Is Your SOC Ready for IT & OT Convergence?

Presented by

Syed Rizvi

About this talk

Industry 4.0 has arrived, and companies are retooling with the cloud and Internet of things (IoT). Manufacturers now have greater insight and visibility into factory floor activity and the ability to troubleshoot issues before they impact production. But with these benefits comes risk. As OT environments become more connected, the risk of cyber intrusion increases. WannaCry and other ransomware attacks have demonstrated that OT systems are even more vulnerable to such attacks than IT systems. Discovering and mitigating malware in OT environments is much more difficult because organizations lack the visibility that their IT counterparts have. Companies have initiated or already implemented IT/OT convergence projects to close the security gap and are looking to expand security operation center (SOC) oversight to also include OT assets and networks. Join Syed Rizvi, a LogRhythm senior enterprise sales engineer, to explore how LogRhythm supports the expanded SOC charter. He'll cover such topics as: - The business justification for IT/OT Convergence - The strategy, tactics, and technologies needed to secure OT environments - How one customer used LogRhythm to help protect its OT deployment
Related topics:

More from this channel

Upcoming talks (8)
On-demand talks (259)
Subscribers (77043)
LogRhythm helps security teams stop breaches by turning disconnected data and signals into trustworthy insights. From connecting the dots across diverse log and threat intelligence sources to using sophisticated machine learning that spots suspicious anomalies in network traffic and user behavior, LogRhythm accurately pinpoints cyberthreats and empowers professionals to respond with speed and efficiency. With cloud-native and self-hosted deployment flexibility, out-of-the-box integrations, and advisory services, LogRhythm makes it easy to realize value quickly and adapt to an ever-evolving threat landscape. Together, LogRhythm and our customers confidently monitor, detect, investigate, and respond to cyberattacks. Learn more at