Sertan Selcuk, VP for METAP & CIS at OPSWAT, shares insights in this exclusive interview on how the company’s presence at GISEC 2025 reflects its commitment to securing critical infrastructure and advancing cyber resilience across the Middle East.
How does your presence at GISEC reflect OPSWAT’s strategic priorities in the Middle East region?
OPSWAT is committed to uplifting the regional security industry by advancing cyber resilience across critical infrastructure. We’re expanding our local partnerships, enhancing our channel ecosystem, and driving innovation through continuous product development. With a strong focus on IT/OT convergence, compliance, and threat prevention, we aim to empower Middle Eastern enterprises and governments to stay ahead of evolving threats.
Our GISEC participation allows us to demonstrate this steadfast commitment to delivering IT/OT cybersecurity solutions and fostering the cyber talent that the region needs to defend its critical infrastructure and sustain economic progress.
Are there any new product launches, partnerships, or initiatives you’re unveiling at the event?
OPSWAT is participating in GISEC as a Diamond sponsor this year and we are proud to showcase our latest cybersecurity advancements in critical infrastructure protection (CIP). We shall have live demos and sessions, through OPX labs, offering practical insights on safeguarding vital systems and networks. Alongside the Lab, will be OPSWAT’s Nuclear Plant Model Reactor, a display that underscores the company’s expertise in securing sensitive environments like nuclear power plants.
Alongside the product showcase and demos, a couple of senior executives from OPSWAT will be holding sessions. During day two, on the Government Stage, hosted by Dubai Electronic Security Center, OPSWAT Founder and CEO, Benny Czarny, will present “Breaking the Firewall: Revolutionizing Cyber Defense for a Connected World”. He will make the case for a fundamental rethinking of the traditional firewall, highlighting how the rise of AI-driven exploits, encrypted attacks, and increasingly complex network environments demands a new approach to cybersecurity.
Also on day two, on the Critical Infrastructure Stage, OPSWAT’s Director of Products and Solutions, Kris Voorspoels, will take part in a panel discussion on the security crisis facing the Industrial Internet of Things (IIoT) in the regional oil and gas sector.
Finally, aiming to enhance cybersecurity standards across the region in alignment with the goals of the UAE National Cybersecurity Strategy, OPSWAT Academy will offer complimentary CIP certifications, such as File Security Associate (OFSA), Secure Storage Associate (OSSA), Email Security Associate (OESA), Web Traffic Protection Associate (OWPA), and Data Transfer Security Associate (ODSA).
What are the unique challenges in securing operational technology (OT) environments, and how does OPSWAT address them?
Securing Operational Technology (OT) environments poses unique challenges, distinct from traditional IT systems, due to differences in architecture, priorities, and the critical nature of the infrastructure involved. OT systems often operate on legacy equipment that was never designed with cybersecurity in mind, making them difficult to patch or integrate with modern tools. These environments prioritize uptime and physical safety over data confidentiality, so even minor downtime for security updates can be unacceptable.
Many OT networks are air-gapped or highly segmented, creating visibility gaps and complicating threat detection and response. Data transfers typically occur via removable media like USB drives, introducing a significant attack surface. OPSWAT addresses these risks through a suite of purpose-built solutions for OT environments. Tools like MetaDefender Kiosk and MFT enable secure file transfers into air-gapped networks by using multiscanning (with 30+ antivirus engines) and Deep Content Disarm and Reconstruction (CDR) to sanitize files without disrupting operations.
OPSWAT’s USB Firewall prevent infected devices from compromising critical systems. In environments requiring strict one-way data flow, OPSWAT also offers data diodes—hardware-enforced unidirectional gateways that ensure information can only move in one direction, preventing external access to sensitive internal systems. This adds a physical layer of protection against network-based threats. OPSWAT solutions operate offline, making them ideal for air-gapped settings, and also include vulnerability assessment tools to help comply with regulatory standards such as NERC CIP and ISA/IEC 62443. Our solutions also support proprietary OT protocols and provide APIs for integration with SCADA or SIEM platforms.
By enabling secure, policy-driven file transfers, ensuring compliance, and protecting against malware—even from removable media—OPSWAT helps organizations reduce cyber risk without disrupting operational continuity. This comprehensive approach aligns well with the specific needs of critical infrastructure and industrial control systems, where resilience, uptime, and safety are paramount.
How is OPSWAT working with governments and enterprises across the GCC to elevate cyber resilience?
Our approach to cybersecurity has evolved significantly over the last 12 months. Our solutions are designed to secure both IT and OT environments using patented technologies such as multi-scanning, Deep CDR, and advanced threat intelligence.
We’ve focused on enhancing our ability to detect and mitigate advanced threats, particularly those targeting complex and interconnected systems. We’ve integrated AI-powered threat detection, real-time monitoring, and data sanitization into our solutions to ensure that organizations can respond to threats quickly and effectively. As the cybersecurity landscape continues to shift, we’ve also prioritized automation and machine learning to proactively identify vulnerabilities and block attacks before they impact operations.
What’s your perspective on the evolving threat landscape in the MEA region?
The biggest cybersecurity challenge facing regional enterprises is the increasing sophistication of cyberattacks targeting critical infrastructure. As organizations become more interconnected and reliant on digital technologies, attackers are focusing on high-impact targets like power grids, government, defense and financial institutions. These types of attacks can cause widespread disruption and significant damage.
From a defender side, we’re seeing a major shift toward zero-trust architectures, increased investment in OT cybersecurity, and a growing emphasis on securing energy, manufacturing, and transportation.