Cybersecurity Common Practices for Critical Infrastructure

What are the most common cybersecurity practices across OT and ICS sectors? Is monitoring prevention, or detection? How do I get the basics right, with so many competing voices in the market?

With a look at the most recent FERC focus on internal network security monitoring, join Nozomi Networks and Keysight Technologies with special guest Patrick Miller of Ampere Security to uncover who’s monitoring what – from network defenders to top-down regulation. Key takeaways include how to scope your cybersecurity priorities, how to use tools to the best of your ability, and lessons learned for successful implementation of industry standards.

Who should watch:

  • IT leaders tasked with OT security
  • Business leaders scoping new OT programs
  • Compliance teams grappling with increased legislation
  • Network administrators curious about monitoring in OT/ICS

Speakers

Cybersecurity Common Practices for Critical Infrastructure
Webinar

Cybersecurity Common Practices for Critical Infrastructure

March 3, 2023

What are the most common cybersecurity practices across OT and ICS sectors? Is monitoring prevention, or detection? How do I get the basics right, with so many competing voices in the market?

With a look at the most recent FERC focus on internal network security monitoring, join Nozomi Networks and Keysight Technologies with special guest Patrick Miller of Ampere Security to uncover who’s monitoring what – from network defenders to top-down regulation. Key takeaways include how to scope your cybersecurity priorities, how to use tools to the best of your ability, and lessons learned for successful implementation of industry standards.

Who should watch:

  • IT leaders tasked with OT security
  • Business leaders scoping new OT programs
  • Compliance teams grappling with increased legislation
  • Network administrators curious about monitoring in OT/ICS

What are the most common cybersecurity practices across OT and ICS sectors? Is monitoring prevention, or detection? How do I get the basics right, with so many competing voices in the market?

With a look at the most recent FERC focus on internal network security monitoring, join Nozomi Networks and Keysight Technologies with special guest Patrick Miller of Ampere Security to uncover who’s monitoring what – from network defenders to top-down regulation. Key takeaways include how to scope your cybersecurity priorities, how to use tools to the best of your ability, and lessons learned for successful implementation of industry standards.

Who should watch:

  • IT leaders tasked with OT security
  • Business leaders scoping new OT programs
  • Compliance teams grappling with increased legislation
  • Network administrators curious about monitoring in OT/ICS

SPEAKERS

What are the most common cybersecurity practices across OT and ICS sectors? Is monitoring prevention, or detection? How do I get the basics right, with so many competing voices in the market?

With a look at the most recent FERC focus on internal network security monitoring, join Nozomi Networks and Keysight Technologies with special guest Patrick Miller of Ampere Security to uncover who’s monitoring what – from network defenders to top-down regulation. Key takeaways include how to scope your cybersecurity priorities, how to use tools to the best of your ability, and lessons learned for successful implementation of industry standards.

Who should watch:

  • IT leaders tasked with OT security
  • Business leaders scoping new OT programs
  • Compliance teams grappling with increased legislation
  • Network administrators curious about monitoring in OT/ICS

IN PARTNERSHIP WITH
No items found.
SPEAKERS
Watch More
|
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
Learn more link

Cybersecurity Common Practices for Critical Infrastructure

What are the most common cybersecurity practices across OT and ICS sectors? Is monitoring prevention, or detection? How do I get the basics right, with so many competing voices in the market?

With a look at the most recent FERC focus on internal network security monitoring, join Nozomi Networks and Keysight Technologies with special guest Patrick Miller of Ampere Security to uncover who’s monitoring what – from network defenders to top-down regulation. Key takeaways include how to scope your cybersecurity priorities, how to use tools to the best of your ability, and lessons learned for successful implementation of industry standards.

Who should watch:

  • IT leaders tasked with OT security
  • Business leaders scoping new OT programs
  • Compliance teams grappling with increased legislation
  • Network administrators curious about monitoring in OT/ICS

Subscribe to our newsletter

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your IoT and OT asset discovery, inventory, and management.