Achieving Improved Cybersecurity Posture Across IT & OT Infrastructures

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Device Visibility has become the key to success for security practitioners when it comes to securing an increasingly more dispersed organisation with multiple data centres, distributed campuses and a mobile workforce.

Now, smart devices are connecting previously separated IT and OT networks to automate business operations and boost efficiency introducing another layer of complexity.

In this webinar, we will look at the concept of why device visibility poses such a challenge for business, what is getting in the way and why OT and IT convergence has added an extra consideration.

Key takeaways:

  • How your security strategy benefits from better device visibility
  • How compliance and risk management can be optimised
  • Unifying device visibility and control for IT and OT environments
  • Ways to improve the effectiveness of existing tools

Speakers

Photo of Mark Chaplin

Mark Chaplin

Principal, Information Security Forum

Photo of Torry Crass

Torry Crass

Cyber Security Advisor, vCISO at Woodstar Labs

Photo of Andrew Noonan

Andrew Noonan

Senior Manager, Systems Engineering UK, I & Northern Europe at ForeScout Technologies, Forescout

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Forescout here: https://www.forescout.com/privacy-policy/. Please see Infosecurity Magazine’s privacy policy for more information.