[vc_row full_width=”stretch_row” css=”.vc_custom_1597825419274{margin-top: -40px !important;background-image: url(https://iiot-world.com/wp-content/uploads/2020/08/The-IIoT-Attack-Surface.jpg?id=18140) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_empty_space height=”164px”][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][vc_custom_heading text=”The IIoT Attack Surface:
Threats and Security Solutions” font_container=”tag:h2|font_size:32px|text_align:left|color:%2356799d|line_height:36px” google_fonts=”font_family:Ubuntu%20Condensed%3Aregular|font_style:400%20regular%3A400%3Anormal”][vc_custom_heading text=”Virtual Conference
Sponsored by Trend Micro” font_container=”tag:h2|font_size:18px|text_align:left|color:%23db1e1e|line_height:18px” google_fonts=”font_family:Ubuntu%3A300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic|font_style:500%20bold%20italic%3A500%3Aitalic”][vc_custom_heading text=”July 31, 2019″ font_container=”tag:h2|font_size:24px|text_align:left|color:%2356799d|line_height:24px” google_fonts=”font_family:Ubuntu%3A300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic|font_style:500%20bold%20regular%3A500%3Anormal”][vc_custom_heading text=”11:00 AM – 12:00 PM ET” font_container=”tag:h2|font_size:18px|text_align:left|color:%2356799d|line_height:18px” google_fonts=”font_family:Ubuntu%3A300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic|font_style:500%20bold%20regular%3A500%3Anormal”][/qodef_elements_holder_item][/qodef_elements_holder][vc_empty_space height=”64px”][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_button size=”large” text=”Watch the recorded sessions” target=”_self” icon_pack=”” font_weight=”” text_transform=”” link=”#registerForm”][/qodef_elements_holder_item][/qodef_elements_holder][vc_empty_space height=”200px”][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590503324813{margin-top: -40px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_empty_space height=”80px”][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][vc_custom_heading text=”What you’ll learn:” font_container=”tag:h2|font_size:32px|text_align:center|color:%233f3f3f|line_height:36px” google_fonts=”font_family:Ubuntu%20Condensed%3Aregular|font_style:400%20regular%3A400%3Anormal”][/qodef_elements_holder_item][/qodef_elements_holder][vc_column_text el_class=”landing-what”]
As more Industrial Control Systems and end devices become connected to enterprise networks, the internet and cloud platforms, security continues to be a rising concern. These converged IT/OT networks introduce security vulnerabilities and challenges that operations managers and information security professionals are still learning to deal with. In this webinar, we will share the most common cybersecurity issues with converged IT/OT networks and the practical tips and best practices that have been developed to counter them.
[/vc_column_text][vc_empty_space height=”64px”][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=”center”][qodef_elements_holder_item horizontal_alignment=”center”][qodef_button size=”medium” text=”Register Now & watch all sessions” target=”_self” icon_pack=”” font_weight=”” text_transform=”” link=”#registerForm”][/qodef_elements_holder_item][/qodef_elements_holder][vc_empty_space height=”120px”][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590503937058{margin-top: -40px !important;background-color: #efefef !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column width=”1/3″][vc_empty_space height=”80px”][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=”center”][qodef_elements_holder_item horizontal_alignment=”center”][qodef_single_image enable_image_shadow=”no” image=”16941″][/qodef_elements_holder_item][/qodef_elements_holder][vc_empty_space height=”120px”][/vc_column][vc_column width=”2/3″][vc_custom_heading text=”Key Topics Covered” font_container=”tag:h3|font_size:28px|text_align:left|color:%233f3f3f|line_height:32px” google_fonts=”font_family:Ubuntu%20Condensed%3Aregular|font_style:400%20regular%3A400%3Anormal”][vc_column_text]
- Business challenges facing enterprise organizations as they are going through their digital transformation
- The growing industrial threat landscape and new IIoT attack surface
- What makes the IIoT difficult to secure and the top challenges that come with securing industrial control systems
- Standards & Best Practices for ICS Security
- Differences and similarities between IT & OT network security
- Practical solutions from both IT and OT perspectives to better understand how IIoT can be secured
[/vc_column_text][vc_empty_space height=”120px”][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590504339006{margin-top: -40px !important;background-color: #4d7ea7 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_empty_space height=”80px”][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][vc_custom_heading text=”Speakers” font_container=”tag:h2|font_size:32px|text_align:center|color:%23ffffff|line_height:36px” google_fonts=”font_family:Ubuntu%20Condensed%3Aregular|font_style:400%20regular%3A400%3Anormal”][/qodef_elements_holder_item][/qodef_elements_holder][vc_empty_space height=”64px”][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590504339006{margin-top: -40px !important;background-color: #4d7ea7 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column width=”1/2″][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_layout3 skin=”” posts_per_page=”1″ column_number=”1″ space_between_items=”large” image_size=”custom” display_excerpt=”yes” display_date=”no” display_author=”no” display_pagination=”” post_in=”15468″ offset=”” excerpt_length=”50″ custom_image_width=”240″ custom_image_height=”240″ extra_class_name=”landing-speakers”][/qodef_elements_holder_item][/qodef_elements_holder][vc_empty_space height=”120px”][/vc_column][vc_column width=”1/2″][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_layout3 skin=”” posts_per_page=”1″ column_number=”1″ space_between_items=”large” image_size=”custom” display_excerpt=”yes” display_date=”no” display_author=”no” display_pagination=”” offset=”” excerpt_length=”50″ custom_image_width=”240″ custom_image_height=”240″ extra_class_name=”landing-speakers” post_in=”15534″][/qodef_elements_holder_item][/qodef_elements_holder][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590504339006{margin-top: -40px !important;background-color: #4d7ea7 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column width=”1/2″][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_layout3 skin=”” posts_per_page=”1″ column_number=”1″ space_between_items=”large” image_size=”custom” display_excerpt=”yes” display_date=”no” display_author=”no” display_pagination=”” post_in=”15512″ offset=”” excerpt_length=”50″ custom_image_width=”240″ custom_image_height=”240″ extra_class_name=”landing-speakers”][/qodef_elements_holder_item][/qodef_elements_holder][/vc_column][vc_column width=”1/2″][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_layout3 skin=”” posts_per_page=”1″ column_number=”1″ space_between_items=”large” image_size=”custom” display_excerpt=”yes” display_date=”no” display_author=”no” display_pagination=”” post_in=”15631″ offset=”” excerpt_length=”35″ custom_image_width=”240″ custom_image_height=”240″ extra_class_name=”landing-speakers”][/qodef_elements_holder_item][/qodef_elements_holder][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590504339006{margin-top: -40px !important;background-color: #4d7ea7 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_empty_space height=”120px”][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590504871892{margin-top: -40px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_empty_space height=”80px”][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][vc_custom_heading text=”Participants” font_container=”tag:h2|font_size:32px|text_align:center|color:%233f3f3f|line_height:36px” google_fonts=”font_family:Ubuntu%20Condensed%3Aregular|font_style:400%20regular%3A400%3Anormal”][/qodef_elements_holder_item][/qodef_elements_holder][vc_empty_space height=”64px”][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590504871892{margin-top: -40px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column width=”1/2″][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_layout5 skin=”” posts_per_page=”1″ column_number=”1″ space_between_items=”huge” sort=”latest” image_size=”full” display_date=”no” display_author=”no” display_comments=”no” display_views=”no” display_share=”no” display_hot_trending_icons=”no” display_pagination=”” post_in=”4998″ offset=”” extra_class_name=”no_title center-image grayscale”][/qodef_elements_holder_item][/qodef_elements_holder][/vc_column][vc_column width=”1/2″][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_layout5 skin=”” posts_per_page=”1″ column_number=”1″ space_between_items=”huge” sort=”latest” image_size=”full” display_date=”no” display_author=”no” display_comments=”no” display_views=”no” display_share=”no” display_hot_trending_icons=”no” display_pagination=”” post_in=”16950″ offset=”” extra_class_name=”no_title center-image grayscale”][/qodef_elements_holder_item][/qodef_elements_holder][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590504871892{margin-top: -40px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_empty_space height=”120px”][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590505537680{margin-top: -40px !important;background-color: #efefef !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_column_text][/vc_column_text][vc_empty_space height=”80px”][vc_column_text]
[/vc_column_text][vc_empty_space height=”120px”][/vc_column][/vc_row]