Peter Ceferin

Chief Technical Officer

With over 25 years of professional experience, he has specialized in designing and implementing network and security solutions for critical infrastructure, with a strong emphasis on power utility systems. His work increasingly focuses on innovative approaches to deploying advanced security technologies in environments where cyber resilience is vital to operational continuity. In addition to his technical expertise, he also serves as the Program Director of the Smart Com Technology Conference.

09:00 - 10:30

Workshop: OT/ICS security

Hands-on workshop: Building a Defensible Architecture in ICS/OT Networks and Leveraging a SaaS-Based Management Platform

Following an initial 30-minute theoretical introduction, you will explore how to effectively establish a secured OT environment through a demonstration in a demo setting, using Fortinet firewalls specifically tailored for industrial environments. The focus will be on integration with the Nozomi Networks and its Vantage - SaaS-based OT/IoT cybersecurity platform, that unifies asset inventory, network visibility, threat detection, and risk analysis into a central cloud console.
11:00 - 12:30

Workshop: OT/ICS security

Hands-on workshop - continued

Following an initial 30-minute theoretical introduction, you will explore how to effectively establish a secured OT environment through a demonstration in a demo setting, using Fortinet firewalls specifically tailored for industrial environments. The focus will be on integration with the Nozomi Networks and its Vantage - SaaS-based OT/IoT cybersecurity platform, that unifies asset inventory, network visibility, threat detection, and risk analysis into a central cloud console.
09:00 - 09:10

Day one

Welcome addresses

14:30 - 14:50

Day one

Securing Confidential Data in the Cloud: ICS/OT System Management within a SaaS Platform

We will address a (still) taboo topic: Can we — and if so, how — securely manage and monitor sensitive industrial control systems using a cloud-based SaaS platform without exposing proprietary data? Is cloud-based management always appropriate, and where is it not?
Using the Nozomi Networks Vantage platform as a case study, we will explore encrypted sensor gateways, real-time transmission of anonymized metadata, regionally restricted storage, and role-based access controls that preserve confidentiality while providing real-time asset visibility, AI-enhanced threat analytics, and scalable incident response across distributed OT environments.