How to test operational environments for cyber vulnerabilities without disrupting operations

Watch this cyber security webinar video on penetration testing where we discuss how we can test interconnected and complex systems without disrupting operations.
ICS penetration testing services
Cyber security - penetration testing services

Yes, I would like to watch the webinar video

Please leave your contact details

How to perform cyber security PenTest for OT systems?

If you are wondering how to plan and undergo a cyber security penetration test for your company, this webinar is for you. 

The clear and distinct differences between IT and OT (operational technology) are gradually disappearing and just like in traditional IT-organizations, the employees and organizations need to be aware of potential cyber-risks, how to avoid them, and how to handle cyber-attacks. 

How do you test interconnected and complex systems while minimizing the risk of disrupting your operations? Is it even possible to test OT in a safe manner? 

Watch this webinar video to find out more about: 

  • Cyber security concepts:
    - Black, grey or white hat hacking
    - Phishing and social engineering
    - Zero-day vulnerabilities
    - White-box testing vs. black-box testing 
  • Methods usually offered in a penetration test, and why 
  • How to determine what is a matching scope for your assets 
  • When to patch and update, and what to do with end-of-life legacy systems 

This webinar is most relevant for: 

Senior management, management, CIO, CISO, Head of IT, Head of Operations, Technical Managers, IT Managers and more 


Elisabet Haugsbø M.Sc., Senior Cybersecurity Engineer, DNV. Elisabet is being certified as GICSP (Global Industrial Cyber Security Professional). She has many years of experience in modelling, “hardware in the loop” testing, network stress testing and penetration testing of advanced control systems for the maritime, offshore and oil industry. 

Mate J. Csorba Ph.D., Principal Cybersecurity engineer, DNV. Mate is a certified CEH (Certified Ethical Hacker) and GXPN (Exploit Researcher and Advanced Penetration Tester). Mate works with vulnerability analysis and testing of maritime, offshore and energy IT and OT systems, employing penetration testing techniques among others.

Find out more about our cyber security penetration testing services.

Back to webinar overview.