I'm Under Attack
© Copyright Kudelski Security 2025. The Cybersecurity Division of the Kudelski Group

ModernCISO Webinar Recording: Evolution of IT/OT SOC's

This is some text inside of a div block.

From Visibility to Resilience: Evolving OT Security Operations in a Risk-Driven World

Discover in this ModernCISO Webinar, how to assess OT-SOC maturity, identify the gaps that could put production at risk, and strengthen the operational foundations needed for better response, governance, and resilience.

Our two speakers, Abel Archundia Vice President - OT and Michelle Higgs SRC Expert, will help you:

🔍 Understand why traditional IT-SOC models fail in OT environments, and what to do instead

🏭 Map your OT security maturity and identify the gaps putting production at risk

⚡ Develop incident response playbooks tailored to operational technology constraints

🛡️ Practical steps to establish OT-SOC governance, improve supply chain visibility, and align with NIS2, NERC-CIP, and IEC 62443

Inside the Report

AI Security, Built for Real-World Adoption
Explore Kudelski Security’s AI Security Service Portfolio, including practical guardrails that help organizations adopt AI safely and responsibly.
Stronger Security Posture, Reduced Risk
Learn how Continuous Threat Exposure Management (CTEM) services help organizations better manage their attack surface, while AI security guardrails support safe, responsible AI adoption.
24/7 Detection and Response with FusionDetect™
Discover how Kudelski Security brings together Microsoft, CrowdStrike, Splunk, and Claroty within FusionDetect™ to deliver continuous detection and response and help build cyber resilience.

“Kudelski Security integrates advanced AI-driven technologies with human expertise to offer proactive threat detection and rapid response capabilities. By providing tailored solutions for regulated industries, the firm ensures a holistic approach to security.”

Gowtham Sampath - Assistant Director and Principal Analyst, ISG

Inside the Report

AI Security, Built for Real-World Adoption
Explore Kudelski Security’s AI Security Service Portfolio, including practical guardrails that help organizations adopt AI safely and responsibly.
Stronger Security Posture, Reduced Risk
Learn how Continuous Threat Exposure Management (CTEM) services help organizations better manage their attack surface, while AI security guardrails support safe, responsible AI adoption.
24/7 Detection and Response with FusionDetect™
Discover how Kudelski Security brings together Microsoft, CrowdStrike, Splunk, and Claroty within FusionDetect™ to deliver continuous detection and response and help build cyber resilience.

“Kudelski Security integrates advanced AI-driven technologies with human expertise to offer proactive threat detection and rapid response capabilities. By providing tailored solutions for regulated industries, the firm ensures a holistic approach to security.”

Gowtham Sampath - Assistant Director and Principal Analyst, ISG

Our Recent
Achievements

7x recognized in the Gartner’s Market Guide for Managed Detection and Response Services
Bloor logo
Recognized as a Champion with highest innovation score in the Bloor Managed Detection & Response Market Update
Recognized as a Top Managed Security Service Provider (#23 out of 250) in the latest MSSP Alert global ranking

Other Relevant
Quick Reference Guides

ModernCISO Webinar Recording: Evolution of IT/OT SOC's

May 7, 2026
recording-ot-webinar-2026
Kudelski Security needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Notice.
The recording will be available shortly.
Please revisit this page soon to access it.
Oops! Something went wrong while submitting the form.

From Visibility to Resilience: Evolving OT Security Operations in a Risk-Driven World

Discover in this ModernCISO Webinar, how to assess OT-SOC maturity, identify the gaps that could put production at risk, and strengthen the operational foundations needed for better response, governance, and resilience.

Our two speakers, Abel Archundia Vice President - OT and Michelle Higgs SRC Expert, will help you:

🔍 Understand why traditional IT-SOC models fail in OT environments, and what to do instead

🏭 Map your OT security maturity and identify the gaps putting production at risk

⚡ Develop incident response playbooks tailored to operational technology constraints

🛡️ Practical steps to establish OT-SOC governance, improve supply chain visibility, and align with NIS2, NERC-CIP, and IEC 62443

Short & Clear
Everything you need to know in 45 minutes
Best Practices
Advice through interactive discussion
Interactive
Real time answers

Speakers

Abel Archundia-Pineda
VP Global Operational Technology
Michelle Higgs
Senior Strategy, Risk & Compliance Associate Consultant

Our Recent
Achievements

7x recognized in the Gartner’s Market Guide for Managed Detection and Response Services
Bloor logo
Recognized as a Champion with highest innovation score in the Bloor Managed Detection & Response Market Update
Recognized as a Top Managed Security Service Provider (#23 out of 250) in the latest MSSP Alert global ranking

Other Relevant
Quick Reference Guides

Other Relevant
Webinars

Share on
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

ModernCISO Webinar Recording: Evolution of IT/OT SOC's

From Visibility to Resilience: Evolving OT Security Operations in a Risk-Driven World

Discover in this ModernCISO Webinar, how to assess OT-SOC maturity, identify the gaps that could put production at risk, and strengthen the operational foundations needed for better response, governance, and resilience.

Our two speakers, Abel Archundia Vice President - OT and Michelle Higgs SRC Expert, will help you:

🔍 Understand why traditional IT-SOC models fail in OT environments, and what to do instead

🏭 Map your OT security maturity and identify the gaps putting production at risk

⚡ Develop incident response playbooks tailored to operational technology constraints

🛡️ Practical steps to establish OT-SOC governance, improve supply chain visibility, and align with NIS2, NERC-CIP, and IEC 62443

Related video resources