Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Webinar Today: Managing IoT/OT Visibility, Protection and Monitoring in a Zero Trust Environment

Microsoft Cybersecurity Webinar

Microsoft Cybersecurity Webinar

Live Webinar on May 11th – 1PM ET – Register Now

Businesses are adding more cloud connection requirements to IoT/OT environments that were designed to be closed loops. In a truly air-gapped environment, most if not all communications between devices are considered trustworthy without extensive validation. With increased internet connectivity and the risks that come with it trust needs to be earned.

Join SecurityWeek and Microsoft for at live webinar on Wednesday, May 11, 2022 at 1:00 pm EDT to learn about live zero trust enablement through monitoring and automation of IoT/OT environments.

Register

Upcoming SecurityWeek Webinars:

● Missing Links for Managing OT Cyber Risk (May 25 – Waterfall Security)

● Threat Intelligence Summit (May 18 – Virtual Event)

● Blast Radius & Simulated Attack Paths (On Demand)

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

PR and marketing firm FleishmanHillard named Scott Radcliffe as the agency's global director of cybersecurity.

Portnox, a provider of zero trust access control solutions, announced that Joseph Rodriguez has joined the company as Chief Revenue Officer.

Cybersecurity awareness training firm NINJIO has appointed Jon Dion as its Chief Revenue Officer.

More People On The Move

Expert Insights

Related Content

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.

IoT Security

An innocent-looking portable speaker can hide a hacking device that launches CAN injection attacks, which have been used to steal cars.

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

Municipal Water Authority of Aliquippa in Pennsylvania confirms that hackers took control of a booster station, but says no risk to drinking water or...

ICS/OT

Mandiant's Chief analyst urges critical infrastructure defenders to work on finding and removing traces of Volt Typhoon, a Chinese government-backed hacking team caught in...