Fortifying DoD Operational Technology: Securing the Cyber Battlefield Against Nation-State Threats
Tuesday, August 19, 2025: 9:30 AM - 10:30 AM
Speaker(s)
Description
Nation-state adversaries are exploiting vulnerabilities across DoD operational technology (OT) supply chains, embedding trojanized devices in military facilities and targeting critical infrastructure that supports both defense operations and civilian sectors. These cyber-enabled threats—ranging from ransomware crippling fuel pipelines to malware infiltrating industrial safety systems—undermine military readiness and threaten national security. As geopolitical tensions rise, the cyber battlefield is becoming a decisive front, where compromised OT can erode the warfighter’s advantage before kinetic conflict even begins.
To maintain operational dominance, the DoD must implement a proactive, layered defense. Modernizing legacy OT with secure-by-design controls, Zero Trust architectures, tamper-resistant firmware, and continuous monitoring is critical to reducing vulnerabilities. Rigorous supply chain verification, firmware integrity checks, and advanced component tracking will help detect and neutralize embedded threats before they impact mission-critical systems. Strengthening public-private partnerships is equally essential, ensuring intelligence-sharing between the DoD, industry, and allied nations to counter adversary tactics before they escalate into full-scale disruptions.
This panel will examine recent DoD supply chain intrusions, analyze lessons learned, and present actionable strategies to harden OT environments against cyber-physical attacks. Protecting warfighter operations, preventing data loss, and denying adversaries the ability to conduct cyber-enabled sabotage must be top priorities. In an era where cyber warfare can dictate the outcome of kinetic engagements, OT security is not just an IT issue—it is a battlefield imperative.
Watch Here
Tracks:
Handouts
Click here for Continuing Education approvals