InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

[ITALIAN] Errore Umano e Attacchi Ransomware possono bloccare la produzione

Presented by

Maurizio Milazzo, Sales Director | South Europe, TXOne Networks & Marcello Romeo, Presales Manager | South Europe, TXOne Networks

About this talk

Proteggere il tuo ambiente OT è possibile. E oggi, più che mai, è necessario. Scopri le evoluzioni del 2025 e preparati ad affrontare le nuove minacce. TXOne Networks Italia ti invita a un webinar esclusivo sulla sicurezza OT, in programma per martedì 25 giugno alle ore 10:00 CEST. In appena 60 minuti, analizzeremo i principali trend emersi nel primo semestre dell’anno e condivideremo una visione strategica per affrontare con successo le sfide del secondo semestre. Cosa imparerai durante il webinar: · Le minacce OT più rilevanti osservate nel 2025 · Come stanno cambiando attacchi e vulnerabilità · Le priorità strategiche per la protezione degli ambienti industriali · Best practice concrete per rafforzare la tua sicurezza OT Registrati e preparati al futuro della cybersecurity OT.
TXOne Networks Europe

TXOne Networks Europe

2921 subscribers29 talks
Keep the operation running.
TXOne Networks provides solutions for tackling security weaknesses prevalent across industrial environments. We listen to the needs of both leading manufacturers and critical infrastructure operators to develop the best actionable approach within partnering companies. The result is customised technology that goes beyond traditional security tools to mitigate complex challenges. Given the ICS environments are layered and composed of a variety of equipment in different operating systems, TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission critical devices in a real-time defence-in-depth manner. Both IT and OT can have comprehensive visibility regarding the ICS assets, protocols, control commands, risks, and threats.
Related topics