Join Nozomi Networks at Black Hat 2023 in our booth #3022 at Mandalay Bay and connect with our team onsite about your upcoming OT and IoT needs. Check out our interactive product demonstrations, learn about our latest releases and our most recent research.
Gabe is a Technical Marketing Engineer at Nozomi Networks and has over 17 years of experience in the networking industry, with 10 of those years in Data Center technologies. Gabe is responsible for the creation of technical marketing material, evangelization of customers and partners in the OT cybersecurity trends and latest innovations, as well as the effective communication of the Nozomi Networks vision in the industry.
With over two decades of progressive experience designing and architecting system breakthroughs, Sandeep is a Network Security Expert proven in supporting national and global projects for the world’s largest companies. Sandeep has a long record of success innovating complex, large enterprise solutions for network and security infrastructures. He is known as an industry thought leader and sought after across North America and internationally. Having spent the first decade of his career working on the operations and project teams for global energy super-giants; Sandeep gained a powerful knowledge base of IT and OT principals which have been the foundation of his success.
Shan Zhou is a 20-year veteran of applying cyber defense solutions to enable business success. Shan has worked with innovative category leaders in the areas of data protection, advanced threat protection, and cloud transformation. Shan currently serves as the Director of Technical Engineering for the Americas, at Nozomi Networks, focusing on maximizing operational resilience in manufacturing, operational, and critical infrastructure.
Visit our booth to meet Jerry, our interactive 3D Factory Simulation! We’ll be there all day running simulated attacks in this live environment to showcase how Nozomi Networks’ solution can help you quickly detect and respond to cyberattacks, including a malicious actor trying to break a supply chain, PLC exploitation attempts and a malicious USB adapter keystroke injection.
Learn More