Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Webinar Today: Merging OT/ICS Threat Detection Into Your SOC

Presented by

Presented by


There are huge financial benefits for organizations to connect IT and OT networks, but it is not without risk. The multi-billion dollar “collateral damage” caused by NotPetya, combined with targeted attacks on industrial control environments has highlighted the importance of monitoring industrial networks for threats.  

Efforts to monitor these critical, revenue generating networks and incorporate this into the SOC are still in the early stages and organizations around the globe are taking a range of approaches.

Please join this webinar on February 6th at 1PM ET, as Claroty along with veteran security and operational practitioners who have faced these challenges first-hand discuss foundational people, process and technology decisions and explore various approaches to addressing these issues.

Register Now
Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).

Cybercrime

Energy giants Schneider Electric and Siemens Energy confirm being targeted by the Cl0p ransomware group in the campaign exploiting a MOVEit zero-day.

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.

ICS/OT

Municipal Water Authority of Aliquippa in Pennsylvania confirms that hackers took control of a booster station, but says no risk to drinking water or...

ICS/OT

Mandiant's Chief analyst urges critical infrastructure defenders to work on finding and removing traces of Volt Typhoon, a Chinese government-backed hacking team caught in...