About

Conference

SecurityWeek’s ICS Cyber Security Conference is the conference where ICS users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber-incidents, analyze their causes and cooperate on solutions.

<We_can_help/>

What are you looking for?

>Event Session

[Launchpad] The OT Approach to Design and Cybersecurity

Monday, October 27, 2025
2:45 PM - 3:30 PM
Trippe Room (Breakouts)

About This Session

Operation Technology (OT) networks are a unique environment that require a different approach to design, maintain, and secure. However, organizations often try and force traditional prioritization of confidentiality in the CIA (Confidentiality, Integrity, Availability) triangle on the OT infrastructure. Yet, when stopping to consider the difference in purposes and goals of the Information Technology (IT) and the OT network, organizations find that the same technologies and approach are not always the best fit. This is where the benefits of separate IT and OT groups for network infrastructure become apparent. Each group can address the design, maintenance, and cybersecurity in a way that is custom tailored to fit the needs of the network. This means that the traditional IT network can prioritize the confidentiality of the CIA triangle, and the OT network can prioritize the availability of the CIA triangle. In the design of the OT network, organizations can consider various topologies, communication methods, and hardware redundancies that are different to maximize the availability. If there are periods requiring network maintenance, the OT network can take an approach that minimizes impact on operations and considers stability. This also allows traditional IT network and server maintenance to be separated to minimize the impact on the OT network. Finally, when considering cybersecurity, the IT network can focus on the protection of confidential data found in IT networks, while the OT network can focus on security measures that ensure continuity of operations. When organizations consider the needs and goals of the OT network that operations depend on, they find there are unique approaches that should be taken when considering the design, maintenance, and cybersecurity of the OT network.

Speaker

Randy Petersen

Randy Petersen

SCADA Superintendent - San Jacinto River Authority

Randy Petersen is the SCADA Superintendent responsible for the collective network and server infrastructure, programming, and cybersecurity of San Jacinto River Authority’s industrial control systems. He is an active member of the operational technology cybersecurity community, co-founder of the SCADA User Group, and part of the TAWWA resiliency and cybersecurity committee. For the past thirteen years, he has been focused on operational technology with a strong emphasis on networking and cybersecurity. Before joining SJRA, he worked with data extractions, database management, operating system deployment, and system recovery.