Join Cyber Security Leaders Today!

Expert Webinar Speakers

OT THREAT HUNTING:
ACT BEFORE THE BREACH

As industrial cyber threats become more sophisticated, responding to a breach after the fact means you’ve already lost the war. When it comes to industrial operations and critical infrastructure, this is too late. It's time to get proactive.

Join us for this 1 hour discussion as we learn about “attack vectors,” a proactive method for defending your OT infrastructure before the emergence of an attack. Plus hear from AusNet Services on their insights into the current OT/IT landscape.


Who will you hear from?
  • Dick Bussiere, OT Specialist, Tenable
  • Ad Wolst, Cyber Security Risk and Assurance Manager, AusNet Services
  • Ian Dickson, Senior Cyber Security Specialist, AusNet Services
The three of them will talk through their experiences, as well as deep dive into defending OT infrastructure before the emergence of an attack. 

THREE reasons why you should attend...

  • Looking Beyond Traditional OT Security Methods for a Complete Picture of Your Industrial Attack Surface
  • Understand How You Can Capture Relevant Situational Data for Every Device and Communication Pathway and the Methods and Benefits of OT Threat Hunting.
  • Learn About A Proactive Method For Defending Your OT Infrastructure Before The Emergence Of An Attack On Your OT Network.
PLUS!
  • It is 100% FREE TO ATTEND

Lead Event Partner

logo image

 How it works 

image

Step 1: Register
Click on any of the register buttons on this page. Enter your information and secure your place

image

Step 3: Schedule time
Mark some time in your calendar when you can be free of distractions or watch with colleagues

image

Step 2: Confirmation email
This will be dispatched upon registration with details about the event

image

Step 4: Watch the event
Click the link in the confirmation email and prepare questions for our industry-leading speakers