Managing cyber risk is now a business imperative for manufacturing organizations to enjoy the benefits of Industry 4.0 and/or the move to long term hybrid working without falling victim to debilitating, expensive and public cyberattacks. As sophisticated threats including ransomware gangs and state-sponsored actors identify manufacturing as a preferred target, manufacturers struggle to respond to this threat with their current security tools and practices.
Join eSentire and Teneo as they explore the latest threat trends, unpack critical factors and define a simple framework by which organizations can protect themselves from the cyberattacks that are monopolizing today’s headlines.
Andy de Clerck is the CTO of Teneo and has been with the organization since the acquisition of Geode Networks, a services driven company that Andy was a co-founder of 20 years ago. Andy has provided technical capabilities for many start-ups, driving innovation and strategy across EMEA alongside building a business with the same core strengths and ethos as Geode. Andy has over 35 years experience in network application management and architectures driving performance, security and focusing the outcome on business benefits that prevail with effective technology exploitation. Through Andy’s approach and Teneo’s strategy and capability across key areas of visibility, security and performance, Teneo customers can benefit from substantial improvement and utilization of technology whilst maintaining visibility and control of their digital business landscape. This enables customers to focus on being agile and disruptive in their markets.
Mark Sangster, Vice President and Industry Security Strategist, eSentire
Mark Sangster is eSentire’s VP Industry Security Strategies and the author of No Safe Harbor: The Inside Truth About Cybercrime and How to Protect Your Business. He is an award-winning speaker at international conferences and prestigious stages including the Harvard Law School and RSAConference. Mark has appeared on CNN Hour to provide expert opinion on international cybercrime issues, and is a go-to subject matter expert for leading publications and media outlets including the Wall Street Journal and Forbes when covering major data breach events.
Cookies are small files containing information that enables a website to recognise you. They’re downloaded to the device you use when you visit a website and sent back to that website each time you re-visit, or sent to another website that recognises the same cookie.
Strictly necessary cookies include session cookies and persistent cookies. Session cookies keep track of your current visit and how you navigate the site. They only last for the duration of your visit and are deleted from your device when you close your Internet browser. Persistent cookies last after you’ve closed your Internet browser and enable our website to recognise you as a repeat visitor and remember your actions and preferences when you return.
Third Party Cookies
Third party cookies include performance cookies and targeting cookies. Performance cookies collect information about how you use a website, e.g. which pages you go to most often, and if you get error messages from web pages. These cookies don’t collect information that identifies you personally as a visitor, although they might collect the IP address of the device you use to access the site. Targeting cookies collect information about your browsing habits. They are usually placed by advertising networks such as Google. The cookies remember that you have visited a website and this information is shared with other organisations such as media publishers.
Keeping these cookies enabled helps us to improve our website and display content that is more relevant to you and your interests across the Google content network.
Please enable Strictly Necessary Cookies first so that we can save your preferences!