Nozomi Networks Labs 1st Half 2022 OT/IoT Security Review

Nozomi Networks Labs’ OT/IoT Security Report takes a deep look at the current threat landscape and the use of new tactics by threat actors. We also analyze recent trends in IoT botnets and ICS-CERT vulnerabilities.

Join us to hear Labs insights on:

  • New malicious tools being used in the Russia/Ukraine war: hacktivist activity, state-backed APTs, wiper malware, and Industroyer2
  • Insights into Internet of Things (IoT) botnets, corresponding Indicators of Compromise (IoCs), and threat actor Tactics Techniques and Procedures (TTPs)
  • Recommended threat mitigations for stronger security

View Resource

Speakers

Nozomi Networks Labs 1st Half 2022 OT/IoT Security Review

Nozomi Networks Labs 1st Half 2022 OT/IoT Security Review

Nozomi Networks Labs’ OT/IoT Security Report takes a deep look at the current threat landscape and the use of new tactics by threat actors. We also analyze recent trends in IoT botnets and ICS-CERT vulnerabilities.

Join us to hear Labs insights on:

  • New malicious tools being used in the Russia/Ukraine war: hacktivist activity, state-backed APTs, wiper malware, and Industroyer2
  • Insights into Internet of Things (IoT) botnets, corresponding Indicators of Compromise (IoCs), and threat actor Tactics Techniques and Procedures (TTPs)
  • Recommended threat mitigations for stronger security

Speakers

Nozomi Networks Labs 1st Half 2022 OT/IoT Security Review

Nozomi Networks Labs’ OT/IoT Security Report takes a deep look at the current threat landscape and the use of new tactics by threat actors. We also analyze recent trends in IoT botnets and ICS-CERT vulnerabilities.

Join us to hear Labs insights on:

  • New malicious tools being used in the Russia/Ukraine war: hacktivist activity, state-backed APTs, wiper malware, and Industroyer2
  • Insights into Internet of Things (IoT) botnets, corresponding Indicators of Compromise (IoCs), and threat actor Tactics Techniques and Procedures (TTPs)
  • Recommended threat mitigations for stronger security

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your IoT and OT asset discovery, inventory, and management.