On-Demand Webinar / Cloud

Protección de las operaciones críticas de negocios

Bajo demanda

Protect business critical operations in IT/OT convergence by capturing complete visibility and interoperability gaps in your expanding threat surface

CISOs and security teams own “Enterprise-Wide Security Risk” but often have limited visibility into critical operations and assets.

If your enterprise relies on the Internet of Things (IoT) and/or operational technology (OT), there’s a good chance you are blind to the “invisible bridges” between your IT, OT, and IoT assets.

Effectively discover, measure, and minimize the risk posed by the invisible bridges in your environment.

Highlights

  • Why CISOs need to understand the risk created by exponential growth in connected OT and IoT devices
  • Closing visibility gaps and asset discovery challenges
  • Differences between passive and active discovery, how they work, the benefits of each technique, and when to use them
  • Use case - Smart meters and solar panels - Protecting the integrity of energy infrastructure with the rise of smart appliances, solar inverters, and smart meter

¿Quién debería verlos?
CISOs, IT, OT/ICS operations and engineering leaders, and professionals responsible for ensuring the integrity, safety, and security of critical business systems and processes for any organization reliant on OT and IoT systems.


Oradores

Dave Reeves
Dave Reeves

Territory Manager, OT Security, Tenable

Dick Bussiere,  Technical Head of Operational Technology: APJ, Tenable
Dick Bussiere

Principal OT Security Engineer, Tenable

Recursos

Analyst Research
可視化× 自動化×統合化によるクラウドセキュリティのアプローチ
Hoja de datos
Tenable Hexa AI: el motor agéntico de la plataforma de gestión de exposición Tenable One
Solución
Obtenga seguridad integral de aceleración de la detección (shift-left) con Tenable One Cloud Exposure