Extending the Purdue Model to IoT/OT Vulnerability Remediation

For many years organizations have used the Purdue Model to secure and maintain Industrial Control Systems (ICS), and use similar techniques with related systems such as IoT/OT. This educational webinar with experts from Nozomi Networks and Viakoo will dive into how to extend the Purdue Model to IoT/OT devices, and augment it with automated device remediation and zero trust capabilities. The webinar will feature a demo showing integrated asset discovery and vulnerability remediation.

Together, Nozomi Networks and Viakoo ensure that all assets (not just IT) are visible, operational, and secure.

View Resource

Speakers

Extending the Purdue Model to IoT/OT Vulnerability Remediation
Webinar

Extending the Purdue Model to IoT/OT Vulnerability Remediation

For many years organizations have used the Purdue Model to secure and maintain Industrial Control Systems (ICS), and use similar techniques with related systems such as IoT/OT. This educational webinar with experts from Nozomi Networks and Viakoo will dive into how to extend the Purdue Model to IoT/OT devices, and augment it with automated device remediation and zero trust capabilities. The webinar will feature a demo showing integrated asset discovery and vulnerability remediation.

Together, Nozomi Networks and Viakoo ensure that all assets (not just IT) are visible, operational, and secure.

Speakers

Extending the Purdue Model to IoT/OT Vulnerability Remediation

For many years organizations have used the Purdue Model to secure and maintain Industrial Control Systems (ICS), and use similar techniques with related systems such as IoT/OT. This educational webinar with experts from Nozomi Networks and Viakoo will dive into how to extend the Purdue Model to IoT/OT devices, and augment it with automated device remediation and zero trust capabilities. The webinar will feature a demo showing integrated asset discovery and vulnerability remediation.

Together, Nozomi Networks and Viakoo ensure that all assets (not just IT) are visible, operational, and secure.

Get Updates

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your IoT and OT asset discovery, inventory, and management.