About

Conference

SecurityWeek’s ICS Cyber Security Conference is the conference where ICS users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber-incidents, analyze their causes and cooperate on solutions.

<We_can_help/>

What are you looking for?

>Event Session

[Launchpad] Integrating IT and OT: Designing a Secure ICS Architecture

Monday, October 27, 2025
9:45 AM - 10:30 AM
Trippe Room (Breakouts)

About This Session

The integration of Information Technology (IT) and Operational Technology (OT) is becoming increasingly essential for optimizing Industrial Control Systems (ICS). However, the convergence of these two domains brings significant cybersecurity challenges that must be addressed to ensure the security and resilience of critical infrastructure. This conference session will explore the design of a secure ICS architecture, focusing on the implementation of robust strategies such as the creation of a well-defined De-Militarized Zone (DMZ), network segmentation, and micro-segmentation to safeguard IT and OT environments. The session will cover best practices for minimizing attack surfaces, ensuring secure communication between systems, and maintaining operational continuity in the face of evolving cyber threats.

Real-world case studies will illustrate the successful integration of these strategies, highlighting lessons learned and best practices. Participants will also examine relevant regulatory frameworks and emerging technologies that facilitate secure IT-OT integration. The session will underscore the importance of collaboration between IT and OT teams, emphasizing a holistic approach to securing critical infrastructure and fostering a resilient cybersecurity posture in an increasingly interconnected world.

Key topics of discussion are:
• Introduction to IT-OT Integration
- Definition
- Benefits
- Challenges
• Importance of Secure ICS Architecture
- Why Secure Architecture is Essential
- Key Components of a Secure ICS Architecture
• Overview of DMZ Concepts
- Definition of a DMZ
- Purpose of a DMZ
- Design Considerations
• Best Practices for Network Segmentation
- Key Principles
- Segmentation Strategies
- Implementation Steps
• Micro-Segmentation Strategies
- Definition
- Benefits of Micro-Segmentation
- Implementation Techniques
- Considerations
• Case Studies in IT-OT Integration
- Case Study 1: Manufacturing Facility
- Case Study 2: Energy Sector Organization
• Regulatory Considerations
- Overview of Relevant Regulations
- Implications for ICS Architecture
- Strategies for Compliance
• Tools and Technologies
- Security Tools for IT-OT Integration
- Segmentation Technologies
- Assessment and Management Tools
• Conclusion and Key Takeaways
- Importance of Integrated Security
- Key Strategies
- Ongoing Monitoring and Adaptation

Speakers

Jey Krishnan Pandurengan

Jey Krishnan Pandurengan

EMS Principal Process Control Engineer - Smurfit Westrock

Jey brings 24 years of experience in process control, Industrial Control Systems (ICS), Networking, and protocols, with a strong background in the energy, paper, and automation industries.
He has in-depth expertise in energy and pulp & paper process control and has worked extensively on DCS (ICS) system architecture design, application engineering, and networking, particularly in the OT domain.
His technical proficiency includes working with protocols such as Profibus, Modbus/TCP, EtherNet/IP, and OPC.
Harminder Singh

Harminder Singh

Industrial Cybersecurity Consultant - Valmet Inc./Industrial Applications Consulting

Harminder has vast experience in industrial process control and cybersecurity. He has worked in ICS system architecture, engineering, third-party systems integration, and cybersecurity in the generation side of the energy sector.
He has worked in product and application development in the process control field. And has developed a cybersecurity risk management program for one of the ICS. He is highly experienced in endpoint security control.
His standards expertise includes ISA/IEC 62443 and NERC-CIP standards. Harminder has several cybersecurity certifications including GICSP and ISA/IEC 62443 Expert.