Select Page
EVENTS

Cybersecurity Conferences & Events

 

Webinar: Secure IT/OT Convergence with Zero Trust Access Control

Thursday, May 28, 2020 9:00 am PDT / 18:00 CET (Americas/EMEA)
Friday May 29, 2020 10:00 am JST / 6:00 pm PDT (APAC)

OT and IT are merging, creating greater efficiency because of greater connectivity. However, how do you secure both environments? Join Pulse Secure and Nozomi Networks to learn how Pulse Policy Secure leverages the contextual information from Nozomi Networks Guardian to identify and securely onboard different classes of IoT/IIoT devices.

Register Now – Thursday May 28, 2020 (Americas/EMEA)
Register Now – Friday May 29, 2020 (APAC)

Joint Solution Brief: IIoT Security with Nozomi Networks
Blog: OT/IoT Security Superheroes: Tackling the Remote Employee Challenge
Webpage: Guardian Industrial Strength OT and IoT Security and Visibility

Nozomi Networks Guardian v20: Expanding the Field from Control System Security to IoT

Monday, June 1, 2020 | 16:00-16:40 JST

Register Now

In this session, Ken Matsuo, Director of Solution Planning at Network Value Components (NVC) will introduce Guardian’s latest v20 solution. Guardian’s features and latest updates will be covered in detail, along with information on the nation-wide maintenance service provided by NVC.

Please note that this session will be in Japanese.

Registration Link: Nozomi Networks Guardian v20: Expanding the Field from Control System Security to IoT
Webpage: NVC/Nozomi Networks Seminar Series
Webpage: Guardian Industrial Strength OT and IoT Security and Visibility
Webpage: Guardian Community Edition free download

nvc-2020-06

Webinar: Securing ICS: Could Industrial Devices Take Your Network Down?

Tuesday June 2, 2020 | 11:30 AM SGT 1:30 PM AEST

Register Now

With the Internet of Things (IoT) bringing industrial devices online, cyber defenses must extend to new locations and technologies for the first time. In this joint webinar, Nozomi Networks and Ixia will discuss how the Industrial Internet of Things – or IIoT—is placing your operational technology (OT), company data, or brand at risk.

Gaining real-time visibility across ICS environments is critical to detecting complex threats that appear suddenly or develop over time. Learn from cybersecurity experts, including Nozomi Networks Phil Page, how to quickly improve security at power substations, oil and gas facilities, discrete manufacturing sites and other remote locations.

Register for this webinar to learn how to:

  • gain visibility into your industrial devices
  • accelerate response time across ICS environments
  • improve operational technology (OT) uptime and efficiency

Registration Link: Securing ICS: Could Industrial Networks Take Your Network Down?
Joint Solution Brief: Nozomi Networks + Ixia
Webpage: Keysight Visibility solution information

nn-keysight-webinar-logo

Japanese GUI and Nozomi Networks Guardian Functions and Operation

Monday, June 15, 2020 | 16:00-17:00 JST

Register Now

Using concrete demonstrations, Masayasu Narusawa, a manager at Network Value Components (NVC), will show you how to use Nozomi Networks Guardian v20. This seminar will cover how to use Guardian from a Japanese GUI from initial installation to operation.

Please note that this session will be in Japanese.

Registration Link: Japanese GUI and Nozomi Networks Guardian Functions and Operation
Webpage: NVC/Nozomi Networks Seminar Series
Webpage: Guardian Industrial Strength OT and IoT Security and Visibility
Webpage: Guardian Community Edition free download

nvc-2020-06

Webinar: The IoT Botnet Threat: What It Is and How to Deal with It

Watch Now

Dark Nexus is an IoT botnet that came to prominence near the beginning of 2020. In this webinar, find out about IoT botnet threats, and watch a demo showing how to detect Dark Nexus on networked systems from Nozomi Networks security experts.

Watch this webinar to learn about:

  • How IoT botnets work
  • Common propagation techniques
  • Hacktivism and financial gain
  • Strategies to protect networks
  • Demo – Dark Nexus real-time execution

Panelists:

  • Andrea Carcano, Co-founder and CPO, Nozomi Networks
  • Alessandro Di Pinto, Security Research Manager, Nozomi Networks
  • Ivan Speziale, Security Researcher, Nozomi Networks

Watch the webinar: The IoT Botnet Threat: What It Is and How to Deal with It
Podcast: The IoT Botnet Threat: What It Is and How to Deal with It
On-Demand Webinar: The Emerging Threat Intel Landscape: How Hackers are Using COVID-19
Webpage: COVID-19 Cybersecurity: Community Support
GitHub: COVID-19-Themed Network Indicators

Blog: OT/IoT Security Superheroes: Tackling the Remote Employee Challenge
Blog: COVID-19 (coronavirus) Malware: New OT and IoT Security Tools
Blog: Mitigating the Potential Impact of COVID-19-Related OT Security Risks

IoT-Botnet-Dark-Nexus-WEBINAR

The definitive difference between control system security and IT security

This webinar from NVC explained the differences between security measures for control systems and those for IT security. Attendees earned about these security measures, and the response policy when enacting them.

Please note that this session will be in Japanese.

Webpage: NVC/Nozomi Networks Seminar Series
Webpage: Guardian Industrial Strength OT and IoT Security and Visibility
Webpage: Guardian Community Edition free download

nvc-2020-06

Webinar: “Viruses are Disrupting Our Supply Chains – Where Do the Biggest Vulnerabilities Lie?”

Watch Now

If you think phishing scams and supply chain shortages are anomalies related to the coronavirus, you’d be wrong.

The reality is that disruptions to the manufacturing supply chain happen frequently, due to equipment downtime or failure, component unavailability, and nation-state sponsored cyberattacks.

Watch this webinar to learn about:

  • How COVID-19 disrupted the supply chain for toilet paper and personal protective equipment (PPE)
  • How viruses and other cyberattacks are impacting national security
  • What is being done to help DoD supply chain members become and stay cyber compliant
  • What manufacturers can do now to protect themselves from cyberattacks?

Panelists:

  • Armando Seay, Director of DreamPort, BoD Maryland Innovation & Security Institute
  • John Almlof, Director, Global Alliances, Nozomi Networks
  • Chris Grove, Technology Evangelist, Nozomi Networks

Watch the webinar: Viruses are Disrupting Our Supply Chains – Where Do the Biggest Vulnerabilities Lie?
Podcast: Viruses Are Disrupting Our Supply Chains – Where Do The Biggest Vulnerabilities Lie?
Blog: Government Helps Its Supply Chain Build OT and IoT Cybersecurity
Blog: OT/IoT Security Superheroes: Tackling the Remote Employee Challenge
Blog: COVID-19 (coronavirus) Malware: New OT and IoT Security Tools
Blog: Mitigating the Potential Impact of COVID-19-Related OT Security Risks
Webpage: COVID-19 Cybersecurity: Community Support
Website: DreamPort
Website: Maryland Innovation & Security Institute (MISI)
On-Demand Webinar:  The Emerging Threat Intel Landscape: How Hackers are Using COVID-19

NN-Linkedin-DreamPort-01

Webinar: “Suzanne Spaulding – Dealing with OT & IoT Security in the COVID-19 Era”

Watch Now

As global threat actors, including nation-states, exploit the COVID-19 crisis, OT and IoT security has become a greater challenge. Check out this interview with former DHS Undersecretary, Suzanne Spaulding to learn about:

  • Solarium Cybersecurity Commission recommendations as they relate to COVID-19 and beyond
  • Nation-state threats occurring during the COVID-19 pandemic
  • Election security
  • Accountability of citizens and governments to promote global democracy
  • Practical recommendations and resources for real-time threat intelligence

Panelists:

  • Suzanne Spaulding, Former DHS Undersecretary Cybersecurity and Infrastructure Security Agency (CISA)
  • Andrea Carcano, Chief Product Officer
  • Chris Grove, Technology Evangelist

Watch the Webinar: Suzanne Spaulding – Dealing with OT & IoT Security in the COVID-19 Era
Podcast: Suzanne Spaulding – Dealing with OT & IoT Security in the COVID-19 Era
Podcast: The Emerging Threat Intel Landscape: How Hackers are Using COVID-19
Podcast: Remote Access Monitoring: What To Watch Out For During the COVID-19 Pandemic
Blog: OT/IoT Security Superheros: Tackling the Remote Employee Challenge
Webpage:  COVID-19 Cybersecurity: Community Support
Webpage: Guardian Community EditionFree download

 

Suzanne-Spaulding-color

Training Webinar: “Guardian Community Edition – How to Counter COVID-19 Security Challenges”

Watch Now

Our third Threat Defense training session focuses on countering COVID-19 security challenges with enhanced visibility using the free Nozomi Networks Guardian Community Edition.

The first step to protecting your networks is knowing what you have. Guardian CE helps you get visibility into your OT and IoT assets by mapping your complete network without disrupting operations.

In this session, learn about:

  • How quickly GCE presents a live visualization of your OT/IoT network and its assets
  • How to use GCE to check for COVID-19 threat indicators
  • How to use GCE to monitor remote access connections

Your Nozomi Networks Security Training Team:

  • Scott Smith, Technical Sales Engineer
  • Chris Grove, Technology Evangelist

Watch the Webinar: “Guardian Community Edition – How to Counter COVID-19 Security Challenges”
Webpage: Guardian Community EditionFree download
Podcast: The Emerging Threat Intel Landscape: How Hackers are Using COVID-19
Podcast: Remote Access Monitoring: What To Watch Out For During the COVID-19 Pandemic
Blog: COVID-19 (coronavirus) Malware: New OT and IoT Security Tools
Webpage:  
COVID-19 Cybersecurity: Community Support
Blog: COVID-19 Chinoxy Backdoor: A Network Perspective

EXP_blog-13-GCE-training-webinar-image-subheadline

Webinar: “Remote Access Monitoring – What To Watch Out For During the COVID-19 Pandemic”

Podcast

Working from home has become the norm for millions of people around the world. In many cases remote access is now the only safe way to maintain standard industrial operational processes. This tectonic shift requires an immediate adaption to your organization’s OT and IoT security program.

In this second Threat Defense training session, Nozomi Networks security experts focus on the challenges of remote access monitoring.

Learn about:

  • What to watch out for when securing remote access
  • The importance of asset visibility
  • Free tools and rules to check remote access details

Information sharing and Q&A with Nozomi Networks Security Experts:

  • Andrea Carcano, Chief Product Officer
  • Chris Grove, Technology Evangelist
  • Scott Smith, Technical Sales Engineer

Podcast: “Remote Access Monitoring – What to Watch Out For During the COVID-19 Pandemic” 
Podcast: “The Emerging Threat Landscape: How Hackers are Using COVID-19”
Blog: COVID-19 (coronavirus) Malware: New OT and IoT Security Tools

Webpage:  COVID-19 Malware: Community Support
Blog: Mitigating the Potential Impact of COVID-19-Related OT Security Risks

Webinar: “The Emerging Threat Intel Landscape – How Hackers Are Using COVID-19”

Watch Now

As the COVID-19 coronavirus spreads across the globe and malicious threat actors find new ways to exploit the pandemic for their own gain, the critical infrastructure we rely on for everyday life has never been at greater risk.

Watch Nozomi Networks security experts share our first coronavirus-related Threat Defense training session. Find out how COVID-19 is changing the cyber threat landscape, what free tools are available, and how you can defend your organization from hackers taking advantage of the situation.

Learn about:

  • The COVID-19 cyber threat landscape
  • Techniques used by threat actors to perform attacks
  • Sectors targeted by phishing campaigns
  • Free threat intel downloads

Information sharing and Q&A with Nozomi Networks Security Experts:

  • Andrea Carcano, Chief Product Officer
  • Alessandro Di Pinto, Security Research Manager
  • Chris Grove, Product Evangelist

Recorded Webinar: “The Emerging Threat Intel Landscape: How Hackers Are Using COVID-19”
Blog: COVID-19 (coronavirus) Malware: New OT and IoT Security Tools
Webpage:  COVID-19 Malware: Community Support
Blog: Mitigating the Potential Impact of COVID-19-Related OT Security Risks

Webinar: Keysight (Ixia) + Nozomi Networks: “Securing ICS – Can industrial devices take your network down?”

March 31, 2020, 10:00AM PDT

In this joint webinar from Nozomi Networks and Ixia, participants learned how the Industrial Internet of Things (IIoT) is placing operational technology, company data, and brand at risk. The webinar covered ways of quickly improving security at power substations, oil and gas facilities, discrete manufacturing sites and other remote locations. 

Attendees also learned how to:

  • Gain visibility of industrial devices for the first time
  • Accelerate response time across ICS environments
  • Improve operational technology (OT) uptime and efficiency

Watch Webinar
Joint-solution brief: Nozomi Networks + Keysight (Ixia)
Webpage: Keysight Visibility solution information

nn-keysight-webinar-logo

Webinar: Cybersecurity is Not “One Size Fits All”

March 17, 2020, 2:30pm Pacific / 4:30pm Eastern

This webinar was part of the Schneider Electric Cybersecurity Virtual Academy 2020. Many people think that cybersecurity is an “all or nothing” approach, or that only big companies are targets, or that smaller companies can’t afford comprehensive cybersecurity production. Nozomi Networks’ Chris Grove spoke on an expert panel discuss some of the common elements in cybersecurity that all companies must consider. The panel also looked at some specific difference in the approach for machine-focused operations as well as Hybrid and Process manufacturing.

Watch Webinar
Online Solution Brief: Assessing Risk in My Manufacturing Environment
Industry Brief: Manufacturing – Improving Operational Resiliency Through ICS Visibility and Cybersecurity
Blog: Nozomi Networks, Schneider Electric Work Together to Secure Critical Infrastructure

SANS ICS Security Summit 2020

March 2 – 3 Orlando, FL, USA

Nozomi Networks was thrilled to be a silver sponsor of the SANS ICS Security Summit in Orlando.

The two-day summit featured ICS security courses and sessions to help attendees delve into the current state of the industrial cybersecurity landscape. Learning opportunities included: the demonstration and deconstruction of real-world ICS attacks, case studies and success stories, and ways for ICS owners and operators to mitigate threats against malicious activity.

Ronny Fredericks delivered a Nozomi Networks Lunch & Learn session: “OT and IoT Cybersecurity in Action.”


Industry Report: SANS 2019 OT/ICS Cybersecurity Survey
Webinar: SANS 2019 State of OT/ICS Cybersecurity Survey
Whitepaper: Advancing ICS Visibility and Cybersecurity with the Nozomi Networks Solution
Executive Brief: Business Leaders Need to Quickly Shift Focus to Industrial Cybersecurity
Executive Brief: The Cost of OT Cyber Security Incidents and How to Reduce Risk
Blog: SANS OT/ICS Security Research: 3 Key Findings
Visit event website

sans-2020-logo