Select Page
EVENTS

Cybersecurity Conferences & Events

 

Webinar: How to Manage Cyber Security Threats against OT Infrastructure?

Wednesday October 21, 2020 | 13:00 CET, 7:00 am EDT

Register

Join three specialized cyber security companies with insights into and technologies for securing OT-infrastructure.

The webinar will discuss how to handle the evolving cyber threats against OT infrastructure. On a weekly basis we hear about production companies and critical infrastructure being hit by malware or other hacking activities. The number of discovered OT vulnerabilities is increasing, the threat surface is constantly expanding, and the number of attacks on OT infrastructure is exploding (2000% YoY as per latest IBM X-Force Threat Intelligence Report Index).

Speakers

  • Nozomi Networks: Phillip Page – Global Director for Partner Technologies
  • SecuriOT: Jørgen Hartig – Strategic Advisor
  • FireEye: Rob Caldwell – Director – Industrial Control Systems/Operational Technology Security

Webinar Registration Link: How to Manage Cyber Security Threats Against OT Infrastructure
Solution Brief: Nozomi Networks
Research Report: OT/IoT Security Report 2020 1H
Webpage: Closing the IoT Security Gap

securiOT-logo

Webinar: P2P Botnets: Following the Network Trail

Wednesday, November 4, 2020 | 8:00 am PDT, 11:00 am EDT, 17:00 CET

Register Now

To increase botnet resiliency, threat actors are now using a hybrid model, rather than a pure peer-to-peer one. In a P2P hybrid network topology, the botnet can survive a takedown of nodes with specialized roles, and reorganize itself accordingly.

It can be quite challenging to disrupt the malicious activities of peer-to-peer (P2P) botnets, but there are proven strategies that can be followed when a specific network has been affected.

Join us to learn about:

  • How P2P/hybrid botnets operate
  • Spotting P2P/hybrid botnet infections on your network
  • Effective ways to disrupt botnets

Panelists

  • Ivan Speziale, Security Researcher, Nozomi Networks
  • Giannis Tsaraias, Security Researcher, Nozomi Networks
  • Chris Grove, Technology Evangelist, Nozomi Networks

Webinar Registration Link: P2P Botnets: Following the Network Trail 
Blog: Dark Nexus IoT Botnet: Analyzing and Detecting its Network Activity 
Webinar: The IoT Botnet Threat: What It Is and How to Deal with It 
Infographic: Botnets and Ransomware Target OT & IoT Cybersecurity 

IoT Festival Australia

Wednesday, September 30, 2020 to Wednesday, December 23, 2020

Register Now

The IoT Festival is for the diverse range of Australian industry, government and research organisations developing and using Internet of Things (IoT) systems. IoT is being used to manage everything from Australia’s environment, farms and water supplies to its energy usage, transport, public health, cities, towns and infrastructure.

Visit the Nozomi Networks Sponsor Zone to learn:

  • Why we’re the leader in OT and IoT security and visibility
  • How we accelerate digital transformation by unifying cybersecurity visibility

Event Registration Link: IoT Festival Australia 
Research Report: OT/IoT Security Report 2020
Case Study: Safeguarding New Zealand’s Power and Telecoms Network

iot-festival-conference-logo-badge

BNEW Barcelona (Barcelona New Economy Week)

October 6-9, 2020 | Barcelona, Spain

Barcelona Economy week focused on five different sectors: logistics, real estate, digital industry, e-commerce and economic zones.

Attendees learned about technological innovations fueled artificial intelligence, IoT, Industry 4.0, and much more. During BNEW, Nozomi Networks Co-founder and CPO Andrea Carcano participated in a Digital Industry discussion panel: “Cybersecurity: An Essential Issue in the Digital Society.”

Event Website: BNEW Barcelona
Research Report: OT/IoT Security Report 2020 1H
Podcast: Andrea Carcano: Getting to Know a Cybersecurity Entrepreneur
Webpage: Closing the IoT Security Gap
White Paper: Advancing ICS Visibility and Cybersecurity with Nozomi Networks

Webinar: Accelerating Digital Transformation Drives Innovation in Industrial Cybersecurity

Watch Now

Broadcast Date: October 14, 2020

Digital transformation has been fueled by a global pandemic that forced many of us to work from home. The need for secure remote access, coupled with rapid IT/OT convergence has led to some very innovative industrial cybersecurity solutions.

Watch this virtual Fireside Chat with security visionaries from Schneider Electric and Nozomi Networks to learn about:

  • Trends in industrial cybersecurity
  • Why the “New Normal” demands a new approach
  • Use case for an innovative security solution

Panelists

  • Chet Namboodri, Vice President, WW Business Development & Channel Sales
  • Edgard Capdevielle, CEO, Nozomi Networks
  • Jay Abdallah, Vice President Cybersecurity Services, Schneider Electric

Listen to the Podcast: Accelerating Digital Transformation Drives Innovation in Industrial Cybersecurity
Watch the Webinar: Accelerating Digital Transformation Drives Innovation in Industrial Cybersecurity
Press Release: Nozomi Networks Delivers OT & IoT Cybersecurity Via the Schneider Electric Exchange

Webinar: Data Centers Are Migrating To the Cloud – Is Your OT Security Infrastructure Ready?

Watch Now

Recorded: October 6, 2020

Enterprises are moving some or all of their data and applications from on-prem to the public cloud, or even SaaS. And, as OT and IT convergence accelerates, OT teams are evaluating their options for the future. Unfortunately, organizations often fail to ensure that their security infrastructure is ready before migrating.

Learn about:

  • Rethinking your security strategy before migrating to the cloud
  • Common mistakes made when migrating workloads to the cloud
  • Private cloud, public cloud or SaaS options – which one is right for you?

Panelists

  • Patrick Bedwell, Senior Director of Product and Partner Marketing
  • Chris Grove, Technology Evangelist

Webinar: Data Centers Are Migrating To the Cloud – Is Your OT Security Infrastructure Ready?
Research Report: OT/IoT Security Report 2020
Blog: Your Guide to the MITRE ATT&CK Framework for ICS
Challenge Webpage: Using the MITRE ATT&CK Framework to Accelerate & Simplify OT/IoT Threat Response

Panel Session: The Devil’s in Dependency: Data-Driven Visibility to Improve Security

Watch Now

Recorded: September 24, 2020

Now more than ever, innovation must go on, wherever we are working. And just as you continue innovating what’s next, we are innovating our next Keysight World events to bring you the latest in industry, design and test trends from the comfort of your desk while maintaining the technical depth you need.

Immerse yourself in our co-hosted panel discussion titled: The Devil’s in Dependency: Data-Driven Visibility to Improve Security.

See how the IT Network Security Track panel discussion will help your organization gain complete visibility into your network.


Watch the Panel Session:
The Devil’s in Dependency: Data-Driven Visibility to Improve Security
Webinar: Keysight (Ixia) + Nozomi Networks: “Securing ICS – Can industrial devices take your network down?”
Webinar: Securing ICS: Could Industrial Devices Take Your Network Down?
Solution Brief: Keysight

ixia-keysight-tech-logo

Webinar: Security Measures for Building and Operational Control Systems (SOC)

Recorded: September 18, 2020

Cyberattacks are increasing like never before. Especially on critical social infrastructures such as electricity, gas, and water systems, factory and plant control systems, and building systems. In many cases, serious damage has been reported.

Learn about:

  • Building a robust control system security ecosystem
  • Taking countermeasures with a demonstration of Nozomi Networks Guardian
  • Panasonic and Mori Building use cases

Please note that this session was in Japanese.


Data Sheet: Nozomi Networks Guardian
Nozomi Networks Guardian Community Edition: Try it Free

terilogy-bbsec-webinar

Webinar: Cyber Crime Migration to Critical Infrastructure

Watch Now

Recorded: Wednesday September 9, 2020

The recent announcement by Australian Prime Minister, Scott Morrison, should serve as a warning to all that state-sponsored attacks are part of our current landscape. They will be a significant challenge going forward. Ransomware is migrating from IT to OT environments. Critical infrastructure and the production and delivery of essential goods and services demands equal care and attention when it comes to cybersecurity.

In this webinar, Nozomi Networks Director of Business Development & Partner Technologies Phillip Page, Chinese Cyber Espionage Expert Retired Lt Colonel Bill Hagestad II and former Federal Prosecutor US Department of Justice Jonathan Rusch discussed what every critical infrastructure and industrial operation should know to keep operations safe in this interactive forum.

They covered:

  • Ransomware attacks targeting critical infrastructure for profit and power
  • How the lines are blurring between organised cybercrime and nation-sponsored efforts
  • Critical infrastructure and Cyber Espionage

Panelists:

  • Phillip Page, Nozomi Networks Director of Business Development & Partner Technologies
  • Bill Hagestad II, Chinese Cyber Espionage Expert Retired Lt Colonel
  • Jonathan Rusch, Former Federal Prosecutor US Department of Justice

Facilitator

  • Brian Hay, Former Operational Commander of Fraud and Cybercrime, Queensland Police

Watch the Webinar: Cyber Crime Migration to Critical Infrastructure
Report: OT/IoT Security Report
Infographic: IoT Botnets and Shifting Ransomware Target OT & IoT Cybersecurity Weaknesses in the First Half of 2020
Try It: Try our Nozomi Networks Guardian Community Edition.  –
It’s Free.
Australian Government Paper: Protecting Critical Infrastructure and Systems of National Significance.

Webinar--Cyber-Crime-Migration-to-Critical-Infrastructure-500x500px

Webinar: How to Use the MITRE ATT&CK Framework for ICS

Watch Now

Recorded: September 9, 2020

The MITRE ATT&CK threat modelling framework for Industrial Control Systems (ICS) classifies malicious cybersecurity events against an operational technology (OT) environment.

The community-sourced framework is designed to describe the course of action an adversary might follow, and create a knowledge base of threat actor behaviors. Security teams can use this information to enhance their organization’s security strategies and policies.

Learn about:

  • Differences between MITRE for IT and MITRE for ICS
  • MITRE ATT&CK framework complexities to watch out for
  • How to use the MITRE ATT&CK framework to protect ICS/OT environments

Panelists

  • Yiannis Stavrou, Security Researcher
  • Chris Grove, Technology Evangelist

Watch the Webinar: How to Use the MITRE ATT&CK Framework for ICS
Research Report: OT/IoT Security Report 2020

Blog: Your Guide to the MITRE ATT&CK Framework for ICS
Challenge Webpage: Using the MITRE ATT&CK Framework to Accelerate & Simplify OT/IoT Threat Response

 

 

Webinar: What are the security measures required for industrial control systems?

Cyber threats come in all shapes and sizes. Whether it be ransomware, DDos, drive-by or an SQL injection – you need to have a better understanding of the attack and where it came from. Judging by recent reports, it looks like critical infrastructure and industrial control networks are the latest targets. What actions do we take to prevent these attacks from happening in the first instance?

In this webinar, Broadband Security Co in conjunction with Terilogy Co, covered the threats faced today by industrial control systems and their required countermeasures.

The webinar covered:

  • Security measures for industrial control systems
  • Introduction and demonstration to OT Security/OT-IDS – Nozomi Networks Guardian
  • Three typical operational points in visualization, threat detection and forensics

Data Sheet: Nozomi Networks Guardian
Nozomi Networks Guardian Community Edition: Try it Free

terilogy-bbsec-webinar

Webinar: Top 10 Pitfalls to Avoid When Choosing a Cybersecurity Solution

Watch Now

Recorded: August 27, 2020

Selecting the right cybersecurity solution can be complex and confusing, particularly when you need to address specialized risks that some basic, off-the-shelf products just can’t handle. In many cases, your selection process will include well and lesser known vendors, and different approaches to security.

This webinar will cover pitfalls you may encounter during the journey from evaluation to selection, purchase and deployment.

Join us to learn about:

  • Common pitfalls encountered during evaluation and selection
  • Questions to ask the vendors under consideration
  • How to successfully navigate around the hazards

Panelists

  • Chris Grove, Technology Evangelist, Nozomi Networks
  • Kim Legelis, CMO, Nozomi Networks

Watch the Webinar: Top 10 Pitfalls to Avoid When Choosing a Cybersecurity Solution
Solution Brief: Nozomi Networks
Webpage: Challenge: Applying Cybersecurity Best Practices
Blog: What IT Needs to Know about OT/IoT Security Threats in 2020

Webinar: Securing Remote Mining and Industrial Sites

Watch Now

Recorded: August 19, 2020

With expanding digitization and modernization, mining infrastructure has been exposed to cyberattacks that can lead to unplanned downtime. Mining networks are large and distributed, and technology has been introduced to connect sites and track mobile equipment. However, there is generally no strategic approach to securing these mine sites.

Learn how mining companies can secure their global operations from Nozomi Networks’ Malcolm Bailie and NTT OT Cybersecurity Practice Leads.

Panelists:

  • Malcolm Bailie, APAC Head of Solution Delivery and Projects, Nozomi Networks
  • Michael Schlachter, OT Cybersecurity Practice Lead, NTT
  • Zhanwei Chan, Global OT/IoT Practice Lead, NTT

Watch the Webinar: Securing Remote Mining and Industrial Sites
Webpage: Securing OT & IoT in Mining
Industry Brief: Mining: Securing Operational Resiliency Through ICS Visibility and Cybersecurity

nn-ntt-event-logo