Webinar: Best Practices to Deploy Zero Trust With AI-driven Threat Detection for IT/OT Networks

  • April 30, 2021
  • Tempered Networks
  • Nozomi Networks
  • Webinar

Best Practices to Deploy Zero Trust With AI-driven Threat Detection for IT/OT Networks

Webinar: Best Practices to Deploy Zero Trust With AI-driven Threat Detection for IT/OT Networks

Industrial control systems and OT networks are widely perceived as the most vulnerable attack vectors and most difficult endpoints to secure. They have traditionally been air gapped from IT networks and unavailable for remote access, but that is no longer possible. Securing OT networks has different requirements than IT networks and specialized security architectures are required.

In this webinar we will explore current security and operational challenges faced by asset owners and operators as IT/OT networks converge. We’ll share best practices on why zero-trust, combined with AI-driven threat detection and automated remediation is a big improvement over traditional security – and why it’s effective against external and insider threats. We will also provide recommendations for engaging OT and IT about developing a Zero-Trust strategy to protect your critical network infrastructure.

Click here to watch webinar »


Speakers:

Gary Kinghorn, Director of Marketing, Tempered Networks  
Gary has more than 25 years' experience in networking and the network security industry with various marketing, product marketing and business development roles at Cisco, Nokia, RSA Security and several start-ups.  



Chris Grove, CISSP, NSA-IAM, Technology Evangelist, Nozomi Networks 
Chris brings more than 25 years of cybersecurity experience with deep knowledge of IT, OT and IoT networks and mission-critical infrastructure. His prior experience includes managing large, critical and complex security projects around the world for customers of leading IT and OT security vendors. Security executives turn to Chris for his expertise in almost every sector including commercial, government, defense, law enforcement, and the intelligence community.

Watch Webinar On-Demand (click the button below):

view our Privacy Policy