See + secure everything in your OT environment

Operational technology (OT) has always been tricky to secure because of legacy systems, tricky protocols, and fragile environments where downtime isn’t an option. Attackers know this and the stakes for mismanaged vulns couldn't be higher.

Rob King
(Director of Applied Research) and Tod Beardsley (VP of Security Research) will cover:

  • The fragility of OT as a technology. How did we let things get this far out of hand?
  • Unique considerations for managing sensitive environments, including lessons learned the hard way and resulting best practices.
  • How runZero approaches sensitive tech like OT with ongoing research efforts, including a technical deep dive into MODBUS, DNP3, and more.
  • An overview of how we’ve developed safe techniques for active discovery and exposure detection in OT environments.

If you work in critical infrastructure, ICS/SCADA, or simply want to understand what makes OT so different from IT security, this is for you.

Meet Our Speakers

Rob King

Director of Applied Research, runZero

todb

VP of Security Research, runZero

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Webcasts
How TeamSystem accelerates M&A integration with runZero
Learn how TeamSystem used runZero to accelerate M&A integration, reduce risk, and maintain confidence while scaling.
Webcasts
runZero Hour, Ep. 26: Exploring offseason resorts and OT networks with Brianna Cluck
In the first 2026 episode of runZero Hour, Rob King and Tod Beardsley chat it up with fan-favorite OT expert Brianna Cluck from GreyNoise...
Webcasts
runZero Hour, Ep. 25: The Holiday Hackstravaganza!
Tod Beardsley, Rob King, (and special guests!) look back at 2025’s wildest vulnerabilities, standout research, and make bold predictions for 2026.
Webcasts
Attack Surface Management: Continuous discovery, external attack paths
Your attack surface no longer ends at the firewall. With SaaS apps, cloud instances, IoT, and shadow IT multiplying, organizations are exposed in...

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.