CINXE.COM

Webinars | Nozomi Networks

<!DOCTYPE html><!-- Last Published: Tue Nov 26 2024 20:48:33 GMT+0000 (Coordinated Universal Time) --><html data-wf-domain="www.nozominetworks.com" data-wf-page="6545247d392723f0e47900f6" data-wf-site="645a4534705010e2cb244f50" lang="en"><head><meta charset="utf-8"/><title>Webinars | Nozomi Networks</title><meta content="Watch webinars on the latest OT security market trends and solutions from Nozomi Networks and our partners." name="description"/><meta content="Webinars | Nozomi Networks" property="og:title"/><meta content="Watch webinars on the latest OT security market trends and solutions from Nozomi Networks and our partners." property="og:description"/><meta content="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/65049edf592916f9f83adda0_NN-Webinars-Page-Thumbnails-1200x628px.webp" property="og:image"/><meta content="Webinars | Nozomi Networks" property="twitter:title"/><meta content="Watch webinars on the latest OT security market trends and solutions from Nozomi Networks and our partners." property="twitter:description"/><meta content="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/65049edf592916f9f83adda0_NN-Webinars-Page-Thumbnails-1200x628px.webp" property="twitter:image"/><meta property="og:type" content="website"/><meta content="summary_large_image" name="twitter:card"/><meta content="width=device-width, initial-scale=1" name="viewport"/><link href="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/css/nozomi-2023.5a461d78a.min.css" rel="stylesheet" type="text/css"/><link href="https://fonts.googleapis.com" rel="preconnect"/><link href="https://fonts.gstatic.com" rel="preconnect" crossorigin="anonymous"/><script src="https://ajax.googleapis.com/ajax/libs/webfont/1.6.26/webfont.js" type="text/javascript"></script><script type="text/javascript">WebFont.load({ google: { families: ["Montserrat:100,100italic,200,200italic,300,300italic,400,400italic,500,500italic,600,600italic,700,700italic,800,800italic,900,900italic","Vollkorn:400,400italic,700,700italic","Merriweather:300,300italic,400,400italic,700,700italic,900,900italic","Open Sans:300,300italic,400,400italic,600,600italic,700,700italic,800,800italic","Oswald:200,300,400,500,600,700"] }});</script><script type="text/javascript">!function(o,c){var n=c.documentElement,t=" w-mod-";n.className+=t+"js",("ontouchstart"in o||o.DocumentTouch&&c instanceof DocumentTouch)&&(n.className+=t+"touch")}(window,document);</script><link href="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/65dca135c2a0377136b5d42b_NN-Favicon-32x32px.png" rel="shortcut icon" type="image/x-icon"/><link href="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/65dca12dbfa711f6599f64a5_NN-Favicon-256x256px-white.png" rel="apple-touch-icon"/><link href="https://www.nozominetworks.com/webinars" rel="canonical"/><script async="" src="https://www.googletagmanager.com/gtag/js?id=G-XPDLLMSMHQ"></script><script type="text/javascript">window.dataLayer = window.dataLayer || [];function gtag(){dataLayer.push(arguments);}gtag('js', new Date());gtag('set', 'developer_id.dZGVlNj', true);gtag('config', 'G-XPDLLMSMHQ');</script><script id="jetboost-script" type="text/javascript"> window.JETBOOST_SITE_ID = "clj7g82ou015p0qp589h903v7"; (function(d) { var s = d.createElement("script"); s.src = "https://cdn.jetboost.io/jetboost.js"; s.async = 1; d.getElementsByTagName("head")[0].appendChild(s); })(document); </script> <style> .image-div-fit { object-fit: cover; object-position: bottom left; } .image-div-fit-related { object-fit: cover; object-position: bottom left; } .image-div-fit-blog { object-position: center!important; } .code-snippet { padding: 40px; background-color: #efefef; width: 100%; overflow-wrap: anywhere; font-family: Courier New; } .footer-subscribe-embed-box .hs-form-private { display: block!important; } .footer-subscribe-embed-box label { margin-bottom: 5px; color: #fff; font-family: Montserrat; font-weight: 400; } .footer-subscribe-embed-box .hs-input { padding: 10px; border-radius: 5px; font-family: Montserrat; font-size: 14px; border: 0px; width: 95%; min-width: 275px; margin-right: 10px; } .footer-subscribe-embed-box .hs-fieldtype-checkbox { margin-top: 15px; } .footer-subscribe-embed-box li .hs-input { min-width: 0px!important; width: 15px; list-style-type: none; } .footer-subscribe-embed-box .inputs-list { padding-left: 0px; list-style-type: none; } .sidebar-newsletter-box .hs-fieldtype-checkbox { margin-top: 15px; } .sidebar-newsletter-box li .hs-input { min-width: 0px!important; width: 15px; list-style-type: none; font-weight: 400; font-size: 12px; } .sidebar-newsletter-box .inputs-list { padding-left: 0px; list-style-type: none; } .footer-subscribe-embed-box .is-placeholder { padding-bottom: 8px!important; } .footer-subscribe-embed-box .hs-input option { padding-bottom: 0px!important; } .sidebar-newsletter-box .hs-input { padding: 10px; border-radius: 5px; font-family: Montserrat; font-size: 11px; border: 0px; width: 95%; margin-right: 10px; } .sidebar-newsletter-box .hs-error-msg { font-size: 12px; font-weight: 800; font-family: Montserrat; color: #D13164; } .sidebar-newsletter-box .hs-error-msgs { padding-left: 0px; list-style-type: none } .sidebar-newsletter-box label { font-family: Montserrat; color: #fff; font-weight: 400; font-size: 12px; } .sidebar-newsletter-box .hs-button { margin-top: 5px; margin-bottom: 10px; font-size: 14px; padding: 10px; padding-left: 20px; padding-right: 20px; color: #fff; background-color: #D13164; border: 0px; font-family: Montserrat; font-weight: 400; border-radius: 20px; box-shadow: 0px 4px 8px rgba(0, 0, 0, 0.3); } .sidebar-newsletter-box .hs-form-private { justify-content: left!important; } .footer-subscribe-embed-box .hs-button { margin-top: 5px; margin-bottom: 10px; font-size: 14px; padding: 10px; padding-left: 20px; padding-right: 20px; color: #fff; background-color: #D13164; border: 0px; font-family: Montserrat; font-weight: 400; border-radius: 20px; box-shadow: 0px 4px 8px rgba(0, 0, 0, 0.3); } .footer-subscribe-embed-box .hs-error-msgs{ padding-left: 15px; color: #D13164; font-family: Montserrat; font-size: 10px; display: block!important; } .footer-subscribe-embed-box .hs-fieldtype-select { margin-right: -12px; } .footer-subscribe-embed-box .submitted-message { max-width: 350px; margin-left: auto; margin-right: auto; font-size: 14px; font-family: Montserrat; text-align: center; color: #fff; font-weight: 700; } .legal-content-section { justify-content: flex-start; display: flex; line-height: 26px; font-family: 'Montserrat'; font-size: 18px; font-weight: 400; } .legal-content-section h5 { margin-top: 10px; font-size: 18px; line-height: 26px; } .legal-content-section li { font-weight: 400; line-height: 24px; margin-bottom: 8px; } @supports (display: flex) { @media screen and (max-width: 480px) { .footer-subscribe-embed-box .hs-form-private { display: block!important; } } } </style> <script>    var hsscript = document.createElement("script");    hsscript.src = "https://cdn.jsdelivr.net/npm/hockeystack@latest/hockeystack.min.js";    hsscript.async = 1;    hsscript.dataset.apikey = "5105728fe4c8805a36893632a83b6e";    hsscript.dataset.cookieless = 1;    hsscript.dataset.autoIdentify = 1;    document.getElementsByTagName('head')[0].append(hsscript); </script> <script> document.addEventListener("DOMContentLoaded", function() { var authorElement = document.querySelector('.post-author-text-byline-author'); if (authorElement) { var authorName = authorElement.textContent.trim(); window.dataLayer = window.dataLayer || []; window.dataLayer.push({ 'event': 'authorDataReady', 'author': authorName }); } else { console.error("Author element not found"); } }); </script> <!-- OneTrust Cookies Consent Notice start for nozominetworks.com --> <script src=https://cdn.cookielaw.org/scripttemplates/otSDKStub.js type="text/javascript" charset="UTF-8" data-domain-script="1b3a08d1-270d-4dc7-8bd4-239c4aab3143" ></script> <script type="text/javascript"> function OptanonWrapper() { } </script> <!-- OneTrust Cookies Consent Notice end for nozominetworks.com --> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-NMJG569" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <script> window.dataLayer = window.dataLayer || []; </script> <!-- Google Tag Manager --> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!=='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-NMJG569');</script> <!-- End Google Tag Manager --> <!-- Start of HubSpot Embed Code --> <script type="text/javascript" id="hs-script-loader" async defer src="https://js.hs-scripts.com/2724979.js"></script> <!-- End of HubSpot Embed Code --> <!-- Start of Navattic Embed Code --> <script>void 0===window.navatticQueue&&(window.navatticQueue=[],window.navattic=new Proxy({},{get:function n(t,u,e){return function(){for(var n=arguments.length,t=Array(n),e=0;e<n;e++)t[e]=arguments[e];return navatticQueue.push({function:u,arguments:t})}}}));</script> <script async src=https://js.navattic.com/sdk.js data-key="pkey_cm34kqm5r01wars3b4wc40m5f"></script> <!-- End of Navattic Embed Code --><script type="text/javascript">window.__WEBFLOW_CURRENCY_SETTINGS = {"currencyCode":"USD","symbol":"$","decimal":".","fractionDigits":2,"group":",","template":"{{wf {\"path\":\"symbol\",\"type\":\"PlainText\"} }} {{wf {\"path\":\"amount\",\"type\":\"CommercePrice\"} }} {{wf {\"path\":\"currencyCode\",\"type\":\"PlainText\"} }}","hideDecimalForWholeNumbers":false};</script></head><body><div class="navigation-full"><section class="announcement-bar"><div class="w-layout-blockcontainer announcement-bar-container w-container"><div class="announcement-bar-text"><strong>Live Demo: The Nozomi Networks Platform in 15 Minutes<br/></strong></div><a href="https://www.nozominetworks.com/resources/live-demo-the-nozomi-networks-platform-in-15-minutes" target="_blank" class="announcement-bar-button w-button">Register Now</a></div></section><div class="navigation-top-banner"><div class="container-navigation top-menu-container w-container"><div class="navigation-link-wrapper top-navigation-link-wrapper"><a href="/academy" class="top-menu-link-block w-inline-block"><div class="top-menu-link-text">Academy</div></a><a href="/labs" class="top-menu-link-block w-inline-block"><div class="top-menu-link-text">Labs</div></a><a href="/company/careers" class="top-menu-link-block w-inline-block"><div class="top-menu-link-text">Careers</div></a><a href="https://partners.nozominetworks.com/English/" target="_blank" class="top-menu-link-block w-inline-block"><div class="top-menu-link-text">Partner Login</div></a><a href="/support" class="top-menu-link-block w-inline-block"><div class="top-menu-link-text">Support</div></a><div class="search-bar-container"><form action="/search" class="search w-form"><input class="search-input new-search w-input" maxlength="256" name="query" placeholder="Search our site" type="search" id="search" required=""/><input type="submit" class="search-button new-search-button w-button" value=""/></form></div></div></div></div><div data-collapse="medium" data-animation="default" data-duration="400" data-easing="ease" data-easing2="ease" role="banner" class="navigation w-nav"><div class="container-navigation"><div class="navigation-link-wrapper"><a href="/" class="brand w-nav-brand"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647cdfc8e9b140d6c4dd4877_nozomi-logo.svg" loading="eager" width="Auto" height="Auto" alt="Nozomi logo" class="logo-image"/></a></div><div class="navigation-button-wrapper"><nav role="navigation" class="menu-wrap w-nav-menu"><div data-hover="false" data-delay="0" data-w-id="1ab40eba-a5f5-f7de-7704-089030f70ece" class="dropdown w-dropdown"><div class="nav-toggle w-dropdown-toggle"><div>Platform</div></div><nav class="dropdown-list w-dropdown-list"><div class="w-layout-grid grid dropdown-nav-grid"><div id="w-node-_3ea21f8a-1846-69ab-921e-8e8150a3c30a-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647dee6d3014cdc037112e34_nozomi-platform-menu-icon-1.svg" loading="lazy" alt=""/><h3 class="nozomi-mega-menu-white-box-header">Platform Overview</h3><p class="nozomi-mega-menu-white-box-paragraph">Our industrial cybersecurity solutions deliver unmatched asset intelligence, threat detection and AI-driven insights.</p><a href="/products" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">Learn more</div></a></div></div><div id="w-node-_400aa6f7-63fa-cc3f-8563-dc071d4fcba7-30f70ec3" class="nav-dropdown-column-wrapper nav-dropdown-column-wrapper---border-right"><div class="nav-link-list-dropdown-wrapper"><div class="nav-link-list-small-header">MANAGERS</div><a href="/products/vantage" class="nav-link-list-link nav-link-list-tag-wrapper w-inline-block"><div class="nav-list-link-text">Vantage</div><div class="nav-link-list-tag"><div class="nav-link-list-tag-text">Cloud</div></div></a><a href="/products/central-management-console" class="nav-link-list-link nav-link-list-tag-wrapper w-inline-block"><div class="nav-list-link-text">Central Management Console</div><div class="nav-link-list-tag"><div class="nav-link-list-tag-text">On prem</div></div></a><div class="nav-link-list-small-header nav-link-list-small-header---next">SENSORS</div><a href="/products/guardian" class="nav-link-list-link nav-link-list-tag-wrapper w-inline-block"><div class="nav-list-link-text">Guardian</div><div class="nav-link-list-tag"><div class="nav-link-list-tag-text">Network</div></div></a><a href="/products/guardian-air" class="nav-link-list-link nav-link-list-tag-wrapper w-inline-block"><div class="nav-list-link-text">Guardian Air</div><div class="nav-link-list-tag"><div class="nav-link-list-tag-text">Wireless</div></div></a><a href="/products/arc" class="nav-link-list-link nav-link-list-tag-wrapper w-inline-block"><div class="nav-list-link-text">Arc</div><div class="nav-link-list-tag"><div class="nav-link-list-tag-text">Endpoint</div></div></a><div class="nav-link-list-small-header nav-link-list-small-header---next">ENHANCEMENTS</div><a href="/products/vantage-iq" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Vantage IQ</div></a><a href="/products/asset-intelligence" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Asset Intelligence</div></a><a href="/products/threat-intelligence" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Threat Intelligence</div></a><a href="/products/smart-polling" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Smart Polling</div></a></div></div><div id="w-node-d93d606f-7616-665b-d9d6-f2be7c09df30-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647df4835368816567937004_nozomi-platform-menu-icon-2.svg" loading="lazy" alt=""/><h3 class="nozomi-mega-menu-white-box-header">Professional Services</h3><p class="nozomi-mega-menu-white-box-paragraph">OT and IoT security expertise that speeds solution deployment and maximizes value</p><a href="/professional-services" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">Learn more</div></a></div></div><div id="w-node-c4efda6a-2861-356b-d552-253f04d97b7b-30f70ec3" class="nav-dropdown-column-wrapper"><div class="nav-link-list-dropdown-wrapper"><div class="nav-link-list-small-header">PROFESSIONAL <br/>SERVICES</div><a href="/professional-services/solution-design" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Design</div></a><a href="/professional-services/solution-deployment" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Deployment</div></a><a href="/professional-services/fast-track-service-packages" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Fast Track</div></a><a href="/professional-services/solution-optimization" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Optimization</div></a><a href="/professional-services/project-management" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Project Management</div></a></div></div></div></nav></div><div data-hover="false" data-delay="0" data-w-id="e1a612db-5ef3-2e1e-ef70-834ad7caa020" class="dropdown w-dropdown"><div class="nav-toggle w-dropdown-toggle"><div>Solutions</div></div><nav class="dropdown-list w-dropdown-list"><div class="w-layout-grid grid dropdown-nav-grid dropdown-nav-grid-solutions"><div id="w-node-e1a612db-5ef3-2e1e-ef70-834ad7caa030-30f70ec3" class="nav-dropdown-column-wrapper nav-dropdown-column-wrapper---border-right nav-dropdown-solutions-wrapper"><div class="nav-link-list-dropdown-wrapper"><div class="nav-link-list-small-header-with-icon-wrapper"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647df7bf62bc558e18211b85_nozomi-solutions-menu-icon-1.svg" loading="lazy" alt="" class="nav-link-list-small-header-icon"/><div class="nav-link-list-small-header">BUSINESS NEED</div></div><a href="/solutions/iot-ot-asset-inventory-management" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Asset Inventory Management</div></a><a href="/solutions/threat-detection-and-response" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Threat Detection &amp; Response</div></a><a href="/solutions/iot-ot-network-monitoring" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Continuous Network Monitoring</div></a><a href="/solutions/iot-ot-vulnerability-management" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Risk &amp; Vulnerability Management</div></a><a href="/solutions/iot-security" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">IoT Security</div></a><a href="/solutions/data-center-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Data Center Cybersecurity</div></a><a href="/solutions/building-automation-system-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Building Automation System<br/>Cybersecurity</div></a></div></div><div id="w-node-f086dac4-d3e5-963f-9b8e-0ff111f5ae9d-30f70ec3" class="nav-dropdown-column-wrapper nav-dropdown-solutions-wrapper"><div class="nav-link-list-dropdown-wrapper"><div class="nav-link-list-small-header-with-icon-wrapper industry-nav-link-list-small-header"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647df7bf74ced86d0dc1c29c_nozomi-solutions-menu-icon-3.svg" loading="lazy" alt="" class="nav-link-list-small-header-icon"/><div class="nav-link-list-small-header">INDUSTRY</div></div><div class="nav-link-list-two-column-wrapper w-row"><div class="w-col w-col-6 w-col-stack"><a href="/industries/airport-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Airports</div></a><a href="/industries/electric-utilities-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Electric Utilities</div></a><a href="/industries/federal-government" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Federal Government</div></a><a href="/industries/healthcare-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Healthcare</div></a><a href="/industries/manufacturing-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Manufacturing</div></a><a href="/industries/maritime-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Maritime</div></a><a href="/industries/mining-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Mining</div></a></div><div class="column-3 w-col w-col-6 w-col-stack"><a href="/industries/oil-gas-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Oil &amp; Gas</div></a><a href="/industries/pharmaceutical-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Pharmaceutical</div></a><a href="/industries/rail-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Rail</div></a><a href="/industries/retail-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Retail</div></a><a href="/industries/smart-cities-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Smart Cities</div></a><a href="/industries/stadiums-arenas" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Stadiums &amp; Arenas</div></a><a href="/industries/water-wastewater-cybersecurity" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Water &amp;<br/>Wastewater</div></a></div></div></div></div><div id="w-node-_6cc7f1ae-788f-64bd-f869-1683ba23c206-30f70ec3" class="nav-dropdown-column-wrapper nav-dropdown-column-wrapper---border-right nav-dropdown-solutions-wrapper"><div class="nav-link-list-dropdown-wrapper"><div class="nav-link-list-small-header-with-icon-wrapper"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647df7bfb032786965be445e_nozomi-solutions-menu-icon-2.svg" loading="lazy" alt="" class="nav-link-list-small-header-icon"/><div class="nav-link-list-small-header">COMPLIANCE</div></div><a href="/compliance/isa-iec-62443-standards" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">ISA/IEC 62443 Standards</div></a><a href="/compliance/nerc-cip" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">NERC CIP</div></a><a href="/compliance/nis2-directive-compliance" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">NIS2 Directive</div></a><a href="/compliance/sec-cybersecurity-rules" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">SEC Cybersecurity Rules</div></a><a href="/compliance/tsa-security-directives" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">TSA Security Directives</div></a></div></div></div></nav></div><div data-hover="false" data-delay="0" data-w-id="9a7c8e13-35ed-5514-55fe-acbc3f5fa706" class="dropdown w-dropdown"><div class="nav-toggle w-dropdown-toggle"><div>Partners</div></div><nav class="dropdown-list w-dropdown-list"><div class="w-layout-grid grid dropdown-nav-grid dropdown-nav-grid-partners"><div id="w-node-_73cd8bf4-a1be-55e6-0b6d-dc5f9a824c35-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper nav-dropdown-white-box-wrapper---wide partner-mega-menu-box"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647dfde6427cc3addfcd2765_nozomi-partners-menu-icon-1.svg" loading="lazy" alt=""/><h3 class="nozomi-mega-menu-white-box-header nozomi-mega-menu-white-box-header---wide">Why Partner with Us</h3><p class="nozomi-mega-menu-white-box-paragraph">Our global partner network deploys OT &amp; IoT cybersecurity solutions for customers around the world.</p><a href="/partners" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">Learn more</div></a></div></div><div id="w-node-_9a7c8e13-35ed-5514-55fe-acbc3f5fa70c-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper nav-dropdown-white-box-wrapper---wide partner-mega-menu-box"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647dfea905891930ecca34ac_nozomi-about-menu-icon-1.svg" loading="lazy" alt="" class="partner-menu-icon-1"/><h3 class="nozomi-mega-menu-white-box-header nozomi-mega-menu-white-box-header---wide">Our Partners</h3><p class="nozomi-mega-menu-white-box-paragraph">Explore all Nozomi Networks partners</p><a href="/partners#our-partners" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">Learn more</div></a></div></div><div id="w-node-_22c9ad28-eba7-dea8-6747-bc706e91b27b-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper nav-dropdown-white-box-wrapper---wide partner-mega-menu-box"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/65df8146636482acba9ef204_partner-search-icon.svg" loading="lazy" alt="" class="partner-mega-menu-icon-med"/><h3 class="nozomi-mega-menu-white-box-header nozomi-mega-menu-white-box-header---wide">Find a Partner</h3><p class="nozomi-mega-menu-white-box-paragraph">Find a certified Nozomi Networks partner in your country.</p><a href="/partners/find-a-partner" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">Learn more</div></a></div></div><div id="w-node-b6981566-e6b8-35f7-7a13-38fef51a2191-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper nav-dropdown-white-box-wrapper---wide partner-mega-menu-box"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64d507342134d4fe7e42c63f_NN-Icons-3-Colors-400x400px_laptop-140.svg" loading="lazy" alt="" class="partner-portal-icon partner-portal-icon-lg"/><h3 class="nozomi-mega-menu-white-box-header nozomi-mega-menu-white-box-header---wide">Partner Portal</h3><p class="nozomi-mega-menu-white-box-paragraph">Log into the Nozomi Networks partner portal.</p><a href="https://partners.nozominetworks.com/English/" target="_blank" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">Log In</div></a></div></div></div></nav></div><div data-hover="false" data-delay="0" data-w-id="7d3ce5f9-6240-b523-6112-039ee7d7c514" class="dropdown w-dropdown"><div class="nav-toggle w-dropdown-toggle"><div>Resources</div></div><nav class="dropdown-list w-dropdown-list"><div class="w-layout-grid grid dropdown-nav-grid dropdown-nav-resources-grid"><div id="w-node-c0f1f060-a76b-da20-975b-6301dc235111-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper nav-dropdown-white-box-wrapper---wide"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647e083e33848493787fd49d_nozomi-resources-menu-icon-1.svg" loading="lazy" alt=""/><h3 class="nozomi-mega-menu-white-box-header nozomi-mega-menu-white-box-header---wide">Resource Library</h3><p class="nozomi-mega-menu-white-box-paragraph">Browse OT &amp; IoT security research, guides, videos and more from the Nozomi Networks team.</p><a href="/resources" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">View Resources</div></a></div></div><div id="w-node-b95a8b1c-9b8b-0bf5-6bcc-881812dba420-30f70ec3" class="nav-dropdown-column-wrapper nav-dropdown-resources-columns-wrapper"><div class="nav-link-list-dropdown-wrapper"><div class="nav-link-list-small-header">RESOURCES</div><div class="nav-link-list-two-column-wrapper w-row"><div class="nav-menu-resources-column-1 w-col w-col-6"><a href="/case-studies" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Case Studies</div></a><a href="/content-packs" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Content Packs</div></a><a href="/data-sheets" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Data Sheets</div></a><a href="/guides" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Guides </div></a><a href="/podcasts" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Podcasts</div></a></div><div class="column-4 w-col w-col-6"><a href="/research-reports" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Research Reports</div></a><a href="/solution-briefs" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Solution Briefs</div></a><a href="/videos" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">Videos</div></a><a href="/webinars" aria-current="page" class="nav-link-list-link w-inline-block w--current"><div class="nav-list-link-text">Webinars</div></a><a href="/white-papers" class="nav-link-list-link w-inline-block"><div class="nav-list-link-text">White Papers</div></a></div></div></div></div><div id="w-node-_75fdf6f2-5fd5-5484-f185-d94876eefc91-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper nav-dropdown-white-box-wrapper---wide"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647dfea905891930ecca34ac_nozomi-about-menu-icon-1.svg" loading="lazy" alt=""/><h3 class="nozomi-mega-menu-white-box-header nozomi-mega-menu-white-box-header---wide">Customer Hub</h3><p class="nozomi-mega-menu-white-box-paragraph">Explore our latest customer resources, including webinars, how-to videos, content packs and more.</p><a href="/customer-resources" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">View Hub</div></a></div></div></div></nav></div><a href="/blog" class="top-nav-link-block w-inline-block"><div class="nav-toggle">Blog</div></a><div data-hover="false" data-delay="0" class="dropdown w-dropdown"><div class="nav-toggle w-dropdown-toggle"><div>Company</div></div><nav class="dropdown-list w-dropdown-list"><div class="w-layout-grid grid dropdown-nav-grid dropdown-nav-grid-company"><div id="w-node-_521dd46f-a407-64a5-dd19-ffaa1e9ebfbe-30f70ec3" class="nav-dropdown-column-wrapper white-box-column-wrapper"><div class="nav-dropdown-white-box-wrapper nav-dropdown-white-box-wrapper---wide"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647dfea905891930ecca34ac_nozomi-about-menu-icon-1.svg" loading="lazy" alt=""/><h3 class="nozomi-mega-menu-white-box-header nozomi-mega-menu-white-box-header---wide">About Nozomi Networks</h3><p class="nozomi-mega-menu-white-box-paragraph">We keep critical infrastructure and operational technology cyber resilient.</p><a href="/company" class="nozomi-mega-menu-white-box-link w-inline-block"><div class="nozomi-mega-menu-white-box-link-text">Learn more</div></a></div></div><div id="w-node-_521dd46f-a407-64a5-dd19-ffaa1e9ebfc8-30f70ec3" class="nav-dropdown-column-wrapper"><div class="nav-link-list-dropdown-wrapper nav-icon-links-grid-wrapper"><div class="nav-icon-links-column-wrapper w-row"><div class="w-col w-col-6"><a href="/company/leadership" class="nav-icon-links-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64c93675ed962a0e3b6e45d8_leadership-team-icon.svg" loading="lazy" alt="" class="nav-icon-links-icon company-links-icon"/><div class="nav-icon-links-text">Leadership Team</div></a><a href="/events" class="nav-icon-links-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64b57df71e33d8cb8245cbe7_%20events-icon.svg" loading="lazy" alt="" class="nav-icon-links-icon company-links-icon"/><div class="nav-icon-links-text">Events</div></a><a href="/company/newsroom" class="nav-icon-links-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64b57df7bb1169138c54ebc8_newsroom-icon.svg" loading="lazy" alt="" class="nav-icon-links-icon company-links-icon"/><div class="nav-icon-links-text">Newsroom</div></a></div><div class="w-col w-col-6"><a href="/company/careers" class="nav-icon-links-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64b57df7e2340e9dfe2c628b_careers-icon.svg" loading="lazy" alt="" class="nav-icon-links-icon company-links-icon"/><div class="nav-icon-links-text">Careers</div></a><a href="/customer-testimonials" class="nav-icon-links-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64b57df7de423e6e0ba360c1_customer-testimonials.svg" loading="lazy" alt="" class="nav-icon-links-icon company-links-icon"/><div class="nav-icon-links-text">Customer Testimonials</div></a><a href="/company/contact-us" class="nav-icon-links-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64b57df87f088fba967ffc33_contact-us.svg" loading="lazy" alt="" class="nav-icon-links-icon company-links-icon contact-us-menu-icon"/><div class="nav-icon-links-text">Contact Us</div></a></div></div></div></div></div></nav></div><div class="search-bar-container search-bar-container-mobile-nav"><form action="/search" class="search search-bar-container-mobile-nav w-form"><input class="search-input new-search search-input-mobile-nav w-input" maxlength="256" name="query" placeholder="" type="search" id="search" required=""/><input type="submit" class="search-button new-search-button w-button" value=""/></form></div></nav><a href="/demo" class="nav-button hs-cta-trigger-button-hs-cta-trigger-button-152380361226 w-button">Request Demo</a><div class="menu-button w-nav-button"><div class="w-icon-nav-menu"></div></div></div></div></div></div><section id="filtered" class="resources-page-filter-section"><div class="w-layout-blockcontainer resources-page-filter-section-container w-container"><div><div class="resources-sub-page-header-wrapper"><h1 class="resources-page-featured-resources-header">Webinars</h1></div><div class="w-row"><div class="w-col w-col-3"><div class="resources-page-filter-left-column-wrapper"><div data-hover="false" data-delay="0" class="resources-dropdown-area w-dropdown"><div class="resources-sidebar-button-toggle w-dropdown-toggle"><div class="resource-dropdown-filter-icon w-icon-dropdown-toggle"></div><div class="resources-filter-title resources-filter-title-button">Filter by Industry</div></div><nav class="resources-menu-dropdown-list w-dropdown-list"><div class="filter-block-wrapper w-form"><form id="email-form" name="email-form" data-name="Email Form" method="get" data-wf-page-id="6545247d392723f0e47900f6" data-wf-element-id="63a92fc6-1681-f1b1-d502-4dc44a7b0f6d" data-turnstile-sitekey="0x4AAAAAAAQTptj2So4dx43e"><div class="jetboost-filter-z5nz w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="airports" /></div><div class="filter-block-line-item-wrapper"><label class="w-checkbox"><input type="checkbox" id="checkbox-2" name="checkbox-2" data-name="Checkbox 2" class="w-checkbox-input"/><span class="checkbox-label w-form-label" for="checkbox-2">Checkbox 2</span><div class="filter-block-line-item-text">Airports</div></label></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="building-automation" /></div><div class="filter-block-line-item-wrapper"><label class="w-checkbox"><input type="checkbox" id="checkbox-2" name="checkbox-2" data-name="Checkbox 2" class="w-checkbox-input"/><span class="checkbox-label w-form-label" for="checkbox-2">Checkbox 2</span><div class="filter-block-line-item-text">Building Automation</div></label></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="data-centers" /></div><div class="filter-block-line-item-wrapper"><label class="w-checkbox"><input type="checkbox" id="checkbox-2" name="checkbox-2" data-name="Checkbox 2" class="w-checkbox-input"/><span class="checkbox-label w-form-label" for="checkbox-2">Checkbox 2</span><div class="filter-block-line-item-text">Data Centers</div></label></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="electric-utilities" /></div><div class="filter-block-line-item-wrapper"><label class="w-checkbox"><input type="checkbox" id="checkbox-2" name="checkbox-2" data-name="Checkbox 2" class="w-checkbox-input"/><span class="checkbox-label w-form-label" for="checkbox-2">Checkbox 2</span><div class="filter-block-line-item-text">Electric Utilities</div></label></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="federal-government" /></div><div class="filter-block-line-item-wrapper"><label class="w-checkbox"><input type="checkbox" id="checkbox-2" name="checkbox-2" data-name="Checkbox 2" class="w-checkbox-input"/><span class="checkbox-label w-form-label" for="checkbox-2">Checkbox 2</span><div class="filter-block-line-item-text">Federal Government</div></label></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="healthcare" /></div><div class="filter-block-line-item-wrapper"><label class="w-checkbox"><input type="checkbox" id="checkbox-2" name="checkbox-2" data-name="Checkbox 2" class="w-checkbox-input"/><span class="checkbox-label w-form-label" for="checkbox-2">Checkbox 2</span><div class="filter-block-line-item-text">Healthcare</div></label></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="manufacturing" /></div><div class="filter-block-line-item-wrapper"><label class="w-checkbox"><input type="checkbox" id="checkbox-2" name="checkbox-2" data-name="Checkbox 2" class="w-checkbox-input"/><span class="checkbox-label w-form-label" for="checkbox-2">Checkbox 2</span><div class="filter-block-line-item-text">Manufacturing</div></label></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="maritime" /></div><div class="filter-block-line-item-wrapper"><label class="w-checkbox"><input type="checkbox" id="checkbox-2" name="checkbox-2" data-name="Checkbox 2" class="w-checkbox-input"/><span class="checkbox-label w-form-label" for="checkbox-2">Checkbox 2</span><div class="filter-block-line-item-text">Maritime</div></label></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="mining" /></div><div class="filter-block-line-item-wrapper"><label class="w-checkbox"><input type="checkbox" id="checkbox-2" name="checkbox-2" data-name="Checkbox 2" class="w-checkbox-input"/><span class="checkbox-label w-form-label" for="checkbox-2">Checkbox 2</span><div class="filter-block-line-item-text">Mining</div></label></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="oil-gas" /></div><div class="filter-block-line-item-wrapper"><label class="w-checkbox"><input type="checkbox" id="checkbox-2" name="checkbox-2" data-name="Checkbox 2" class="w-checkbox-input"/><span class="checkbox-label w-form-label" for="checkbox-2">Checkbox 2</span><div class="filter-block-line-item-text">Oil &amp; Gas</div></label></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="pharmaceutical" /></div><div class="filter-block-line-item-wrapper"><label class="w-checkbox"><input type="checkbox" id="checkbox-2" name="checkbox-2" data-name="Checkbox 2" class="w-checkbox-input"/><span class="checkbox-label w-form-label" for="checkbox-2">Checkbox 2</span><div class="filter-block-line-item-text">Pharmaceutical</div></label></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="rail" /></div><div class="filter-block-line-item-wrapper"><label class="w-checkbox"><input type="checkbox" id="checkbox-2" name="checkbox-2" data-name="Checkbox 2" class="w-checkbox-input"/><span class="checkbox-label w-form-label" for="checkbox-2">Checkbox 2</span><div class="filter-block-line-item-text">Rail</div></label></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="retail" /></div><div class="filter-block-line-item-wrapper"><label class="w-checkbox"><input type="checkbox" id="checkbox-2" name="checkbox-2" data-name="Checkbox 2" class="w-checkbox-input"/><span class="checkbox-label w-form-label" for="checkbox-2">Checkbox 2</span><div class="filter-block-line-item-text">Retail</div></label></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="smart-cities" /></div><div class="filter-block-line-item-wrapper"><label class="w-checkbox"><input type="checkbox" id="checkbox-2" name="checkbox-2" data-name="Checkbox 2" class="w-checkbox-input"/><span class="checkbox-label w-form-label" for="checkbox-2">Checkbox 2</span><div class="filter-block-line-item-text">Smart Cities</div></label></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="transportation-logistics" /></div><div class="filter-block-line-item-wrapper"><label class="w-checkbox"><input type="checkbox" id="checkbox-2" name="checkbox-2" data-name="Checkbox 2" class="w-checkbox-input"/><span class="checkbox-label w-form-label" for="checkbox-2">Checkbox 2</span><div class="filter-block-line-item-text">Transportation &amp; Logistics</div></label></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="water-wastewater" /></div><div class="filter-block-line-item-wrapper"><label class="w-checkbox"><input type="checkbox" id="checkbox-2" name="checkbox-2" data-name="Checkbox 2" class="w-checkbox-input"/><span class="checkbox-label w-form-label" for="checkbox-2">Checkbox 2</span><div class="filter-block-line-item-text">Water &amp; Wastewater</div></label></div></div></div></div></form><div class="w-form-done"><div>Thank you! Your submission has been received!</div></div><div class="w-form-fail"><div>Oops! Something went wrong while submitting the form.</div></div></div></nav></div></div><div class="resources-page-filter-left-column-wrapper"><a href="/resources" class="learn-more-button resources-learn-more-button w-button">See All Resources</a></div></div><div class="w-col w-col-9"><div class="resources-page-filter-right-column-wrapper"><div class="resource-page-item-grid-wrapper jetboost-list-wrapper-p452 jetboost-list-wrapper-z5nz jetboost-list-wrapper-zx9k w-dyn-list"><div role="list" class="resource-collection-list-responsive w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="safeguarding-the-future-of-ot-integrated-detection-and-protection-solutions" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/safeguarding-the-future-of-ot-integrated-detection-and-protection-solutions" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66fc360b08160b6beaa2b5c4_NN-TXOne-Future-of-OT-Webinar-THUMBNAIL.webp" loading="lazy" alt="Safeguarding the Future of OT: Integrated Detection and Protection Solutions" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66fc360b08160b6beaa2b5c4_NN-TXOne-Future-of-OT-Webinar-THUMBNAIL-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66fc360b08160b6beaa2b5c4_NN-TXOne-Future-of-OT-Webinar-THUMBNAIL-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66fc360b08160b6beaa2b5c4_NN-TXOne-Future-of-OT-Webinar-THUMBNAIL-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66fc360b08160b6beaa2b5c4_NN-TXOne-Future-of-OT-Webinar-THUMBNAIL.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Safeguarding the Future of OT: Integrated Detection and Protection Solutions</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="endpoint-security-for-ot-iot-protect-what-it-agents-cant" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/endpoint-security-for-ot-iot-protect-what-it-agents-cant" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/670ef7c4b0ed23bfff6aca70_Nozomi-Networks-Arc-Expansion-THUMB.webp" loading="lazy" alt="Endpoint Security for OT &amp; IoT: Protect What IT Agents Can&#x27;t" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/670ef7c4b0ed23bfff6aca70_Nozomi-Networks-Arc-Expansion-THUMB-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/670ef7c4b0ed23bfff6aca70_Nozomi-Networks-Arc-Expansion-THUMB-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/670ef7c4b0ed23bfff6aca70_Nozomi-Networks-Arc-Expansion-THUMB.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Endpoint Security for OT &amp; IoT: Protect What IT Agents Can&#x27;t</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="nis2-and-its-impact-on-ot-cybersecurity" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/nis2-and-its-impact-on-ot-cybersecurity" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/670424131b9bec0c5f8d7216_NN-ADAPTIT-NIS2-2024-Webinara-THUMBNAIL.webp" loading="lazy" alt="NIS2 and Its Impact on OT Cybersecurity" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/670424131b9bec0c5f8d7216_NN-ADAPTIT-NIS2-2024-Webinara-THUMBNAIL-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/670424131b9bec0c5f8d7216_NN-ADAPTIT-NIS2-2024-Webinara-THUMBNAIL-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/670424131b9bec0c5f8d7216_NN-ADAPTIT-NIS2-2024-Webinara-THUMBNAIL-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/670424131b9bec0c5f8d7216_NN-ADAPTIT-NIS2-2024-Webinara-THUMBNAIL.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">NIS2 and Its Impact on OT Cybersecurity</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="the-ot-cybersecurity-experience" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/the-ot-cybersecurity-experience" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/67375a85e5c71150c1cb60d3_NN-OT-Cybersecurity-Experience-Webinar-THUMBNAIL.webp" loading="lazy" alt="The OT Cybersecurity Experience" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/67375a85e5c71150c1cb60d3_NN-OT-Cybersecurity-Experience-Webinar-THUMBNAIL-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/67375a85e5c71150c1cb60d3_NN-OT-Cybersecurity-Experience-Webinar-THUMBNAIL-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/67375a85e5c71150c1cb60d3_NN-OT-Cybersecurity-Experience-Webinar-THUMBNAIL-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/67375a85e5c71150c1cb60d3_NN-OT-Cybersecurity-Experience-Webinar-THUMBNAIL.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">The OT Cybersecurity Experience</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="the-new-national-asset-securing-data-centers-in-the-iot-era" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/the-new-national-asset-securing-data-centers-in-the-iot-era" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66fc44a1454a30cb15c67972_NN-UKI-The%20New%20National%20Asset-Webinar-THUMBNAIL.webp" loading="lazy" alt="The New National Asset: Securing Data Centers in the IoT Era" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66fc44a1454a30cb15c67972_NN-UKI-The%20New%20National%20Asset-Webinar-THUMBNAIL-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66fc44a1454a30cb15c67972_NN-UKI-The%20New%20National%20Asset-Webinar-THUMBNAIL-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66fc44a1454a30cb15c67972_NN-UKI-The%20New%20National%20Asset-Webinar-THUMBNAIL-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66fc44a1454a30cb15c67972_NN-UKI-The%20New%20National%20Asset-Webinar-THUMBNAIL.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">The New National Asset: Securing Data Centers in the IoT Era</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="navigating-the-isa-iec-62443-standards-the-road-to-ot-network-security" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/navigating-the-isa-iec-62443-standards-the-road-to-ot-network-security" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65eb7910e9ac816c7ae95524_ISA-IEC-62443-THUMBNAIL.webp" loading="lazy" alt="Navigating the ISA/IEC 62443 Standards: The Road to OT Network Security" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65eb7910e9ac816c7ae95524_ISA-IEC-62443-THUMBNAIL-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65eb7910e9ac816c7ae95524_ISA-IEC-62443-THUMBNAIL-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65eb7910e9ac816c7ae95524_ISA-IEC-62443-THUMBNAIL-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65eb7910e9ac816c7ae95524_ISA-IEC-62443-THUMBNAIL.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Navigating the ISA/IEC 62443 Standards: The Road to OT Network Security</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="building-cybersecurity-resilience-in-industrial-environments-the-isa-62443-approach" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/building-cybersecurity-resilience-in-industrial-environments-the-isa-62443-approach" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66e32fb6ad1fb3a3d2f480dc_NN-Plantvision-2024-Webinar-THUMBNAIL.webp" loading="lazy" alt="Building Cybersecurity Resilience in Industrial Environments: The ISA 62443 Approach" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66e32fb6ad1fb3a3d2f480dc_NN-Plantvision-2024-Webinar-THUMBNAIL-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66e32fb6ad1fb3a3d2f480dc_NN-Plantvision-2024-Webinar-THUMBNAIL-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66e32fb6ad1fb3a3d2f480dc_NN-Plantvision-2024-Webinar-THUMBNAIL-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66e32fb6ad1fb3a3d2f480dc_NN-Plantvision-2024-Webinar-THUMBNAIL.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Building Cybersecurity Resilience in Industrial Environments: The ISA 62443 Approach</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="nozomi-networks-and-mandiant-comprehensive-threat-intelligence-for-ot-iot-and-it-threat-detection-and-response" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/nozomi-networks-and-mandiant-comprehensive-threat-intelligence-for-ot-iot-and-it-threat-detection-and-response" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66b56cd8bd8f7f171d334096_Mandiant-TI-Feed-Expansion-Webinar-THUMBNAIL.webp" loading="lazy" alt="Nozomi Networks and Mandiant: Comprehensive Threat Intelligence for OT, IoT and IT Threat Detection and Response" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66b56cd8bd8f7f171d334096_Mandiant-TI-Feed-Expansion-Webinar-THUMBNAIL-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66b56cd8bd8f7f171d334096_Mandiant-TI-Feed-Expansion-Webinar-THUMBNAIL-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66b56cd8bd8f7f171d334096_Mandiant-TI-Feed-Expansion-Webinar-THUMBNAIL-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66b56cd8bd8f7f171d334096_Mandiant-TI-Feed-Expansion-Webinar-THUMBNAIL.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Nozomi Networks and Mandiant: Comprehensive Threat Intelligence for OT, IoT and IT Threat Detection and Response</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="meet-nozomi-networks-arc-embedded" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/meet-nozomi-networks-arc-embedded" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669ead498cd6c5bfa8f0e95f_NN-Arc-Embedded-Webinar-THUMBNAIL.webp" loading="lazy" alt="Meet Arc Embedded, the First Security Sensor Embedded in ICS" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669ead498cd6c5bfa8f0e95f_NN-Arc-Embedded-Webinar-THUMBNAIL-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669ead498cd6c5bfa8f0e95f_NN-Arc-Embedded-Webinar-THUMBNAIL-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669ead498cd6c5bfa8f0e95f_NN-Arc-Embedded-Webinar-THUMBNAIL-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669ead498cd6c5bfa8f0e95f_NN-Arc-Embedded-Webinar-THUMBNAIL.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Meet Arc Embedded, the First Security Sensor Embedded in ICS</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="ot-iot-cybersecurity-trends-and-insights-2024-1h" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/ot-iot-cybersecurity-trends-and-insights-2024-1h" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66ce6134131c75bddd79d038_Webinar-OT-IoT-Security-Report-2024-1H-THUMBNAIL%20copy.webp" loading="lazy" alt="OT/IoT Cybersecurity Trends and Insights | Reviewing the First Half of 2024" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66ce6134131c75bddd79d038_Webinar-OT-IoT-Security-Report-2024-1H-THUMBNAIL%20copy-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66ce6134131c75bddd79d038_Webinar-OT-IoT-Security-Report-2024-1H-THUMBNAIL%20copy-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66ce6134131c75bddd79d038_Webinar-OT-IoT-Security-Report-2024-1H-THUMBNAIL%20copy-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/66ce6134131c75bddd79d038_Webinar-OT-IoT-Security-Report-2024-1H-THUMBNAIL%20copy.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">OT/IoT Cybersecurity Trends and Insights | Reviewing the First Half of 2024</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="decode-saudi-nca-otcc-with-nozomi-networks" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/decode-saudi-nca-otcc-with-nozomi-networks" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669869eb07039edcd3617373_NN-NCA-OTCC-2024-Webinar-THUMBNAIL.webp" loading="lazy" alt="Compliance Quest: Decode Saudi NCA OTCC with Nozomi Networks" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669869eb07039edcd3617373_NN-NCA-OTCC-2024-Webinar-THUMBNAIL-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669869eb07039edcd3617373_NN-NCA-OTCC-2024-Webinar-THUMBNAIL-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669869eb07039edcd3617373_NN-NCA-OTCC-2024-Webinar-THUMBNAIL-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/669869eb07039edcd3617373_NN-NCA-OTCC-2024-Webinar-THUMBNAIL.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Compliance Quest: Decode Saudi NCA OTCC with Nozomi Networks</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="protecting-transportation-infrastructure-from-cyber-threats" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/protecting-transportation-infrastructure-from-cyber-threats" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/665767a98b60b5859a192ccc_NN-Fortinet-SE-Webinar-THUMBNAIL.webp" loading="lazy" alt="Protecting Transportation Infrastructure from Cyber Threats" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/665767a98b60b5859a192ccc_NN-Fortinet-SE-Webinar-THUMBNAIL-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/665767a98b60b5859a192ccc_NN-Fortinet-SE-Webinar-THUMBNAIL-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/665767a98b60b5859a192ccc_NN-Fortinet-SE-Webinar-THUMBNAIL-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/665767a98b60b5859a192ccc_NN-Fortinet-SE-Webinar-THUMBNAIL.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Protecting Transportation Infrastructure from Cyber Threats</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="enhancing-cyber-and-operational-resilience-in-pharmaceutical-and-manufacturing-facilities" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/enhancing-cyber-and-operational-resilience-in-pharmaceutical-and-manufacturing-facilities" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/663e56dcbdeec1e810e5145b_NN-Syscom-2024-Webinar-THUMBNAIL.webp" loading="lazy" alt="Enhancing Cyber and Operational Resilience in Pharmaceutical and Manufacturing Facilities" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/663e56dcbdeec1e810e5145b_NN-Syscom-2024-Webinar-THUMBNAIL-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/663e56dcbdeec1e810e5145b_NN-Syscom-2024-Webinar-THUMBNAIL-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/663e56dcbdeec1e810e5145b_NN-Syscom-2024-Webinar-THUMBNAIL-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/663e56dcbdeec1e810e5145b_NN-Syscom-2024-Webinar-THUMBNAIL.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Enhancing Cyber and Operational Resilience in Pharmaceutical and Manufacturing Facilities</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="fortify-your-process-automation-defenses-with-nozomi-networks-abb" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/fortify-your-process-automation-defenses-with-nozomi-networks-abb" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/663428538275a49fd46c3765_NN-ABB-2024-Webinar-THUMBNAIL.webp" loading="lazy" alt="Fortify Your Process Automation Defenses With Nozomi Networks &amp; ABB" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/663428538275a49fd46c3765_NN-ABB-2024-Webinar-THUMBNAIL-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/663428538275a49fd46c3765_NN-ABB-2024-Webinar-THUMBNAIL-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/663428538275a49fd46c3765_NN-ABB-2024-Webinar-THUMBNAIL-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/663428538275a49fd46c3765_NN-ABB-2024-Webinar-THUMBNAIL.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Fortify Your Process Automation Defenses With Nozomi Networks &amp; ABB</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="improving-security-maturity-with-the-tsa-security-directives" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/improving-security-maturity-with-the-tsa-security-directives" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6618647386d4fcb8ff839fe2_TSA-Security-THUMBNAIL.webp" loading="lazy" alt="Beyond the Checklist: Improving Security Maturity with the TSA Security Directives " sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6618647386d4fcb8ff839fe2_TSA-Security-THUMBNAIL-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6618647386d4fcb8ff839fe2_TSA-Security-THUMBNAIL-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6618647386d4fcb8ff839fe2_TSA-Security-THUMBNAIL-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6618647386d4fcb8ff839fe2_TSA-Security-THUMBNAIL.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Beyond the Checklist: Improving Security Maturity with the TSA Security Directives </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="solving-ot-iot-remote-access-and-security-through-integrated-solutions" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/solving-ot-iot-remote-access-and-security-through-integrated-solutions" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65f4607ed223a1ed792af40a_Solving-Remote-Access-THUMBNAIL.webp" loading="lazy" alt="Solving OT/IoT Remote Access and Security Through Integrated Solutions" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65f4607ed223a1ed792af40a_Solving-Remote-Access-THUMBNAIL-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65f4607ed223a1ed792af40a_Solving-Remote-Access-THUMBNAIL-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65f4607ed223a1ed792af40a_Solving-Remote-Access-THUMBNAIL-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65f4607ed223a1ed792af40a_Solving-Remote-Access-THUMBNAIL.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Solving OT/IoT Remote Access and Security Through Integrated Solutions</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="optimising-ot-security-for-australian-critical-infrastructure" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/optimising-ot-security-for-australian-critical-infrastructure" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65ebadf760b3f435fccb3003_Maturing-Technology-Integration-THUMB.webp" loading="lazy" alt="Optimising OT Security for Australian Critical Infrastructure" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65ebadf760b3f435fccb3003_Maturing-Technology-Integration-THUMB-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65ebadf760b3f435fccb3003_Maturing-Technology-Integration-THUMB-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65ebadf760b3f435fccb3003_Maturing-Technology-Integration-THUMB-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65ebadf760b3f435fccb3003_Maturing-Technology-Integration-THUMB.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Optimising OT Security for Australian Critical Infrastructure</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="assessing-the-threat-landscape-for-ot-iot-security" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/assessing-the-threat-landscape-for-ot-iot-security" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65c2c75dc2a137a2997e805f_Security-Report-2023-2H-Webinar-THUMBNAIL.webp" loading="lazy" alt="Assessing the Threat Landscape for OT &amp; IoT Security – A Review of the Second Half of 2023" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Assessing the Threat Landscape for OT &amp; IoT Security – A Review of the Second Half of 2023</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="meet-guardian-air-the-first-wireless-sensor-for-ot-iot" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/meet-guardian-air-the-first-wireless-sensor-for-ot-iot" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b00d96a4cec16f9a35083f_NN-Air-Guardian-Launch-Webinar-THUMBNAIL.webp" loading="lazy" alt="Meet Guardian Air, the First Wireless Sensor for OT &amp; IoT " sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b00d96a4cec16f9a35083f_NN-Air-Guardian-Launch-Webinar-THUMBNAIL-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b00d96a4cec16f9a35083f_NN-Air-Guardian-Launch-Webinar-THUMBNAIL-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b00d96a4cec16f9a35083f_NN-Air-Guardian-Launch-Webinar-THUMBNAIL-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65b00d96a4cec16f9a35083f_NN-Air-Guardian-Launch-Webinar-THUMBNAIL.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Meet Guardian Air, the First Wireless Sensor for OT &amp; IoT </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="sec-cybersecurity-regulations-implementation" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/sec-cybersecurity-regulations-implementation" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65845ee4c919dc7d65ac8916_Webinar-SEC-THUMBNAIL%20.webp" loading="lazy" alt="Implementing the SEC Cybersecurity Regulations" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65845ee4c919dc7d65ac8916_Webinar-SEC-THUMBNAIL%20-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65845ee4c919dc7d65ac8916_Webinar-SEC-THUMBNAIL%20-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65845ee4c919dc7d65ac8916_Webinar-SEC-THUMBNAIL%20-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65845ee4c919dc7d65ac8916_Webinar-SEC-THUMBNAIL%20.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Implementing the SEC Cybersecurity Regulations</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="nozomi-networks-and-garland-technology-unlock-visibility-and-security-across-ot-iot-and-it-teams" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/nozomi-networks-and-garland-technology-unlock-visibility-and-security-across-ot-iot-and-it-teams" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/657c93b4791665f84aae2e01_Garland-Unlock-Visibility-THUMBNAIL.webp" loading="lazy" alt="Unlock Visibility and Security Across OT, IoT, and IT Teams | Nozomi Networks and Garland Technology" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/657c93b4791665f84aae2e01_Garland-Unlock-Visibility-THUMBNAIL-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/657c93b4791665f84aae2e01_Garland-Unlock-Visibility-THUMBNAIL-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/657c93b4791665f84aae2e01_Garland-Unlock-Visibility-THUMBNAIL-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/657c93b4791665f84aae2e01_Garland-Unlock-Visibility-THUMBNAIL.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Unlock Visibility and Security Across OT, IoT, and IT Teams | Nozomi Networks and Garland Technology</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="webinar-solving-cybersecurity-for-building-management-systems" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/webinar-solving-cybersecurity-for-building-management-systems" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65411ce8f621b616a2560eda_Solving-Cybersecurity-Intelligent-Buildings-THUMBNAIL.webp" loading="lazy" alt="Webinar: Solving Cybersecurity for Building Management Systems " class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Webinar: Solving Cybersecurity for Building Management Systems </h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="to-visibility-and-beyond-preparing-for-nis2-compliance" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/to-visibility-and-beyond-preparing-for-nis2-compliance" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65089497fffce65641e25211_NIS2-Webinar-THUMBNAIL.webp" loading="lazy" alt="To Visibility and Beyond! Preparing for NIS2 Compliance" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65089497fffce65641e25211_NIS2-Webinar-THUMBNAIL-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65089497fffce65641e25211_NIS2-Webinar-THUMBNAIL-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65089497fffce65641e25211_NIS2-Webinar-THUMBNAIL-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/65089497fffce65641e25211_NIS2-Webinar-THUMBNAIL.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">To Visibility and Beyond! Preparing for NIS2 Compliance</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="the-power-of-tech-integration-for-advanced-ot-threat-detection-and-response" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/the-power-of-tech-integration-for-advanced-ot-threat-detection-and-response" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64f74a115eaac06288af2cfd_Fortinet-EMEA-Webinar-THUMBNAIL.jpeg" loading="lazy" alt="The Power of Tech Integration for Advanced OT Threat Detection and Response" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64f74a115eaac06288af2cfd_Fortinet-EMEA-Webinar-THUMBNAIL-p-500.jpeg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64f74a115eaac06288af2cfd_Fortinet-EMEA-Webinar-THUMBNAIL-p-800.jpeg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64f74a115eaac06288af2cfd_Fortinet-EMEA-Webinar-THUMBNAIL-p-1080.jpeg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64f74a115eaac06288af2cfd_Fortinet-EMEA-Webinar-THUMBNAIL.jpeg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">The Power of Tech Integration for Advanced OT Threat Detection and Response</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="flight-to-resilience-addressing-cyber-threats-in-todays-connected-airports" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/flight-to-resilience-addressing-cyber-threats-in-todays-connected-airports" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64da7d3d71d53d04e9f071ee_EMEA-Airport-Webinar-THUMB-1200x628.jpeg" loading="lazy" alt="Flight to Resilience: Addressing Cyber Threats in Today&#x27;s Connected Airports" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64da7d3d71d53d04e9f071ee_EMEA-Airport-Webinar-THUMB-1200x628-p-500.jpeg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64da7d3d71d53d04e9f071ee_EMEA-Airport-Webinar-THUMB-1200x628-p-800.jpeg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64da7d3d71d53d04e9f071ee_EMEA-Airport-Webinar-THUMB-1200x628-p-1080.jpeg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64da7d3d71d53d04e9f071ee_EMEA-Airport-Webinar-THUMB-1200x628.jpeg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Flight to Resilience: Addressing Cyber Threats in Today&#x27;s Connected Airports</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="unpacking-the-ot-iot-threat-landscape-with-nozomi-networks-telemetry" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/unpacking-the-ot-iot-threat-landscape-with-nozomi-networks-telemetry" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64dd19b69fa84fc2358fe48c_Security-Report-2023-1H-Webinar-Public-THUMBNAIL-400x209.webp" loading="lazy" alt="Webinar: Unpacking the OT &amp; IoT Threat Landscape with Nozomi Networks Telemetry" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Webinar: Unpacking the OT &amp; IoT Threat Landscape with Nozomi Networks Telemetry</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="ot-automated-detection-and-response" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/ot-automated-detection-and-response" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64aeb106bd2b0d41e31b5a83_NN-TxOne-Webinar-US-SOCIAL-LP-Thumnail.webp" loading="lazy" alt="OT Automated Detection and Response" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64aeb106bd2b0d41e31b5a83_NN-TxOne-Webinar-US-SOCIAL-LP-Thumnail-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64aeb106bd2b0d41e31b5a83_NN-TxOne-Webinar-US-SOCIAL-LP-Thumnail-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64aeb106bd2b0d41e31b5a83_NN-TxOne-Webinar-US-SOCIAL-LP-Thumnail-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64aeb106bd2b0d41e31b5a83_NN-TxOne-Webinar-US-SOCIAL-LP-Thumnail.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">OT Automated Detection and Response</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="the-next-generation-of-ai-for-ot-cybersecurity" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/the-next-generation-of-ai-for-ot-cybersecurity" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6499bf04aababd051ca1d8fd_Vantage-IQ-THUMBNAIL-2-620x324.jpeg" loading="lazy" alt="Vantage IQ, The Next Generation of AI for OT Cybersecurity" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6499bf04aababd051ca1d8fd_Vantage-IQ-THUMBNAIL-2-620x324-p-500.jpeg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6499bf04aababd051ca1d8fd_Vantage-IQ-THUMBNAIL-2-620x324.jpeg 620w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Vantage IQ, The Next Generation of AI for OT Cybersecurity</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="webinar-extending-the-purdue-model-to-iot-ot-vulnerability-remediation" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/webinar-extending-the-purdue-model-to-iot-ot-vulnerability-remediation" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/651cda375687f602df60fa6b_Webinar-Q3-Viakoo-Thumb.jpg" loading="lazy" alt="Extending the Purdue Model to IoT/OT Vulnerability Remediation" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/651cda375687f602df60fa6b_Webinar-Q3-Viakoo-Thumb-p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/651cda375687f602df60fa6b_Webinar-Q3-Viakoo-Thumb-p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/651cda375687f602df60fa6b_Webinar-Q3-Viakoo-Thumb-p-1080.jpg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/651cda375687f602df60fa6b_Webinar-Q3-Viakoo-Thumb.jpg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Extending the Purdue Model to IoT/OT Vulnerability Remediation</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="thinking-like-an-adversary" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/thinking-like-an-adversary" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6499bf04cccebf44dced4f73_Thinking-Like-Adversary-THUMB.jpeg" loading="lazy" alt="Thinking Like an Adversary" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6499bf04cccebf44dced4f73_Thinking-Like-Adversary-THUMB-p-500.jpeg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6499bf04cccebf44dced4f73_Thinking-Like-Adversary-THUMB-p-800.jpeg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6499bf04cccebf44dced4f73_Thinking-Like-Adversary-THUMB-p-1080.jpeg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6499bf04cccebf44dced4f73_Thinking-Like-Adversary-THUMB.jpeg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Thinking Like an Adversary</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="cybersecurity-common-practices-for-critical-infrastructure" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/cybersecurity-common-practices-for-critical-infrastructure" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ff4d015de68df1b6976560_Cybersecurity-Common-Practices.webp" loading="lazy" alt="Cybersecurity Common Practices for Critical Infrastructure" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ff4d015de68df1b6976560_Cybersecurity-Common-Practices-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ff4d015de68df1b6976560_Cybersecurity-Common-Practices-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ff4d015de68df1b6976560_Cybersecurity-Common-Practices-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ff4d015de68df1b6976560_Cybersecurity-Common-Practices.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Cybersecurity Common Practices for Critical Infrastructure</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="operationalizing-threat-intelligence-acrossit-and-ot-environments" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/operationalizing-threat-intelligence-acrossit-and-ot-environments" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646279d500df60e26e8b5543_Operationalizing-Threat-Intelligence-across-IT-and-OT-environments.jpeg" loading="lazy" alt="Operationalizing Threat Intelligence across IT and OT Environments" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Operationalizing Threat Intelligence across IT and OT Environments</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="data-centers-are-migrating-to-the-cloud" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/data-centers-are-migrating-to-the-cloud" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646279d6c2c1b40fe06aaddf_Webinar_Thumbnail-Update-2023.jpeg" loading="lazy" alt="Data Centers Are Migrating To the Cloud" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Data Centers Are Migrating To the Cloud</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="deep-dive-with-the-ics-advisory-project" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/deep-dive-with-the-ics-advisory-project" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/651cda54398ff01e76fec2d0_CS-Advisory-Webinar-THUMBNAIL.jpg" loading="lazy" alt="Deep Dive with the ICS Advisory Project" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/651cda54398ff01e76fec2d0_CS-Advisory-Webinar-THUMBNAIL-p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/651cda54398ff01e76fec2d0_CS-Advisory-Webinar-THUMBNAIL-p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/651cda54398ff01e76fec2d0_CS-Advisory-Webinar-THUMBNAIL-p-1080.jpg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/651cda54398ff01e76fec2d0_CS-Advisory-Webinar-THUMBNAIL.jpg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Deep Dive with the ICS Advisory Project</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="a-deep-look-into-the-ics-threat-landscape" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/a-deep-look-into-the-ics-threat-landscape" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/6499bf02a689344d8e330c6d_6495ae1de6e4fceecb651c1b_ON-DEMAND-WEBINAR_-A-Deep-Look-Into-the-ICS-Threat-Landscape-400x209.webp" loading="lazy" alt="A Deep Look Into the ICS Threat Landscape" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">A Deep Look Into the ICS Threat Landscape</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="enabling-fceb-agencies-to-enact-bod-23-01" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/enabling-fceb-agencies-to-enact-bod-23-01" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646279dd0df968af755e3431_BOD-23-01-THUMB.jpeg" loading="lazy" alt="Enabling FCEB Agencies to Enact BOD 23-01" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Enabling FCEB Agencies to Enact BOD 23-01</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="sans-survey-the-state-of-ot-ics-cybersecurity-in-2022-and-beyond" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/sans-survey-the-state-of-ot-ics-cybersecurity-in-2022-and-beyond" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646279de7ffd5ad2bedac985_SANS-Cybersecurity-State-2022-Thumb.jpeg" loading="lazy" alt="SANS Survey: The State of OT/ICS Cybersecurity in 2022 and Beyond" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">SANS Survey: The State of OT/ICS Cybersecurity in 2022 and Beyond</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="operation-cyber-crisis-nozomi-networks-war-game" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/operation-cyber-crisis-nozomi-networks-war-game" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646279de7389bdff076ee6e7_War-Game-Thumb.jpeg" loading="lazy" alt="Operation Cyber Crisis, Nozomi Networks War Game" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Operation Cyber Crisis, Nozomi Networks War Game</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="webinar-improving-soc-efficiency" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/webinar-improving-soc-efficiency" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efa34b163cdd4bfaa6e22_Improving-SOC-Efficiency.jpg" loading="lazy" alt="Improving SOC Efficiency" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efa34b163cdd4bfaa6e22_Improving-SOC-Efficiency-p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efa34b163cdd4bfaa6e22_Improving-SOC-Efficiency-p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efa34b163cdd4bfaa6e22_Improving-SOC-Efficiency-p-1080.jpg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efa34b163cdd4bfaa6e22_Improving-SOC-Efficiency.jpg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Improving SOC Efficiency</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="building-a-cyber-fortress" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/building-a-cyber-fortress" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646279e2975f51240710c75b_NN-Building-Cyber-Fortress-SOCIAL.jpeg" loading="lazy" alt="Building a Cyber Fortress, Preparedness and Resilience in Critical Infrastructure" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Building a Cyber Fortress, Preparedness and Resilience in Critical Infrastructure</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="labs-webinars-nozomi-networks-labs-1st-half-2022-ot-iot-security-review" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/labs-webinars-nozomi-networks-labs-1st-half-2022-ot-iot-security-review" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646279e21c0a80cd6161ffa9_Security-Report-2022-1H-EVENT-2.jpeg" loading="lazy" alt="Nozomi Networks Labs 1st Half 2022 OT/IoT Security Review" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Nozomi Networks Labs 1st Half 2022 OT/IoT Security Review</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="can-zero-trust-shine-a-light" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/can-zero-trust-shine-a-light" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646279e4e34aa5b05475ff52_Zero-Trust-Webinar.jpeg" loading="lazy" alt="In a World of Darkness, Can Zero Trust Shine a Light?" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">In a World of Darkness, Can Zero Trust Shine a Light?</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="a-day-in-the-life-of-an-ot-responder" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/a-day-in-the-life-of-an-ot-responder" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/651cda7d04fb8974c350fa0b_Life-Of-OT-Responder-Webinar-THUMB.jpg" loading="lazy" alt="A Day in the Life of an OT Responder" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/651cda7d04fb8974c350fa0b_Life-Of-OT-Responder-Webinar-THUMB-p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/651cda7d04fb8974c350fa0b_Life-Of-OT-Responder-Webinar-THUMB-p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/651cda7d04fb8974c350fa0b_Life-Of-OT-Responder-Webinar-THUMB-p-1080.jpg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/651cda7d04fb8974c350fa0b_Life-Of-OT-Responder-Webinar-THUMB.jpg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">A Day in the Life of an OT Responder</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="de-risk-it-ot-convergence-with-vulnerability-lifecycle-management" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/de-risk-it-ot-convergence-with-vulnerability-lifecycle-management" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646279e36ad62c7541ff1437_NN-Skybox-De-Risk-IT-OT-Convergence-02-WEBINAR-1.jpeg" loading="lazy" alt="De-Risk IT/OT Convergence With Vulnerability Lifecycle Management" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">De-Risk IT/OT Convergence With Vulnerability Lifecycle Management</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="advanced-monitoring-cyber-incident-response-for-ics-ot" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/advanced-monitoring-cyber-incident-response-for-ics-ot" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646279e3ef920093d1aa9354_NN-Honeywell-Advanced-Monitoring-WEBINAR-1.jpeg" loading="lazy" alt="Advanced Monitoring &amp; Cyber Incident Response for ICS/OT" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Advanced Monitoring &amp; Cyber Incident Response for ICS/OT</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="iiot-world-manufacturing-day-cyber-and-operational-resilience-for-smart-factories" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/iiot-world-manufacturing-day-cyber-and-operational-resilience-for-smart-factories" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646279e3f8f4cde2557e40dc_FRX86OQWUAEWd-p.jpeg" loading="lazy" alt="Cyber and Operational Resilience for Smart Factories" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Cyber and Operational Resilience for Smart Factories</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="ot-network-security-challenges-in-enterprise-environments" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/ot-network-security-challenges-in-enterprise-environments" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efb046db712244b3be6a5_OT-Network-Security-Challenges-in-Enterprise-Environments.jpg" loading="lazy" alt="OT Network Security Challenges in Enterprise Environments" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efb046db712244b3be6a5_OT-Network-Security-Challenges-in-Enterprise-Environments-p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efb046db712244b3be6a5_OT-Network-Security-Challenges-in-Enterprise-Environments-p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efb046db712244b3be6a5_OT-Network-Security-Challenges-in-Enterprise-Environments-p-1080.jpg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efb046db712244b3be6a5_OT-Network-Security-Challenges-in-Enterprise-Environments.jpg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">OT Network Security Challenges in Enterprise Environments</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="ot-cybersecurity-in-the-era-of-automated-shipping-operations" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/ot-cybersecurity-in-the-era-of-automated-shipping-operations" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646279e4307bbf3ac4c17601_good-bad-ugly-thumb.jpeg" loading="lazy" alt="OT Cybersecurity in the Era of Automated Shipping Operations" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">OT Cybersecurity in the Era of Automated Shipping Operations</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="monitoring-protecting-assets-in-critical-infrastructure" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/monitoring-protecting-assets-in-critical-infrastructure" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efb3413dffed6fa0a11b5_Monitoring-%26-Protecting-Assets-in-Critical-Infrastructure.jpg" loading="lazy" alt="Monitoring &amp; Protecting Assets in Critical Infrastructure" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efb3413dffed6fa0a11b5_Monitoring-%26-Protecting-Assets-in-Critical-Infrastructure-p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efb3413dffed6fa0a11b5_Monitoring-%26-Protecting-Assets-in-Critical-Infrastructure-p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efb3413dffed6fa0a11b5_Monitoring-%26-Protecting-Assets-in-Critical-Infrastructure-p-1080.jpg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efb3413dffed6fa0a11b5_Monitoring-%26-Protecting-Assets-in-Critical-Infrastructure.jpg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Monitoring &amp; Protecting Assets in Critical Infrastructure</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="cybersecurity-strategies-for-smart-buildings-and-commercial-real-estate" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/cybersecurity-strategies-for-smart-buildings-and-commercial-real-estate" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646279e5c2c1b40fe06ab95a_Intelligent-Buildings-WEBINAR.jpeg" loading="lazy" alt="Cybersecurity Strategies for Smart Buildings and Commercial Real Estate" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Cybersecurity Strategies for Smart Buildings and Commercial Real Estate</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="in-the-world-of-unsecure-iot-is-privacy-dead-webinar" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/in-the-world-of-unsecure-iot-is-privacy-dead-webinar" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efb694cb01ab961fc978e_In-the-World-of-Unsecure-IoT---Is-Privacy-Dead.jpg" loading="lazy" alt="In the World of Unsecure IoT – Is Privacy Dead?" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efb694cb01ab961fc978e_In-the-World-of-Unsecure-IoT---Is-Privacy-Dead-p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efb694cb01ab961fc978e_In-the-World-of-Unsecure-IoT---Is-Privacy-Dead-p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efb694cb01ab961fc978e_In-the-World-of-Unsecure-IoT---Is-Privacy-Dead-p-1080.jpg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efb694cb01ab961fc978e_In-the-World-of-Unsecure-IoT---Is-Privacy-Dead.jpg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">In the World of Unsecure IoT – Is Privacy Dead?</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="understanding-the-risks-to-operational-technology-ot" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/understanding-the-risks-to-operational-technology-ot" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efb5c3d70bc8e5b4a96eb_Understanding-the-Risks-to-Operational-Technology.jpg" loading="lazy" alt="Understanding the Risks to Operational Technology (OT)" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efb5c3d70bc8e5b4a96eb_Understanding-the-Risks-to-Operational-Technology-p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efb5c3d70bc8e5b4a96eb_Understanding-the-Risks-to-Operational-Technology-p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efb5c3d70bc8e5b4a96eb_Understanding-the-Risks-to-Operational-Technology-p-1080.jpg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efb5c3d70bc8e5b4a96eb_Understanding-the-Risks-to-Operational-Technology.jpg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Understanding the Risks to Operational Technology (OT)</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="protecting-operational-technology" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/protecting-operational-technology" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efba51a9fda503e4636cb_Protecting-Operational-Technology-.jpg" loading="lazy" alt="Protecting Operational Technology" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efba51a9fda503e4636cb_Protecting-Operational-Technology--p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efba51a9fda503e4636cb_Protecting-Operational-Technology--p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efba51a9fda503e4636cb_Protecting-Operational-Technology--p-1080.jpg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efba51a9fda503e4636cb_Protecting-Operational-Technology-.jpg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Protecting Operational Technology</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="defending-smart-cities-from-cyber-threats" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/defending-smart-cities-from-cyber-threats" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efbad8eb853875a9a6642_Defending-Smart-Cities-from-Cyber-Threats.jpg" loading="lazy" alt="Defending Smart Cities from Cyber Threats" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efbad8eb853875a9a6642_Defending-Smart-Cities-from-Cyber-Threats-p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efbad8eb853875a9a6642_Defending-Smart-Cities-from-Cyber-Threats-p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efbad8eb853875a9a6642_Defending-Smart-Cities-from-Cyber-Threats-p-1080.jpg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efbad8eb853875a9a6642_Defending-Smart-Cities-from-Cyber-Threats.jpg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Defending Smart Cities from Cyber Threats</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="investigating-the-ransomware-and-iot-vulnerabilities-landscape" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/investigating-the-ransomware-and-iot-vulnerabilities-landscape" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646279e9b573838013c3a26a_ransomware.jpeg" loading="lazy" alt="Investigating Ransomware and IoT Vulnerabilities" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Investigating Ransomware and IoT Vulnerabilities</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="ransomware-and-beyond-cybersecurity-is-a-team-sport" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/ransomware-and-beyond-cybersecurity-is-a-team-sport" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646279e91475b93f60bf9a72_Ransomeware-Beyond-Webinar-Thumb-2.jpeg" loading="lazy" alt="Ransomware and Beyond - Cybersecurity is a Team Sport" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Ransomware and Beyond - Cybersecurity is a Team Sport</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="how-to-build-an-effective-ot-iot-cybersecurity-risk-compliance-program" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/how-to-build-an-effective-ot-iot-cybersecurity-risk-compliance-program" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efc67b1201acb633a0b01_How-to-Build-An-Effective-OT-IoT-Cybersecurity-Risk-%26-Compliance-Program-.jpg" loading="lazy" alt="How to Build an Effective OT/IoT Cybersecurity Risk &amp; Compliance Program" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efc67b1201acb633a0b01_How-to-Build-An-Effective-OT-IoT-Cybersecurity-Risk-%26-Compliance-Program--p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efc67b1201acb633a0b01_How-to-Build-An-Effective-OT-IoT-Cybersecurity-Risk-%26-Compliance-Program--p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efc67b1201acb633a0b01_How-to-Build-An-Effective-OT-IoT-Cybersecurity-Risk-%26-Compliance-Program--p-1080.jpg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efc67b1201acb633a0b01_How-to-Build-An-Effective-OT-IoT-Cybersecurity-Risk-%26-Compliance-Program-.jpg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">How to Build an Effective OT/IoT Cybersecurity Risk &amp; Compliance Program</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="best-practices-to-deploy-zero-trust-with-ai-driven-threat-detection-for-it-ot-networks" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/best-practices-to-deploy-zero-trust-with-ai-driven-threat-detection-for-it-ot-networks" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ff62b292f11ef53fda6223_Zero-Trust-THUMB.webp" loading="lazy" alt="Best Practices to Deploy Zero Trust With AI-driven Threat Detection for IT/OT" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ff62b292f11ef53fda6223_Zero-Trust-THUMB-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ff62b292f11ef53fda6223_Zero-Trust-THUMB-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ff62b292f11ef53fda6223_Zero-Trust-THUMB-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ff62b292f11ef53fda6223_Zero-Trust-THUMB.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Best Practices to Deploy Zero Trust With AI-driven Threat Detection for IT/OT</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="demystifying-the-colonial-pipeline-attack-how-ransomware-works" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/demystifying-the-colonial-pipeline-attack-how-ransomware-works" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ff4e911627a0674a61aec2_DarkSide-Ransomeware-THUMB.webp" loading="lazy" alt="Demystifying the Colonial Pipeline Attack &amp; How Ransomware Works" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ff4e911627a0674a61aec2_DarkSide-Ransomeware-THUMB-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ff4e911627a0674a61aec2_DarkSide-Ransomeware-THUMB-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ff4e911627a0674a61aec2_DarkSide-Ransomeware-THUMB-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ff4e911627a0674a61aec2_DarkSide-Ransomeware-THUMB.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Demystifying the Colonial Pipeline Attack &amp; How Ransomware Works</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="insights-on-the-top-ot-iot-security-threats-how-to-protect-your-operations" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/insights-on-the-top-ot-iot-security-threats-how-to-protect-your-operations" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/646279ea7389bdff076ef52b_OT-IoT-Security-Report-2021-_1200x628.png" loading="lazy" alt="Insights on the Top OT/IoT Security Threats" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Insights on the Top OT/IoT Security Threats</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="security-implications-of-the-australian-critical-infrastructure-act" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/security-implications-of-the-australian-critical-infrastructure-act" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efc9a0c655c9a2e86ab71_Security-Implications-of-the-Australian-Critical-Infrastructure-Act.jpg" loading="lazy" alt="Security Implications of the Australian Critical Infrastructure Act" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efc9a0c655c9a2e86ab71_Security-Implications-of-the-Australian-Critical-Infrastructure-Act-p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efc9a0c655c9a2e86ab71_Security-Implications-of-the-Australian-Critical-Infrastructure-Act-p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efc9a0c655c9a2e86ab71_Security-Implications-of-the-Australian-Critical-Infrastructure-Act-p-1080.jpg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efc9a0c655c9a2e86ab71_Security-Implications-of-the-Australian-Critical-Infrastructure-Act.jpg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Security Implications of the Australian Critical Infrastructure Act</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="drilling-into-the-importance-of-cybersecurity" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/drilling-into-the-importance-of-cybersecurity" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcad8eb853875a9bc270_From-Oil-Rig-to-Boardroom---Drilling-Into-the-Importance-of-Cybersecurity-.jpg" loading="lazy" alt="From Oil Rig to Boardroom – Drilling Into the Importance of Cybersecurity" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcad8eb853875a9bc270_From-Oil-Rig-to-Boardroom---Drilling-Into-the-Importance-of-Cybersecurity--p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcad8eb853875a9bc270_From-Oil-Rig-to-Boardroom---Drilling-Into-the-Importance-of-Cybersecurity--p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcad8eb853875a9bc270_From-Oil-Rig-to-Boardroom---Drilling-Into-the-Importance-of-Cybersecurity--p-1080.jpg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcad8eb853875a9bc270_From-Oil-Rig-to-Boardroom---Drilling-Into-the-Importance-of-Cybersecurity-.jpg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">From Oil Rig to Boardroom – Drilling Into the Importance of Cybersecurity</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="serious-workplace-accidents-and-their-connection-to-cybersecurity" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/serious-workplace-accidents-and-their-connection-to-cybersecurity" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efca4c8748da91d15e71c_Serious-Workplace-Accidents-and-Their-Connection-to-Cybersecurity-.jpg" loading="lazy" alt="Serious Workplace Accidents and Their Connection to Cybersecurity" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efca4c8748da91d15e71c_Serious-Workplace-Accidents-and-Their-Connection-to-Cybersecurity--p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efca4c8748da91d15e71c_Serious-Workplace-Accidents-and-Their-Connection-to-Cybersecurity--p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efca4c8748da91d15e71c_Serious-Workplace-Accidents-and-Their-Connection-to-Cybersecurity--p-1080.jpg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efca4c8748da91d15e71c_Serious-Workplace-Accidents-and-Their-Connection-to-Cybersecurity-.jpg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Serious Workplace Accidents and Their Connection to Cybersecurity</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="p2p-botnets-following-the-network-trail" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/p2p-botnets-following-the-network-trail" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcb7677ab98c312c38a4_P2P-Botnets--Following-the-Network-Trail.jpg" loading="lazy" alt="P2P Botnets, Following the Network Trail" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcb7677ab98c312c38a4_P2P-Botnets--Following-the-Network-Trail-p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcb7677ab98c312c38a4_P2P-Botnets--Following-the-Network-Trail-p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcb7677ab98c312c38a4_P2P-Botnets--Following-the-Network-Trail-p-1080.jpg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcb7677ab98c312c38a4_P2P-Botnets--Following-the-Network-Trail.jpg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">P2P Botnets, Following the Network Trail</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="fireside-chat-accelerating-digital-transformation-drives-innovation-in-industrial-cybersecurity" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/fireside-chat-accelerating-digital-transformation-drives-innovation-in-industrial-cybersecurity" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcd33d70bc8e5b4c9f1b_Accelerating-Digital-Transformation-Drives-Innovation-in-Industrial-Cybersecurity-.jpg" loading="lazy" alt="Fireside Chat: Accelerating Digital Transformation Drives Innovation in Industrial Cybersecurity" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcd33d70bc8e5b4c9f1b_Accelerating-Digital-Transformation-Drives-Innovation-in-Industrial-Cybersecurity--p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcd33d70bc8e5b4c9f1b_Accelerating-Digital-Transformation-Drives-Innovation-in-Industrial-Cybersecurity--p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcd33d70bc8e5b4c9f1b_Accelerating-Digital-Transformation-Drives-Innovation-in-Industrial-Cybersecurity--p-1080.jpg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcd33d70bc8e5b4c9f1b_Accelerating-Digital-Transformation-Drives-Innovation-in-Industrial-Cybersecurity-.jpg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Fireside Chat: Accelerating Digital Transformation Drives Innovation in Industrial Cybersecurity</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="securing-remote-mining-and-industrial-sites" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/securing-remote-mining-and-industrial-sites" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efce3a1af90cbad39923f_Securing-Remote-Mining-and-Industrial-Sites.jpg" loading="lazy" alt="Securing Remote Mining and Industrial Sites" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efce3a1af90cbad39923f_Securing-Remote-Mining-and-Industrial-Sites-p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efce3a1af90cbad39923f_Securing-Remote-Mining-and-Industrial-Sites-p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efce3a1af90cbad39923f_Securing-Remote-Mining-and-Industrial-Sites-p-1080.jpg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efce3a1af90cbad39923f_Securing-Remote-Mining-and-Industrial-Sites.jpg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Securing Remote Mining and Industrial Sites</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="cyber-crime-migration-to-critical-infrastructure" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/cyber-crime-migration-to-critical-infrastructure" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcfd3e790a4d8551879d_Cyber-Crime-Migration-to-Critical-Infrastructure.jpg" loading="lazy" alt="Cyber Crime Migration to Critical Infrastructure" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcfd3e790a4d8551879d_Cyber-Crime-Migration-to-Critical-Infrastructure-p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcfd3e790a4d8551879d_Cyber-Crime-Migration-to-Critical-Infrastructure-p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcfd3e790a4d8551879d_Cyber-Crime-Migration-to-Critical-Infrastructure-p-1080.jpg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcfd3e790a4d8551879d_Cyber-Crime-Migration-to-Critical-Infrastructure.jpg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Cyber Crime Migration to Critical Infrastructure</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="how-security-teams-use-the-mitre-attack-framework-for-ics" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/how-security-teams-use-the-mitre-attack-framework-for-ics" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcebeeff5a9fa3fdb03e_How-Security-Teams-Use-the-MITRE-ATT%26CK-Framework-for-ICS.jpg" loading="lazy" alt="How Security Teams Use the MITRE ATT&amp;CK Framework for ICS" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcebeeff5a9fa3fdb03e_How-Security-Teams-Use-the-MITRE-ATT%26CK-Framework-for-ICS-p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcebeeff5a9fa3fdb03e_How-Security-Teams-Use-the-MITRE-ATT%26CK-Framework-for-ICS-p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcebeeff5a9fa3fdb03e_How-Security-Teams-Use-the-MITRE-ATT%26CK-Framework-for-ICS-p-1080.jpg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efcebeeff5a9fa3fdb03e_How-Security-Teams-Use-the-MITRE-ATT%26CK-Framework-for-ICS.jpg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">How Security Teams Use the MITRE ATT&amp;CK Framework for ICS</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="smart-grids-securing-encrypted-communications" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/smart-grids-securing-encrypted-communications" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efd070005671d96464633_Smart-Grids--Securing-Encrypted-Communications.jpg" loading="lazy" alt="Smart Grids, Securing Encrypted Communications" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efd070005671d96464633_Smart-Grids--Securing-Encrypted-Communications-p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efd070005671d96464633_Smart-Grids--Securing-Encrypted-Communications-p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efd070005671d96464633_Smart-Grids--Securing-Encrypted-Communications-p-1080.jpg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efd070005671d96464633_Smart-Grids--Securing-Encrypted-Communications.jpg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Smart Grids, Securing Encrypted Communications</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="iot-botnet-threat-what-it-is-and-how-to-deal-with-it" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/iot-botnet-threat-what-it-is-and-how-to-deal-with-it" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efd124d33f3eb67083d10_The-IoT-Botnet-Threat--What-It-Is-and-How-to-Deal-With-It.jpg" loading="lazy" alt="The IoT Botnet Threat" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efd124d33f3eb67083d10_The-IoT-Botnet-Threat--What-It-Is-and-How-to-Deal-With-It-p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efd124d33f3eb67083d10_The-IoT-Botnet-Threat--What-It-Is-and-How-to-Deal-With-It-p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efd124d33f3eb67083d10_The-IoT-Botnet-Threat--What-It-Is-and-How-to-Deal-With-It-p-1080.jpg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efd124d33f3eb67083d10_The-IoT-Botnet-Threat--What-It-Is-and-How-to-Deal-With-It.jpg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">The IoT Botnet Threat</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="nozomi-networks-global-pharmaceutical-customer-and-vc" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/nozomi-networks-global-pharmaceutical-customer-and-vc" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ff5e8a80ed4f6db765f99f_Digital-Dollars-THUMB.webp" loading="lazy" alt="Nozomi Networks Global Pharmaceutical Customer and VC" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ff5e8a80ed4f6db765f99f_Digital-Dollars-THUMB-p-500.webp 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ff5e8a80ed4f6db765f99f_Digital-Dollars-THUMB-p-800.webp 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ff5e8a80ed4f6db765f99f_Digital-Dollars-THUMB-p-1080.webp 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/64ff5e8a80ed4f6db765f99f_Digital-Dollars-THUMB.webp 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Nozomi Networks Global Pharmaceutical Customer and VC</h2></a></div></div><div role="listitem" class="w-dyn-item"><div class="w-embed"><input type="hidden" class="jetboost-list-item" value="can-industrial-iot-devices-cause-downtime" /></div><div class="resource-page-item-grid-block"><div class="w-dyn-list"><div role="list" class="w-dyn-items"><div role="listitem" class="w-dyn-item"><div class="resource-page-resource-type-subheader">Webinar</div></div></div></div><a href="/resources/can-industrial-iot-devices-cause-downtime" class="resource-page-block-item-link link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efd343efc4e9769e63407_Can-Industrial-IoT-Devices-Cause-Downtime.jpg" loading="lazy" alt="Can Industrial IoT Devices Cause Downtime?" sizes="(max-width: 479px) 90vw, (max-width: 767px) 46vw, (max-width: 991px) 32vw, (max-width: 1919px) 21vw, 275.171875px" srcset="https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efd343efc4e9769e63407_Can-Industrial-IoT-Devices-Cause-Downtime-p-500.jpg 500w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efd343efc4e9769e63407_Can-Industrial-IoT-Devices-Cause-Downtime-p-800.jpg 800w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efd343efc4e9769e63407_Can-Industrial-IoT-Devices-Cause-Downtime-p-1080.jpg 1080w, https://cdn.prod.website-files.com/645a45d56fc4750d4edd96fe/649efd343efc4e9769e63407_Can-Industrial-IoT-Devices-Cause-Downtime.jpg 1200w" class="resource-page-item-grid-image image-div-fit"/><h2 class="resource-page-resource-block-item-header">Can Industrial IoT Devices Cause Downtime?</h2></a></div></div></div></div><div class="load-more-button-wrapper"><a href="#" class="nozomi-button jetboost-pagination-next-zx9k w-button">Load More</a></div></div></div></div></div></div></section><section class="footer"><div id="subscribe" class="footer-subscribe-wrapper"><div class="footer-subscribe-container"><div class="footer-subscribe-embed-box w-embed w-script"><script charset="utf-8" type="text/javascript" src="//js.hsforms.net/forms/embed/v2.js"></script> <script> hbspt.forms.create({ region: "na1", portalId: "2724979", formId: "a03466a4-e367-45ac-8a9f-8739114a494c" }); </script> <div style="max-width: 350px; margin-left: 0; margin-right: auto; padding-top: 5px;"><a href="https://www.nozominetworks.com/legal/privacy-policy" target="_blank" style="font-size: 10px; line-height: 18px; color: #F5F5F7; font-family: Montserrat;">View our Privacy Policy</a></div></div></div></div><div class="footer-top-navigation-bar"><div class="footer-container footer-link-bar-container w-container"><div class="footer-top-navigation-bar-wrapper"><div class="footer-navigation-logo-wrapper"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647e0bbe5862d58545496b67_nozomi-blue-icon.svg" loading="lazy" alt="" class="image"/></div><a data-w-id="63fd2949-137e-d5f8-88d1-14e184102f83" href="#" class="footer-top-navigation-link-block w-inline-block"><h2 class="footer-top-navigation-link-text">Subscribe</h2></a><a href="https://www.linkedin.com/company/nozomi-networks-sa" target="_blank" class="footer-top-navigation-link-block w-inline-block"><h2 class="footer-top-navigation-link-text">LinkedIn</h2></a><a href="/demo" class="footer-top-navigation-link-block w-inline-block"><h2 class="footer-top-navigation-link-text">Demo</h2></a></div></div></div><div class="footer-navigation-link-field-wrapper"><div class="footer-container w-container"><div class="w-layout-grid footer-link-field-grid"><div id="w-node-_63fd2949-137e-d5f8-88d1-14e184102f8f-84102f7d" class="footer-link-field-column-wrapper"><h3 class="footer-link-field-column-header">PLATFORM</h3><a href="/products" class="footer-link">Platform Overview</a><a href="/products/vantage" class="footer-link">Vantage</a><a href="/products/central-management-console" class="footer-link">Central Management Console</a><a href="/products/guardian" class="footer-link">Guardian</a><a href="/products/guardian-air" class="footer-link">Guardian Air</a><a href="/products/arc" class="footer-link">Arc</a><a href="/products/asset-intelligence" class="footer-link">Asset Intelligence</a><a href="/products/threat-intelligence" class="footer-link">Threat Intelligence</a><a href="/products/smart-polling" class="footer-link">Smart Polling</a><a href="https://security.nozominetworks.com/" target="_blank" class="footer-link">PSIRT</a></div><div id="w-node-_63fd2949-137e-d5f8-88d1-14e184102fa0-84102f7d" class="footer-link-field-column-wrapper"><h3 class="footer-link-field-column-header">Professional Services</h3><a href="/professional-services" class="footer-link">Overview</a><a href="/professional-services/solution-design" class="footer-link">Design</a><a href="/professional-services/solution-deployment" class="footer-link">Deployment</a><a href="/professional-services/fast-track-service-packages" class="footer-link">Fast Track</a><a href="/professional-services/solution-optimization" class="footer-link">Optimization</a><a href="/professional-services/project-management" class="footer-link">Project Management</a></div><div id="w-node-_63fd2949-137e-d5f8-88d1-14e184102fad-84102f7d" class="footer-link-field-column-wrapper"><h3 class="footer-link-field-column-header">Solutions: Business needs</h3><a href="/solutions/threat-detection-and-response" class="footer-link">Threat Detection &amp; Response</a><a href="/solutions/iot-ot-network-monitoring" class="footer-link">Continuous Network Monitoring</a><a href="/solutions/iot-ot-asset-inventory-management" class="footer-link">Asset Inventory Management</a><a href="/solutions/iot-ot-vulnerability-management" class="footer-link">Risk &amp; Vulnerability Management</a><a href="/solutions/iot-security" class="footer-link">IoT Security</a><a href="/solutions/data-center-cybersecurity" class="footer-link">Data Center Cybersecurity</a></div><div id="w-node-_63fd2949-137e-d5f8-88d1-14e184102fbc-84102f7d" class="footer-link-field-column-wrapper"><h3 class="footer-link-field-column-header">Solutions: Compliance</h3><a href="/compliance/nerc-cip" class="footer-link">NERC CIP</a><a href="/compliance/nis2-directive-compliance" class="footer-link">NIS2 Directive</a><a href="/compliance/tsa-security-directives" class="footer-link">TSA Security Directives</a></div><div id="w-node-_63fd2949-137e-d5f8-88d1-14e184102fc9-84102f7d" class="footer-link-field-column-wrapper"><h3 class="footer-link-field-column-header">Solutions: Industry</h3><a href="/industries/airport-cybersecurity" class="footer-link">Airports</a><a href="/industries/electric-utilities-cybersecurity" class="footer-link">Electric Utilities</a><a href="/industries/healthcare-cybersecurity" class="footer-link">Healthcare</a><a href="/industries/federal-government" class="footer-link">Federal Government</a><a href="/industries/manufacturing-cybersecurity" class="footer-link">Manufacturing</a><a href="/industries/maritime-cybersecurity" class="footer-link">Maritime</a><a href="/industries/mining-cybersecurity" class="footer-link">Mining</a><a href="/industries/oil-gas-cybersecurity" class="footer-link">Oil &amp; Gas</a><a href="/industries/pharmaceutical-cybersecurity" class="footer-link">Pharmaceutical</a><a href="/industries/rail-cybersecurity" class="footer-link">Rail</a><a href="/industries/retail-cybersecurity" class="footer-link">Retail</a><a href="/industries/smart-cities-cybersecurity" class="footer-link">Smart Cities</a><a href="/industries/water-wastewater-cybersecurity" class="footer-link">Water &amp; Wastewater</a></div><div id="w-node-_63fd2949-137e-d5f8-88d1-14e184102fe4-84102f7d" class="footer-link-field-column-wrapper"><h3 class="footer-link-field-column-header">Learn</h3><a href="/partners" class="footer-link">Partners</a><a href="/resources" class="footer-link">Resources</a><a href="/company" class="footer-link">Company</a><a href="/company/contact-us" class="footer-link">Contact Us</a><a href="/academy" class="footer-link">Academy</a><a href="/company/careers" class="footer-link">Careers</a><a href="/labs" class="footer-link">Labs</a><a href="https://www.nozominetworks.com/legal/privacy-policy" class="footer-link">Legal</a><div class="footer-social-icon-wrapper"><a href="https://twitter.com/nozominetworks" target="_blank" class="footer-social-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/64e91608e818b441814b52e8_twitter_footer_22x18.svg" loading="lazy" width="42" height="100" alt="" class="footer-social-icon"/></a><a href="https://www.linkedin.com/company/nozomi-networks-sa" target="_blank" class="footer-social-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647e0f5111954ec5d275cd99_linkedin.svg" loading="lazy" alt="Linkedin logo" class="footer-social-icon"/></a><a href="https://www.youtube.com/@nozominetworks" target="_blank" class="footer-social-link-block w-inline-block"><img src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/647e0f5133e547a9cb765948_youtube.svg" loading="lazy" alt="" class="footer-social-icon"/></a></div></div></div></div></div><div class="footer-copyright-wrapper"><div class="footer-container w-container"><div class="footer-copyright-text">© 2024 Nozomi Networks Inc. All Rights Reserved. <a href="https://www.nozominetworks.com/legal/privacy-policy" target="_blank" class="footer-copyright-link">Privacy Policy</a> and Certifications. <a href="#" class="footer-copyright-link">System Status</a>.</div></div></div></section><script src="https://d3e54v103j8qbb.cloudfront.net/js/jquery-3.5.1.min.dc5e7f18c8.js?site=645a4534705010e2cb244f50" type="text/javascript" integrity="sha256-9/aliU8dGd2tb6OSsuzixeV4y/faTqgFtohetphbbj0=" crossorigin="anonymous"></script><script src="https://cdn.prod.website-files.com/645a4534705010e2cb244f50/js/nozomi-2023.3991b2fee.js" type="text/javascript"></script></body></html>

Pages: 1 2 3 4 5 6 7 8 9 10