Security Implications of the Australian Critical Infrastructure Act

Join Bill Hagestad II, Jonathan Rusch, Brian Hay and Nozomi Networks’ Diego Betancur for a discussion about the Act’s impact upon the Australian industrial landscape.

This webinar explores the motivations behind targeting critical infrastructure, and covers the fundamental steps toward cybersecurity resilience.

Speakers

Security Implications of the Australian Critical Infrastructure Act
Webinar

Security Implications of the Australian Critical Infrastructure Act

March 4, 2021

Join Bill Hagestad II, Jonathan Rusch, Brian Hay and Nozomi Networks’ Diego Betancur for a discussion about the Act’s impact upon the Australian industrial landscape.

This webinar explores the motivations behind targeting critical infrastructure, and covers the fundamental steps toward cybersecurity resilience.

Join Bill Hagestad II, Jonathan Rusch, Brian Hay and Nozomi Networks’ Diego Betancur for a discussion about the Act’s impact upon the Australian industrial landscape.

This webinar explores the motivations behind targeting critical infrastructure, and covers the fundamental steps toward cybersecurity resilience.

SPEAKERS

Join Bill Hagestad II, Jonathan Rusch, Brian Hay and Nozomi Networks’ Diego Betancur for a discussion about the Act’s impact upon the Australian industrial landscape.

This webinar explores the motivations behind targeting critical infrastructure, and covers the fundamental steps toward cybersecurity resilience.

IN PARTNERSHIP WITH
No items found.
SPEAKERS
Watch More
|
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
Learn more link

Security Implications of the Australian Critical Infrastructure Act

Join Bill Hagestad II, Jonathan Rusch, Brian Hay and Nozomi Networks’ Diego Betancur for a discussion about the Act’s impact upon the Australian industrial landscape.

This webinar explores the motivations behind targeting critical infrastructure, and covers the fundamental steps toward cybersecurity resilience.

Subscribe to our newsletter

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your IoT and OT asset discovery, inventory, and management.