{"id":3225,"date":"2025-06-11T14:04:26","date_gmt":"2025-06-11T12:04:26","guid":{"rendered":"https:\/\/insightevents.dk\/isc-cph\/?post_type=tec_session&#038;p=3225"},"modified":"2025-06-20T10:19:41","modified_gmt":"2025-06-20T08:19:41","slug":"workshop-ot-network-segmentation-from-planning-to-implementation","status":"publish","type":"tec_session","link":"https:\/\/insightevents.dk\/isc-cph\/sessions\/workshop-ot-network-segmentation-from-planning-to-implementation\/","title":{"rendered":"Workshop 1: OT Network Segmentation \u2013 From Planning to Implementation"},"content":{"rendered":"<p><em>Technical Level: Intermediate<\/em><\/p><p><strong><em>Seats are limited, so be sure to register for the workshop when you register for the conference.<\/em><\/strong><\/p>\n<p><strong>Workshop Overview<\/strong><br \/>\nThis full day workshop provides a comprehensive approach to OT network segmentation, addressing both strategic planning and technical implementation. The session is divided into two parts.<\/p>\n<ul>\n<li>\u2022 Part 1 \u2013 OT Segmentation project planning and requirements gathering<\/li>\n<li>\u2022 Part 2 \u2013 Hands-on technical implementation for OT Segmentation using a virtualized environment<\/li>\n<\/ul>\n<p>Attendees can attend the entire workshop, or only the Part that aligns to their interests to provide flexibility in conference schedules. The workshop will reference relevant frameworks including NIS2 and IEC 62443 while emphasizing practical implementation over compliance.<\/p>\n<header class=\"tec-entry-header\">\n<h1 class=\"tec-single-session__title\">Part 1 \u2013 Planning and Requirements for OT Segmentation<\/h1>\n<\/header>\n<div class=\"tec-single-entry-content\">\n<p><strong>1.1. Foundations of OT Network Segmentation<\/strong><\/p>\n<ul>\n<li>\u2022 Introductions and background<\/li>\n<li>\u2022 Understanding the operational and security benefits of segmentation<\/li>\n<li>\u2022 Analysis of common threat vectors mitigated by proper segmentation<\/li>\n<li>\u2022 Technical vs. logical segmentation approaches in industrial contexts<\/li>\n<li>\u2022 Reference architectures and segmentation models<\/li>\n<\/ul>\n<p><strong>1.2. OT Environment Assessment<\/strong><\/p>\n<ul>\n<li>\u2022 Methodologies for documenting and analyzing existing OT network architectures<\/li>\n<li>\u2022 Asset discovery and classification techniques<\/li>\n<li>\u2022 Identifying critical systems and communication paths<\/li>\n<li>\u2022 Documenting legacy systems and protocol requirements<\/li>\n<\/ul>\n<p>Lab Exercise: Analyzing sample OT network diagrams and identifying segmentation opportunities<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p><em>Technical Level: Intermediate<\/em><\/p>\n<p>Workshop Overview: This full day workshop provides a comprehensive approach to OT network segmentation, addressing both strategic planning and technical implementation. The session is divided into two parts.<\/p>\n","protected":false},"author":4,"featured_media":0,"template":"","meta":{"inline_featured_image":false,"footnotes":""},"session_track":[8],"session_location":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Workshop 1: OT Network Segmentation \u2013 From Planning to Implementation - Industrial Security Conference Copenhagen<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/workshop-ot-network-segmentation-from-planning-to-implementation\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Workshop 1: OT Network Segmentation \u2013 From Planning to Implementation - Industrial Security Conference Copenhagen\" \/>\n<meta property=\"og:description\" content=\"Technical Level: IntermediateWorkshop Overview: This full day workshop provides a comprehensive approach to OT network segmentation, addressing both strategic planning and technical implementation. The session is divided into two parts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/workshop-ot-network-segmentation-from-planning-to-implementation\/\" \/>\n<meta property=\"og:site_name\" content=\"Industrial Security Conference Copenhagen\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-20T08:19:41+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/workshop-ot-network-segmentation-from-planning-to-implementation\/\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/workshop-ot-network-segmentation-from-planning-to-implementation\/\",\"name\":\"Workshop 1: OT Network Segmentation \u2013 From Planning to Implementation - Industrial Security Conference Copenhagen\",\"isPartOf\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\"},\"datePublished\":\"2025-06-11T12:04:26+00:00\",\"dateModified\":\"2025-06-20T08:19:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/workshop-ot-network-segmentation-from-planning-to-implementation\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insightevents.dk\/isc-cph\/sessions\/workshop-ot-network-segmentation-from-planning-to-implementation\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/workshop-ot-network-segmentation-from-planning-to-implementation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insightevents.dk\/isc-cph\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Workshop 1: OT Network Segmentation \u2013 From Planning to Implementation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/\",\"name\":\"Industrial Security Conference Copenhagen\",\"description\":\"Industrial Security Conference Copenhagen\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Workshop 1: OT Network Segmentation \u2013 From Planning to Implementation - Industrial Security Conference Copenhagen","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insightevents.dk\/isc-cph\/sessions\/workshop-ot-network-segmentation-from-planning-to-implementation\/","og_locale":"en_GB","og_type":"article","og_title":"Workshop 1: OT Network Segmentation \u2013 From Planning to Implementation - Industrial Security Conference Copenhagen","og_description":"Technical Level: IntermediateWorkshop Overview: This full day workshop provides a comprehensive approach to OT network segmentation, addressing both strategic planning and technical implementation. The session is divided into two parts.","og_url":"https:\/\/insightevents.dk\/isc-cph\/sessions\/workshop-ot-network-segmentation-from-planning-to-implementation\/","og_site_name":"Industrial Security Conference Copenhagen","article_modified_time":"2025-06-20T08:19:41+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insightevents.dk\/isc-cph\/sessions\/workshop-ot-network-segmentation-from-planning-to-implementation\/","url":"https:\/\/insightevents.dk\/isc-cph\/sessions\/workshop-ot-network-segmentation-from-planning-to-implementation\/","name":"Workshop 1: OT Network Segmentation \u2013 From Planning to Implementation - Industrial Security Conference Copenhagen","isPartOf":{"@id":"https:\/\/insightevents.dk\/isc-cph\/#website"},"datePublished":"2025-06-11T12:04:26+00:00","dateModified":"2025-06-20T08:19:41+00:00","breadcrumb":{"@id":"https:\/\/insightevents.dk\/isc-cph\/sessions\/workshop-ot-network-segmentation-from-planning-to-implementation\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insightevents.dk\/isc-cph\/sessions\/workshop-ot-network-segmentation-from-planning-to-implementation\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/insightevents.dk\/isc-cph\/sessions\/workshop-ot-network-segmentation-from-planning-to-implementation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insightevents.dk\/isc-cph\/"},{"@type":"ListItem","position":2,"name":"Workshop 1: OT Network Segmentation \u2013 From Planning to Implementation"}]},{"@type":"WebSite","@id":"https:\/\/insightevents.dk\/isc-cph\/#website","url":"https:\/\/insightevents.dk\/isc-cph\/","name":"Industrial Security Conference Copenhagen","description":"Industrial Security Conference Copenhagen","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/sessions\/3225"}],"collection":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/sessions"}],"about":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/types\/tec_session"}],"author":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/users\/4"}],"version-history":[{"count":0,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/sessions\/3225\/revisions"}],"wp:attachment":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/media?parent=3225"}],"wp:term":[{"taxonomy":"tec_track","embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/session_track?post=3225"},{"taxonomy":"tec_location","embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/session_location?post=3225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}