2022 Virtual Symposium
OT Visibility: Make a Game Plan

Tuesday, March 15, 2022 | 10:00 AM - 12:30 PM ET
Web Conference, Denver, Colorado

What the ransomware attacks on Colonial Pipeline and JBS showed us is that critical infrastructure – and really any production-based organization reliant on operational technology (OT) – is vulnerable to attack. This symposium explains:  

  • How organizations should inventory their OT assets. 
  • Best practices for separating IT/OT in their environments. 
  • Ways to manage OT securely over time. 


Audience

This event is for IANS clients and invited guests — there is no vendor sponsorship or presence.

Let your colleagues know you're coming!

Register Now

* Required Fields
*Receive 1 CPE credit for every hour of attendance at our events.

2022 Virtual Symposium Facilitators

jake-williams

Jake Williams

IANS Faculty
Jake Williams, the founder of Rendition Infosec, has almost two decades of experience in secure network design, penetration testing, incident response, forensics and malware reverse engineering. Prior to founding Rendition Infosec, Williams worked with various government agencies in information security and CNO roles. He also works with SANS where he teaches and authors courses in Malware Reverse Engineering, Memory Forensics, Cyber Threat Intelligence, and Advanced Exploit Development. He is the two-time victor of the annual DC3 Forensics Challenge. He has spoken at Blackhat, DEFCON, Shmoocon, CEIC, RSA, EnFuse, and DC3 Conference (among others). His research areas include automating incident response throughout the enterprise, threat modeling and analysis, binary analysis, and malware C2. The primary focus of his work is increasing enterprise security by presenting complex topics in a way that anyone can understand.

Web Conference

Registrants will receive a logistics email with web conference meeting information one day prior to the event.

Attendee Qualification

This Symposium is produced by IANS, which reserves the right, in its sole discretion, to limit or deny access to the Symposium to any entity or individual. IANS’ receipt of a registration application does not constitute acceptance. Individuals from Information Security Solution Providers (software, hardware, and consulting companies) are not eligible to attend. Symposiums are open to IANS clients that are Credential Holders and qualified Information Security Practitioners identified by IANS.

Attendee Contact

events@iansresearch.com

Check out IANS other upcoming events