The digital transformation brought complex cyber security challenges into OT environments, which changed the cyber threat range. While Ransomware was a common threat targeting OT/ICS environments, more complicated attacks took out the lead. For example, supply chain attacks, advanced persistent threat attacks, and quadruple extortion attacks. The Colonial and Kaseya breaches were clear examples of such attacks. Enterprises must build a strong security posture that includes both IT and OT to ensure their safety, which will require a paradigm shift from individual assets to zero-trust systems. Join us on this series of webinars to better understand how Trend Micro is securing OT/ICS environments by utilizing controls like breach detection, intrusion detection and prevention, virtual patching, segmentation, and protocol trust listing.
Dr. Bilal Issa (Author/Presenter)
Technical Lead
Trend Micro
Technical Leader working in the cyber security field for the past 10 years. Leading the technical operations of Trend Micro in Qatar to contribute and align with “Securing the Connected World” mission. Bilal is part of the subject matter experts for advanced threat protection specialized in threat research, malware analysis and reverse engineering.