Training

Events , Next-Generation Technologies & Secure Development , Threat Intelligence

Acquiring and Operationalizing Threat Intelligence for OT Environments

Acquiring and Operationalizing Threat Intelligence for OT Environments

Security practitioners have been working hard to find ways to operationalize threat intelligence for IT environments. But with many security teams now being put in charge of OT security as well, understanding and mitigating OT threats is a whole different ball game. From uptime to visibility and asset discovery, CISOs are struggling to plug holes in these networks, some of which employ out-of-support operating systems and devices that cannot be switched off or replaced.

What are the nuances for gathering TI for such OT environments? Are there services and specialist feeds available? How do you leverage them effectively and continuously, tying back cybersecurity concerns contextual to the business, back to the shop floor OT devices and machines? What are the challenges to rolling out mitigations, based on intelligence from the threat landscape? This session provides answers.

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.