


2:00 PM - 2:55 PM (EST)
Endpoints are frequently the target of initial compromise or cyberattack. It can take just minutes, if not seconds, to compromise the endpoints putting industrial environments as risk. One recent study found that 30% of breaches involved malware being installed on endpoints. Operational Technology (OT) endpoints are particularly vulnerable given the mix of legacy and modern technology powering manufacturing environments.
Listen in as our panel discusses consideration for: