Cybersecurity fundamentals for your industrial networks

Hosts:
Niklas Mörth, Cybersecurity Product Manager
Dr. Jon-Olov Vatn, Network Applications Expert
Mikael Lindahl, Network Applications Expert

In today’s increasingly connected world, where the IIoT and Industry 4.0 is redefining the industrial landscape, the implementation of appropriate cyber security has become more important than ever. When a wide variety of devices used within a typical industrial control system are connected, the number of attack vectors increases and the risk of a successful cyber-attack skyrockets.

In a series of webinars, Westermo’s Cyber Security Product Manager Niklas Mörth and Network Applications Experts Dr. Jon-Olov Vatn and Mikael Lindahl will discuss the fundamentals of industrial cyber security as well as how to use Westermo data networking products and WeOS operating system to help you achieve a sustainable security posture, with the right balance between security and operational efficiency.

Upcoming webinars

  • Network segmentation - 20th February 2019 at 9.00 & 15.00 CET
    How to divide your network into different subnetworks to strengthen your security defense. Register for webinar ➡

  • Perimeter protection (TBA)
    Protect your industrial network from unsolicited requests

  • Spoofing protection (TBA)
    Defend your network from unauthorized devices

Previous webinars

  • Network-to-Network protection - 5th December 2018
    Best practices for using VPNs for easy network-to-network protection
    Watch recording ➡

Complete the form to join the webinar about "Network segmentation - How to divide your network into different subnetworks to strengthen your security defense" on Wednesday, February 20th at 09:00 or 15:00 CET. You can choose your preferred session below.

* indicates required field

This form requires you to enter personal information. You can read how we use and manage your information in our privacy policy.

Jennifer Mooney-Perrotta

Customer service, Westermo North America

Ask med about Cybersecurity solutions
Contact Details

Please enter your email to download the file


Thank you! An email is on its way to your inbox.

Something went wrong! Please try again later.