pilot isn’t an outlier. It shows what happens when we underestimate the complexity of critical infrastructure and overestimate the effectiveness of scalable, one-size-fits-all solutions. It shows the limits of awareness without implementation, and strategy without execution.

Most importantly, it shows that we are running out of time to get this right.

Critical infrastructure operators don’t need more dashboards. They need support that meets them where they are: on the plant floor, in aging environments, with limited staff and no margin for error.

That’s the conversation OT.SEC.CON is designed to drive.

More on OT and critical infrastructure security:

#FollowFriday: Five OT Security Leaders Speaking at OT.SEC.CON.
With OT.SEC.CON. coming up, this week’s #FollowFriday celebrates five leaders in the space we’re looking forward to seeing there.
America Must Better Prepare for a Critical Infrastructure Cyber Battlefield
ICIT Executive Director Valerie Moon says the United States remains unprepared for critical infrastructure attacks that come with modern geopolitical conflict.
The Purdue Model Is Aging: Here’s Why Operators Are Looking Toward 2.0
The Purdue Model has long been the GuideStar for securing factories, power plants, and water systems: layer your sensors at the bottom, controllers above, and tie it all to enterprise IT at the top with firewalls segmenting between. Simple. Effective. Or so the industry told itself.
AI-Generated Code Is Already Running Critical Infrastructure
Embedded systems are already running AI-generated code. Security leaders now face scale, speed, and regulatory risk gaps.
Five Security Pros Dedicated to Protecting Critical Infrastructure
Here are five people who are taking the lead in making critical infrastructure more resilient in the face of nation-state attacks.

Latest