begin: November 7, 2016 AT 10:00am

end: November 7, 2016 AT 11:00am

location: Eastern Time

venue: Virtual

Is your ICS/OT environment protected against insider and external cyber risks?

From this webinar you'll gain insights from thought leaders into the key steps to ensure your ICS/OT environment is protected against insider and external cyber risks.

  • Assess – Identify your risk vulnerabilities and exposures.
  • Protect –  Establish the right technologies, infrastructure and processes to build resilience.
  • Defend –  Continuously monitor potential threats, develop a cyber risk response plan and ensure adequate training/guidance for the appropriate stakeholders in your organization.

This event will be held on Monday, November 7, 2016 at 10 a.m. ET.