On-Demand Webinar / Cloud

Protect Business Critical Operations

SOB DEMANDA

Protect business critical operations in IT/OT convergence by capturing complete visibility and interoperability gaps in your expanding threat surface

CISOs and security teams own “Enterprise-Wide Security Risk” but often have limited visibility into critical operations and assets.

If your enterprise relies on the Internet of Things (IoT) and/or operational technology (OT), there’s a good chance you are blind to the “invisible bridges” between your IT, OT, and IoT assets.

Effectively discover, measure, and minimize the risk posed by the invisible bridges in your environment.

Highlights

  • Why CISOs need to understand the risk created by exponential growth in connected OT and IoT devices
  • Closing visibility gaps and asset discovery challenges
  • Differences between passive and active discovery, how they work, the benefits of each technique, and when to use them
  • Use case - Smart meters and solar panels - Protecting the integrity of energy infrastructure with the rise of smart appliances, solar inverters, and smart meter

Quem deve assistir?
CISOs, IT, OT/ICS operations and engineering leaders, and professionals responsible for ensuring the integrity, safety, and security of critical business systems and processes for any organization reliant on OT and IoT systems.


Apresentadores

Dave Reeves
Dave Reeves

Territory Manager, OT Security, Tenable

Dick Bussiere,  Technical Head of Operational Technology: APJ, Tenable
Dick Bussiere

Principal OT Security Engineer, Tenable

Recursos

Analyst Research
可視化× 自動化×統合化によるクラウドセキュリティのアプローチ
Ficha de dados
Tenable Hexa AI: o mecanismo agêntico para a Plataforma de gerenciamento de exposição Tenable One
Solução
Obtenha segurança de teste antecipado (shift left) com a exposição da nuvem do Tenable One