Responding when you suffer a ransomware attack

Event starts in:

About event:

About This Webinar

OT infrastructures across industrial sectors like manufacturing, transportation, utilities, and oil and gas are increasingly becoming the target of sophisticated cyberattacks. Large or small, cyberattacks are making headlines and elevating executive attention toward cyber resiliency.
In the past, many OT infrastructures were self-contained and isolated (or "air gapped") from corporate resources, so they were relatively safe from internet-based threats. Not so much today. As OT and IT networks converge, outdated and unpatched OT endpoints represent a tempting entry point for cyber attackers. Compounding the problem, OT devices often run on legacy operating systems with limited system resources, which makes them difficult to protect with traditional endpoint security solutions.

To address these security challenges, many organizations have added a broad selection of point security products to cover each new risk exposure. While a step in the right direction, adding more solutions without integration for a 360-degree view just burdens an already overtaxed security operations team.
Preparing for, responding to and recovering from cyberattacks should be a strategic part of any business continuity plan.

Agenda

  • Trends impacting the multiple attack points across the industrial threat landscape
  • Insights garnered from purpose-built threat intelligence and supporting services for developing cyber resilience
  • A platform approach to broad, automated and integrated cyber resilience

Date & Time

June 24, 2021 | 2:00 pm - June 24, 2021 | 3:00 pm
Add to Calendar 2021-06-24 14:00:00 2021-06-24 15:00:00 Responding when you suffer a ransomware attack About This Webinar OT infrastructures across industrial sectors like manufacturing, transportation, utilities, and oil and gas are increasingly becoming the target of sophisticated cyberattacks. Large or small, cyberattacks are making headlines and elevating executive attention toward cyber resiliency. In the past, many OT infrastructures were self-contained and isolated (or "air gapped") from corporate resources, so they were relatively safe from internet-based threats. Not so much today. As OT and IT networks converge, outdated and unpatched OT endpoints represent a tempting entry point for cyber attackers. Compounding the problem, OT devices often run on legacy operating systems with limited system resources, which makes them difficult to protect with traditional endpoint security solutions. To address these security challenges, many organizations have added a broad selection of point security products to cover each new risk exposure. While a step in the right direction, adding more solutions without integration for a 360-degree view just burdens an already overtaxed security operations team. Preparing for, responding to and recovering from cyberattacks should be a strategic part of any business continuity plan. Agenda Trends impacting the multiple attack points across the industrial threat landscape Insights garnered from purpose-built threat intelligence and supporting services for developing cyber resilience A platform approach to broad, automated and integrated cyber resilience Online UTC public

Location:

Online

Share event

Subscribe to our Newsletter
Receive the latest updates and news
Exclusive preview
Supply Chain Digital July 21