Nozomi Networks Workshop: How to Transform Any Computer on Your Network into an OT Security Sensor

When detecting cyberthreats, identifying vulnerabilities or analyzing anomalies in your processes, it’s critical to have as much detailed network and system information as possible. More accurate and timely access to data leads to better diagnostics and faster time to repair.

Traditionally, OT/ICS asset visibility and threat detection have relied on low-impact passive network-based monitoring. Complementing this network analysis with information about unreachable assets can provide much greater visibility to analyze threats, key attack surfaces, and east-west edge traffic.

Join our hands-on workshop to see how you can reduce cyber risks and increase security all the way to endpoint. We’ll show you how to:

  • Easily identify compromised hosts with malware, rogue applications, unauthorized USB drives, and suspicious user activity
  • Continuously monitor and get immediate visibility into asset changes and details
  • Monitor offline assets for more complete network visibility and analysis
  • Get accurate, contextualized, and immediate data with a non-disruptive, low impact sensor
  • Eliminate externally initiated polling requests
Speakers
Monday PM
S2d: 1:05 PM Track 3 (Oceans 12)