Select Page

Cybersecurity Conferences & Events


No Results Found

The posts you requested could not be found. Try changing your module settings or create some new posts.

How to Build an Effective OT/IoT Cybersecurity Risk & Compliance Program

May 26, 2021
Watch On-Demand

U.S. regulators are looking into how business operators maintain effective cybersecurity. The incoming Security of Critical Infrastructure legislative amendments will no doubt lead to an increased security compliance regime for any country.

Companies everywhere should proactively develop a robust cybersecurity compliance program – not because of legislation but because it’s good security hygiene and practice. How can you prepare for that now?

Learn about:

  • The steps involved in building out a Risk & Compliance Program
  • Effective design, implementation and response components
  • Building a quality ecosystem that supports identifying, managing and mitigating risks
  • Gathering intelligence for making evidence-based decisions
  • Ensuring your time and effort leads to a quality outcome

Blog: CMMC Compliance Made Easy With the Nozomi Networks Solution
Compliance Mapping Guide: How the Nozomi Networks Solution Supports CMMC Compliance
Compliance Mapping Guide: How the Nozomi Networks Solution Supports the NIS Directive & Regulations
Compliance Mapping Guide: How the Nozomi Networks Solution Supports NIST CSF Compliance

Best Practices to Deploy Zero Trust With AI-driven Threat Detection for IT/OT Networks

May 19, 2021

Watch On-Demand

Industrial control systems and OT networks are widely perceived as the most vulnerable attack vectors and most difficult endpoints to secure. They have traditionally been air gapped from IT networks and unavailable for remote access, but that is no longer possible. Securing OT networks has different requirements than IT networks and specialized security architectures are required.

In this webinar we explored current security and operational challenges faced by asset owners and operators as IT/OT networks converge. We shared best practices on why zero-trust, combined with AI-driven threat detection and automated remediation is a big improvement over traditional security – and why it’s effective against external and insider threats. We also provided recommendations for engaging OT and IT about developing a Zero-Trust strategy to protect your critical network infrastructure.

Gary Kinghorn, Director of Marketing, Tempered Networks
Chris Grove, CISSP, NSA-IAM, Technology Evangelist, Nozomi Networks

Demystifying the Colonial Pipeline Attack & How Ransomware Works

May 13, 2021

Watch On-Demand

What you need to know about OT Security attacks and their impact on industrial processes.

It seems like every day we’re reading about cybersecurity breaches and cyberattacks on critical infrastructure around the world. What used to be a once or twice a year occurrence 10 years ago now seems to be the new everyday normal.

The recent Darkside ransomware attack on Colonial Pipeline is just the latest in a spike of ransomware attacks on organizations with significant financial resources. During this presentation, we’ll overview the attack, the implications of this type of attack and what should you do now, if you haven’t taken action already.
You’ll learn:

  • How the attack happened and who was responsible?
  • Who is Darkside and what cybersecurity professionals should understand about them
  • Security practices you should put in place to counter ransomware
  • Actionable recommendations to prevent future ransomware incidents

CS4CA World: Using AI to Precisely Detect Anomalies in the OT Process

May 6, 2021

CS4CA World took place virtually, as part of a unique initiative to re-connect the cyber security industry through a global community dedicated to safeguarding ICS.

Nozomi Networks Product Evangelist, Chris Grove, presented on how to use AI to precisely detect anomalies in the OT process.

Webinar: Bringing OT Threat Detection and Response to the Next Level

May 4, 2021

As the convergence of IT and OT networks accelerates, there is a greater need for centralization of IT and OT information.

ICS have grown to become more automated and advanced, but also more connected to conventional and enterprise networks than ever before. This increase in connectivity has helped organizations to reach a higher level of efficiency but it has also exposed ICS networks, and their devices, to new cyber-borne and operational vulnerabilities.

Fortinet and Nozomi Networks have partnered to deliver full management and security visibility into every asset of the IT/OT networks.

During this webinar, we covered:

  • The integration between Nozomi Networks and Fortinet solutions, including key differentiators
  • Use cases and success stories
  • Q&A

Webinar: Securing IoT – Context Matters

April 29, 2021

On-Demand Webinar

As new technologies emerge that drive business productivity, they also bring unknown challenges to the efficiency, reliability, and cybersecurity of the critical infrastructure used to power our society.

As these technologies also introduce new vulnerabilities to the systems, cybersecurity and risk professionals must advise both OT and IT stakeholders on the best path forward. Understanding the context of the risk is essential to successfully mitigating them, sustainably.

Join Chris Grove, Technology Evangelist at Nozomi Networks and special guest, Brian Kime, Senior Analyst at Forrester as they discuss how to approach securing these IT/IoT/IIoT/OT assets as components of industrial control systems.

Webinar: Real World Threats to OT and Effective Mitigation Strategies

April 27, 2021

Watch On-Demand

The recent attack on the Oldsmar Water Facility in Florida came of big surprise to their operations team, but of little surprise to those in the know. There has been a steady increase of state level cyberattacks on critical infrastructure and industrial control systems – systems run by Operational Technology.

These attacks are becoming more daring – cutting of power supplies, poisoning water utilities, disrupting transportation systems, interfering with pharmaceutical recipes and halting production in manufacturing.

In our panel discussion, we discussed

  • What went wrong in existing attacks
  • Actions that should have been taken during the attacks
  • Mitigation strategies to prevent future attacks

Blog: Hard Lessons Learned from the Oldsmar Water Facility Cyberattack Hack
Blog: Speeding IT visibility into OT new integrations

Secure Operational Technology Summit 2021

April 22-23, 2021

Nozomi Networks was a sponsor of the Fortinet Secure Operational Technology Summit 2021, APAC Digital Edition – April 22 to 23, 2021.

Participants learned how organizations confronted some of the most major physical and economic disruptions brought by the Covid-19 crisis, and how have they responded with high-speed innovation.

These disruptions are not only limited to remote access and home workers. Factories, plants, and processes have been brought down and back up with limited staff and remotely accessed.

Splunk Security Week 2021 – La cyber security oggi: visione, strategie e strumenti per rilevare, analizzare e prevenire i nuovi rischi

19 – 23 Aprile, 2021

Nozomi Network ha partecipato alla Splunk Security Week: una serie di eventi virtuali totalmente orientati alla sicurezza, dove desideriamo offrirti un punto di vista multidisciplinare, con speaker esperti in grado di fornirti elementi giuridici, umani, tecnici e organizzativi per migliorare la strategia di cyber security della tua azienda.

Ascolta le sessioni che più ti interessano.

Il nostro esperto di sicurezza OT& IoT , Sergio Leoni, ha tenuto un intervento sull’importanza della resilienza operativa in ambito, non perderlo !

Webinar: Protect ALL Your OT, IoT, IT, Edge and Cloud Devices with Vantage

April 13, 2021

Watch On-Demand Webinar

Nozomi Networks new SaaS-powered Vantage platform leverages the power and simplicity of the cloud to deliver unmatched security and visibility across your entire OT, IoT and IT networks.

Vantage accelerates the digital transformation of complex, highly distributed operations. You can protect any number of OT, IoT, IT, edge and cloud assets, regardless of their location.

Learn about:

  • Why a scalable SaaS-powered security and visibility platform makes sense today
  • How Vantage provides immediate awareness of cyber threats and helps you respond quickly
  • How deep OT/IoT/IT insight increases your cyber resilience
  • Security challenges solved by Vantage

Webpage: Vantage – SaaS-Powered Security and Visibility for OT and IoT Networks