Responding when you suffer a ransomware attack

Event starts in:

About event:

About This Webinar

OT infrastructures across industrial sectors like manufacturing, transportation, utilities, and oil and gas are increasingly becoming the target of sophisticated cyberattacks. Large or small, cyberattacks are making headlines and elevating executive attention toward cyber resiliency.
In the past, many OT infrastructures were self-contained and isolated (or "air gapped") from corporate resources, so they were relatively safe from internet-based threats. Not so much today. As OT and IT networks converge, outdated and unpatched OT endpoints represent a tempting entry point for cyber attackers. Compounding the problem, OT devices often run on legacy operating systems with limited system resources, which makes them difficult to protect with traditional endpoint security solutions.

To address these security challenges, many organizations have added a broad selection of point security products to cover each new risk exposure. While a step in the right direction, adding more solutions without integration for a 360-degree view just burdens an already overtaxed security operations team.
Preparing for, responding to and recovering from cyberattacks should be a strategic part of any business continuity plan.

Agenda

  • Trends impacting the multiple attack points across the industrial threat landscape
  • Insights garnered from purpose-built threat intelligence and supporting services for developing cyber resilience
  • A platform approach to broad, automated and integrated cyber resilience

Date & Time

June 24, 2021 | 2:00 pm - June 24, 2021 | 3:00 pm
Add to Calendar 2021-06-24 14:00:00 2021-06-24 15:00:00 Responding when you suffer a ransomware attack About This Webinar OT infrastructures across industrial sectors like manufacturing, transportation, utilities, and oil and gas are increasingly becoming the target of sophisticated cyberattacks. Large or small, cyberattacks are making headlines and elevating executive attention toward cyber resiliency. In the past, many OT infrastructures were self-contained and isolated (or "air gapped") from corporate resources, so they were relatively safe from internet-based threats. Not so much today. As OT and IT networks converge, outdated and unpatched OT endpoints represent a tempting entry point for cyber attackers. Compounding the problem, OT devices often run on legacy operating systems with limited system resources, which makes them difficult to protect with traditional endpoint security solutions. To address these security challenges, many organizations have added a broad selection of point security products to cover each new risk exposure. While a step in the right direction, adding more solutions without integration for a 360-degree view just burdens an already overtaxed security operations team. Preparing for, responding to and recovering from cyberattacks should be a strategic part of any business continuity plan. Agenda Trends impacting the multiple attack points across the industrial threat landscape Insights garnered from purpose-built threat intelligence and supporting services for developing cyber resilience A platform approach to broad, automated and integrated cyber resilience Online UTC public

Location:

Online

Share event

Subscribe to our Newsletter
Receive the latest updates and news
Exclusive preview

Other Events

29.03.2022 - 31.03.2022
Palazzo Versace Dubai United Arab Emirates
30.03.2022 - 31.03.2022
Palazzo Versace Dubai United Arab Emirates
06.10.2021 - 08.10.2021
München
04.10.2021 - 05.10.2021
BGS Online Platform