Select Page
EVENTS

Cybersecurity Conferences & Events

 

Webinar: How to Use the MITRE ATT&CK Framework for ICS

Wednesday September 9, 2020 | 8:00 am PDT, 11:00 am EDT, 17:00 CET

Register

The MITRE ATT&CK threat modeling framework for Industrial Control Systems (ICS) classifies malicious cybersecurity events against an operational technology (OT) environment.

The community-sourced framework is designed to describe the course of action an adversary might follow, and create a knowledge base of threat actor behaviors. Security teams can use this information to enhance their organization’s security strategies and policies.

Join us to learn about:

  • Differences between MITRE for IT and MITRE for ICS
  • MITRE ATT&CK framework complexities to watch out for
  • How to use the MITRE ATT&CK framework to protect ICS/OT environments

Panelists

  • Yiannis Stavrou, Security Researcher
  • Patrick Bedwell, Senior Director of Product and Partner Marketing
  • Chris Grove, Technology Evangelist

Webinar Registration Link: How to Use the MITRE ATT&CK Framework for ICS
Research Report: OT/IoT Security Report 2020

Blog: Your Guide to the MITRE ATT&CK Framework for ICS
Challenge Webpage: Using the MITRE ATT&CK Framework to Accelerate & Simplify OT/IoT Threat Response

 

 

Webinar: Cyber Crime Migration to Critical Infrastructure

Wednesday September 9, 2020 | 8:00 am SST, 10:00 am AEST, 12:00 pm NZST

Register

The recent announcement by Australian Prime Minister, Scott Morrison, should serve as a warning to all that state-sponsored attacks are part of our current landscape. They will be a significant challenge going forward. Ransomware is migrating from IT to OT environments. Critical infrastructure and the production and delivery of essential goods and services demands equal care and attention when it comes to cybersecurity.

In this webinar, Nozomi Networks Director of Business Development & Partner Technologies Phillip Page, Chinese Cyber Espionage Expert Retired Lt Colonel Bill Hagestad II and former Federal Prosecutor US Department of Justice Jonathan Rusch will discuss what every critical infrastructure and industrial operation should know to keep operations safe in this interactive forum.

They will cover:

  • Ransomware attacks targeting critical infrastructure for profit and power
  • How the lines are blurring between organised cybercrime and nation-sponsored efforts
  • Critical infrastructure and Cyber Espionage

Panelists:

  • Phillip Page, Nozomi Networks Director of Business Development & Partner Technologies
  • Bill Hagestad II, Chinese Cyber Espionage Expert Retired Lt Colonel
  • Jonathan Rusch, Former Federal Prosecutor US Department of Justice

Facilitator

  • Brian Hay, Former Operational Commander of Fraud and Cybercrime, Queensland Police

Webinar and On-Demand Registration Link: Cyber Crime Migration to Critical Infrastructure
Report: OT/IoT Security Report
Infographic: IoT Botnets and Shifting Ransomware Target OT & IoT Cybersecurity Weaknesses in the First Half of 2020
Try It: Try our Nozomi Networks Guardian Community Edition.  –
It’s Free.
Australian Government Paper: Protecting Critical Infrastructure and Systems of National Significance.

Webinar--Cyber-Crime-Migration-to-Critical-Infrastructure-500x500px

Panel Session: The Devil’s in Dependency: Data-Driven Visibility to Improve Security

Thursday, September 24, 2020 | 1:00pm SST | 3:00pm AEST

Register

Now more than ever, innovation must go on, wherever we are working. And just as you continue innovating what’s next, we are innovating our next Keysight World events to bring you the latest in industry, design and test trends from the comfort of your desk while maintaining the technical depth you need.

Immerse yourself in our co-hosted panel discussion titled: The Devil’s in Dependency: Data-Driven Visibility to Improve Security.

Register today and see how the IT Network Security Track panel discussion will help your organization gain complete visibility into your network.

Webinar: Keysight (Ixia) + Nozomi Networks: “Securing ICS – Can industrial devices take your network down?”
Webinar: Securing ICS: Could Industrial Devices Take Your Network Down?
Solution Brief: Keysight

ixia-keysight-tech-logo

Webinar: What are the security measures required for industrial control systems?

Cyber threats come in all shapes and sizes. Whether it be ransomware, DDos, drive-by or an SQL injection – you need to have a better understanding of the attack and where it came from. Judging by recent reports, it looks like critical infrastructure and industrial control networks are the latest targets. What actions do we take to prevent these attacks from happening in the first instance?

In this webinar, Broadband Security Co in conjunction with Terilogy Co, covered the threats faced today by industrial control systems and their required countermeasures.

The webinar covered:

  • Security measures for industrial control systems
  • Introduction and demonstration to OT Security/OT-IDS – Nozomi Networks Guardian
  • Three typical operational points in visualization, threat detection and forensics

Data Sheet: Nozomi Networks Guardian
Nozomi Networks Guardian Community Edition: Try it Free

terilogy-bbsec-webinar

Webinar: Top 10 Pitfalls to Avoid When Choosing a Cybersecurity Solution

Watch Now

Selecting the right cybersecurity solution can be complex and confusing, particularly when you need to address specialized risks that some basic, off-the-shelf products just can’t handle. In many cases, your selection process will include well and lesser known vendors, and different approaches to security.

This webinar will cover pitfalls you may encounter during the journey from evaluation to selection, purchase and deployment.

Join us to learn about:

  • Common pitfalls encountered during evaluation and selection
  • Questions to ask the vendors under consideration
  • How to successfully navigate around the hazards

Panelists

  • Chris Grove, Technology Evangelist, Nozomi Networks
  • Kim Legelis, CMO, Nozomi Networks

Watch the Webinar: Top 10 Pitfalls to Avoid When Choosing a Cybersecurity Solution
Solution Brief: Nozomi Networks
Webpage: Challenge: Applying Cybersecurity Best Practices
Blog: What IT Needs to Know about OT/IoT Security Threats in 2020

Webinar: Securing Remote Mining and Industrial Sites

Watch

With expanding digitization and modernization, mining infrastructure has been exposed to cyberattacks that can lead to unplanned downtime. Mining networks are large and distributed, and technology has been introduced to connect sites and track mobile equipment. However, there is generally no strategic approach to securing these mine sites.

Learn how mining companies can secure their global operations Nozomi Networks’ Malcolm Bailie and NTT OT Cybersecurity Practice Leads.

Panelists:

  • Malcolm Bailie, APAC Head of Solution Delivery and Projects, Nozomi Networks
  • Michael Schlachter, OT Cybersecurity Practice Lead, NTT
  • Zhanwei Chan, Global OT/IoT Practice Lead, NTT

Watch the Webinar: Securing Remote Mining and Industrial Sites
Webpage: Securing OT & IoT in Mining
Industry Brief: Mining: Securing Operational Resiliency Through ICS Visibility and Cybersecurity

nn-ntt-event-logo

Webinar: OT/IoT Security Report 2020

Watch Now

The first six months of 2020 saw an increase in threats to OT and IoT networks, including IoT botnet, ransomware and COVID-19-themed attacks.

This webinar covers the most active threats seen, and provides insight into their tactics, techniques and procedures, along with recommendations for protecting your critical networks.

Learn about:

  • The OT/IoT threat landscape: IoT malware, ransomware, COVID-19-themed malware
  • The tactics and techniques of the most important threat actors
  • The top 2020 ICS vulnerabilities and their ongoing impact on risk
  • Recommendations for securing OT/IoT networks

Panelists:

  • Chris Grove, Technology Evangelist, Nozomi Networks
  • Alessandro Di Pinto, Security Research Manager, Nozomi Networks
  • Ivan Speziale, Security Researcher, Nozomi Networks

Watch the Webinar: OT/IoT Security Report 2020
Podcast: OT/IoT Security Report 2020
Webpage: Nozomi Networks Labs
Webpage: COVID-19 Cybersecurity: Community Support
Blog: Ripple20 – New Zero-Day Vulnerabilities Send Shockwaves Across IoT

Blog: Dark Nexus IoT Botnet: Analyzing and Detecting its Network Activity

Webinar: Improving SOC Efficiency

Watch Now

Security Operations Center (SOC) analysts find it challenging to prioritize their workload, including managing the alerts triggered by ICS and/or IoT systems.

This webinar covers why this is happening, and how automated OT/IoT monitoring and anomaly detection solutions can be used to increase SOC efficiency while enhancing responsiveness.

Join us to learn about:

  • SOC efficiency – lessons learned
  • Avoiding common SOC OT/IoT monitoring pitfalls

Panelists:

  • Andrea Carcano, Co-founder & CPO, Nozomi Networks
  • Chris Grove, Technology Evangelist, Nozomi Networks

Watch the Webinar: Improving SOC Efficiency
Listen to the Podcast: Improving SOC Efficiency
Executive Brief: Integrating OT into OT/IoT SOCs
Blog: Making the Case for an IT/OT Security Operations Center (SOC)

White Paper: Advancing ICS Visibility and Cybersecurity with the Nozomi Networks Solution
Upcoming Webinar: OT/IoT Security Report 2020

Webinar: Sharpen Your ICS Security Edge with Better Visibility

Watch on Demand

How is OT/OT cybersecurity convergence key in detecting APT activities? Join security experts from FireEye and Nozomi Networks to learn more about how OT/IT convergence can be overlooked in security monitoring and visibility programs.

Key Takeaways:

  • Understand the escalation of cyber-physical attack capabilities and the OT attack surface
  • Ensure IT/OT convergence is not overlooked in your OT visibility capabilities
  • Understand how Triton and Industroyer malwares exploited an overlooked IT/OT-converging cybersecurity to compromise systems
  • A comparison of IT and OT sample attacks key tactics, techniques and procedures
  • Understand the role of OT monitoring visibility in security programs

Panelists:

  • Moath Sakaji, Mandiant Lead ICS/OT Security Consultant MEA, FireEye
  • Jean Abbal, Technical Sales Lead, MENA, Nozomi Networks

On-Demand Link: Sharpen your ICS Security Edge with Better Visibility 
Blog: Nozomi Networks Selected by FireEye for ICS Depth & Technical Excellence
Learning Guide: The IT Pro’s Guide to OT/IoT Security

Webinar: The Impact and Threats of a Connected Society

We believe in a secure, connected world and enabling OT security is of paramount importance. Digitization and environmental challenges continue to increase, particularly as employee populations shift to remote work. Implementing a standardized approach to managing this shift to remote work has put emphasis on ensuring the integrity of infrastructure, OT applications, and cloud-based workloads. Nozomi Networks and NTT discuss how we have helped clients across industries gain increased visibility and intelligence to optimize their security operations.

The webinar covered:

  • Security best practices for remote employee populations
  • Detecting and responding to emerging threats in the new business environment
  • Increased visibility and intelligence to optimize security operations

Panelists:

  • Edgard Capdevielle, CEO, Nozomi Networks
  • Warren Small, SVP Innovation and Sales, Security Division, NTT Ltd

Webinar: The Impact and Threats of a Connected Society
Joint Solution Brief: NTT and Nozomi Networks: Cybersecurity for Industrial Control Systems

Webpage: NTT
Blog: OT/IoT Security Superheroes: Tackling the Remote Employee Challenge

nn-ntt-event-logo

Japanese GUI and Nozomi Networks Guardian Functions and Operation

Using concrete demonstrations, Masayasu Narusawa, a manager at Network Value Components (NVC), showed how to use Nozomi Networks Guardian v20. This seminar covered how to use Guardian from a Japanese GUI from initial installation to operation.

Please note that this session was in Japanese.

Webpage: NVC/Nozomi Networks Seminar Series
Webpage: Guardian Industrial Strength OT and IoT Security and Visibility
Webpage: Guardian Community Edition free download

nvc-2020-06

Webinar: Smart Grids: Securing Encrypted Communications

Watch Now

Thanks to the increasing influence of IT, where encrypted protocols have existed for some time, OT groups have been able to create encrypted OT protocols. Vendors are now starting to implement them in real-world device firmware.

Using IEC 62351 as an example, this webinar combines research with field expertise to drill into what is being done, and the security implications of encrypted OT/IoT systems.

Watch the webinar to learn about:

  • Encryption in the OT world
  • IEC 62351: Parts 3 and 7
  • Attack scenarios
  • Server NTP hijacking
  • Rogue CA certificate
  • The future of the threat detection landscape

Panelists:

  • Yiannis Stavrou, Security Researcher, Nozomi Networks
  • Chris Grove, Technology Evangelist, Nozomi Networks

Watch the Webinar: Smart Grids: Securing Encrypted Communications
Listen to the Podcast: Smart Grids: Securing Encrypted Communications
Blog: IEC 61850 Meets IEC 62351: Securing GOOSE Power Grid Weaknesses
Blog: Mitigating the Potential Impact of COVID-19-Related OT Security Risks

Webinar: Securing ICS: Could Industrial Devices Take Your Network Down?

With the Internet of Things (IoT) bringing industrial devices online, cyber defenses must extend to new locations and technologies for the first time. In this joint webinar, Nozomi Networks and Ixia discussed how the Industrial Internet of Things – or IIoT—is placing your operational technology (OT), company data, or brand at risk.

Gaining real-time visibility across ICS environments is critical to detecting complex threats that appear suddenly or develop over time. Learn from cybersecurity experts, including Nozomi Networks Phil Page, how to quickly improve security at power substations, oil and gas facilities, discrete manufacturing sites and other remote locations.

Find out how to:

  • gain visibility into your industrial devices
  • accelerate response time across ICS environments
  • improve operational technology (OT) uptime and efficiency

Joint Solution Brief: Nozomi Networks + Ixia
Webpage: Keysight Visibility solution information

nn-keysight-webinar-logo