Presented by
There are huge financial benefits for organizations to connect IT and OT networks, but it is not without risk. The multi-billion dollar “collateral damage” caused by NotPetya, combined with targeted attacks on industrial control environments has highlighted the importance of monitoring industrial networks for threats.
Efforts to monitor these critical, revenue generating networks and incorporate this into the SOC are still in the early stages and organizations around the globe are taking a range of approaches.
Please join this webinar on February 6th at 1PM ET, as Claroty along with veteran security and operational practitioners who have faced these challenges first-hand discuss foundational people, process and technology decisions and explore various approaches to addressing these issues.

Written By
Mike Lennon
For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.
More from Mike Lennon
- Watch Now: Threat Detection and Incident Response Virtual Summit
- Registration Now Open: 2023 ICS Cybersecurity Conference | Atlanta
- NetRise Adds $8 Million in Funding to Grow XIoT Security Platform
- Virtual Event Today: Zero Trust Strategies Summit
- Virtual Event Tomorrow: Zero Trust Strategies Summit
- Watch: How to Build Resilience Against Emerging Cyber Threats
- Video: How to Build Resilience Against Emerging Cyber Threats
- Webinar Today: Understanding Hidden Third-Party Identity Access Risks
Latest News
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
- Enzo Biochem Ransomware Attack Exposes Information of 2.5M Individuals

Click to comment