Nozomi Networks Labs 1st Half 2022 OT/IoT Security Review

Nozomi Networks Labs’ OT/IoT Security Report takes a deep look at the current threat landscape and the use of new tactics by threat actors. We also analyze recent trends in IoT botnets and ICS-CERT vulnerabilities.

Join us to hear Labs insights on:

  • New malicious tools being used in the Russia/Ukraine war: hacktivist activity, state-backed APTs, wiper malware, and Industroyer2
  • Insights into Internet of Things (IoT) botnets, corresponding Indicators of Compromise (IoCs), and threat actor Tactics Techniques and Procedures (TTPs)
  • Recommended threat mitigations for stronger security

Speakers

Nozomi Networks Labs 1st Half 2022 OT/IoT Security Review
Webinar

Nozomi Networks Labs 1st Half 2022 OT/IoT Security Review

August 4, 2022

Nozomi Networks Labs’ OT/IoT Security Report takes a deep look at the current threat landscape and the use of new tactics by threat actors. We also analyze recent trends in IoT botnets and ICS-CERT vulnerabilities.

Join us to hear Labs insights on:

  • New malicious tools being used in the Russia/Ukraine war: hacktivist activity, state-backed APTs, wiper malware, and Industroyer2
  • Insights into Internet of Things (IoT) botnets, corresponding Indicators of Compromise (IoCs), and threat actor Tactics Techniques and Procedures (TTPs)
  • Recommended threat mitigations for stronger security

Nozomi Networks Labs’ OT/IoT Security Report takes a deep look at the current threat landscape and the use of new tactics by threat actors. We also analyze recent trends in IoT botnets and ICS-CERT vulnerabilities.

Join us to hear Labs insights on:

  • New malicious tools being used in the Russia/Ukraine war: hacktivist activity, state-backed APTs, wiper malware, and Industroyer2
  • Insights into Internet of Things (IoT) botnets, corresponding Indicators of Compromise (IoCs), and threat actor Tactics Techniques and Procedures (TTPs)
  • Recommended threat mitigations for stronger security

SPEAKERS

Nozomi Networks Labs’ OT/IoT Security Report takes a deep look at the current threat landscape and the use of new tactics by threat actors. We also analyze recent trends in IoT botnets and ICS-CERT vulnerabilities.

Join us to hear Labs insights on:

  • New malicious tools being used in the Russia/Ukraine war: hacktivist activity, state-backed APTs, wiper malware, and Industroyer2
  • Insights into Internet of Things (IoT) botnets, corresponding Indicators of Compromise (IoCs), and threat actor Tactics Techniques and Procedures (TTPs)
  • Recommended threat mitigations for stronger security

IN PARTNERSHIP WITH
No items found.
SPEAKERS
Watch More
|
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
Learn more link

Nozomi Networks Labs 1st Half 2022 OT/IoT Security Review

Nozomi Networks Labs’ OT/IoT Security Report takes a deep look at the current threat landscape and the use of new tactics by threat actors. We also analyze recent trends in IoT botnets and ICS-CERT vulnerabilities.

Join us to hear Labs insights on:

  • New malicious tools being used in the Russia/Ukraine war: hacktivist activity, state-backed APTs, wiper malware, and Industroyer2
  • Insights into Internet of Things (IoT) botnets, corresponding Indicators of Compromise (IoCs), and threat actor Tactics Techniques and Procedures (TTPs)
  • Recommended threat mitigations for stronger security

Subscribe to our newsletter

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your IoT and OT asset discovery, inventory, and management.