Why Traditional IT Security Fails in OT Environments
March 12
15:30 UK time
Why it works:
Many organizations still rely on IT-focused security strategies that do not adequately protect OT environments.
Key discussion points:
The fundamental differences between IT and OT security.
Why firewalls, SIEMs, and traditional tools are not enough.
How OT IDS fills the security gap and protects critical systems.
How to prepare.
Speakers:
Will Burnett – Field CTO at Radiflow
Will is a cybersecurity professional and an expert in IT and OT environments. He began his career in IT support and progressed to helpdesk management and technical escalations, earning certifications from leading software and hardware vendors.
He later transitioned to technical sales and industrial project delivery, including work with Siemens UK, where he developed a strong understanding of operational technologies and standards.
Passionate about cybersecurity, Will has extensive experience addressing threats ranging from early malware outbreaks to modern ransomware.
For the past 4.5 years at Radiflow, he has focused on strengthening cybersecurity strategies for industrial environments and critical infrastructure.
Ryan McConechy – CTO, Barrier Networks
With over 20 years of Cybersecurity experience, Ryan McConechy supports clients with technology implementations and the execution of comprehensive security programs.
IAsCTO at Barrier Networks, Ryan is responsible for developing and delivering complex security programs that suit our client’s needs, helping them meet business objectives and critical regulatory compliance requirements.
Ryan is highly accredited, holding multiple key certifications, and a BSc Degree in Computer Science and Artificial Intelligence from the University of Edinburgh.
Why You Should Attend This Webinar?
IT Security ≠ OT Security – Many organizations assume firewalls, SIEMs, and traditional IT tools can protect OT. They can’t. OT environments have unique security challenges that require a different approach.
Protect Critical Infrastructure – OT cyberattacks have real-world consequences—production shutdowns, safety risks, and operational disruptions. Learn how to build a resilient OT security strategy.
Understand OT-Specific Threats – IT security focuses on data protection, while OT security is about ensuring uptime and operational continuity. Discover why IT-centric approaches fail in OT environments.
Industry Experts Share Proven Strategies – Gain insights from Will Burnett (Radiflow) & Ryan McConechy (Barrier Networks)—two cybersecurity leaders with decades of experience in industrial security and regulatory compliance.