Sample Webinar on OT and IoT Security

[et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” _builder_version=”4.10.1″ _module_preset=”default” background_image=”https://sectrio.com/wp-content/uploads/2021/08/Webinar-Banner-Background.jpg” custom_padding=”150px||100px||false|false” custom_padding_tablet=”100px||50px||false|false” custom_padding_phone=”150px||30px||false|false” global_module=”21984″ saved_tabs=”all” locked=”off” global_colors_info=”{}”][et_pb_row column_structure=”3_4,1_4″ _builder_version=”4.10.6″ _module_preset=”default” hover_enabled=”0″ global_colors_info=”{}” sticky_enabled=”0″][et_pb_column type=”3_4″ _builder_version=”4.9.10″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.9.11″ _module_preset=”15c77b96-d615-4794-87a9-a3fa248ad330″ header_4_font=”Raleway||||||||” custom_margin=”||3px|||” global_colors_info=”{}”]

WEBINAR

[/et_pb_text][et_pb_post_title meta=”off” featured_image=”off” _builder_version=”4.10.1″ _module_preset=”default” title_font=”Poppins||||||||” title_text_color=”#FFFFFF” title_font_size=”40px” title_line_height=”1.4em” title_font_size_tablet=”30px” title_font_size_phone=”26px” title_font_size_last_edited=”on|phone” global_colors_info=”{}”][/et_pb_post_title][et_pb_code _builder_version=”4.10.4″ _module_preset=”default” global_colors_info=”{}”][dateWebinar][/et_pb_code][et_pb_button button_text=”Learn More” _builder_version=”4.9.11″ _module_preset=”52504b64-d587-49c6-8246-8c566bfabb75″ global_colors_info=”{}”][/et_pb_button][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.10.6″ _module_preset=”default” hover_enabled=”0″ box_shadow_style=”preset1″ box_shadow_horizontal=”7px” global_colors_info=”{}” background_enable_color=”off” sticky_enabled=”0″][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.10.5″ _module_preset=”default” background_color=”#009cdc” custom_padding=”0px||10px||false|false” custom_css_main_element=”position:sticky;||top:21%;||” locked=”off” global_colors_info=”{}” custom_css_main_element_last_edited=”on|tablet” custom_css_main_element_tablet=”position:static;”][et_pb_row column_structure=”1_5,1_5,1_5,1_5,1_5″ use_custom_gutter=”on” gutter_width=”1″ module_class=”cortex_tabs” _builder_version=”4.9.11″ _module_preset=”default” custom_padding=”7px||0px|||” global_colors_info=”{}”][et_pb_column type=”1_5″ _builder_version=”4.9.11″ _module_preset=”default” global_colors_info=”{}”][et_pb_button button_url=”#overview” button_text=”Overview” module_id=”tab1″ module_class=”tabs tabs_active” _builder_version=”4.9.11″ _module_preset=”6c780f83-10d3-4482-b3c1-6d72a79d5315″ global_colors_info=”{}”][/et_pb_button][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.9.11″ _module_preset=”default” global_colors_info=”{}”][et_pb_button button_url=”#speakers” button_text=”Speakers” module_id=”tab2″ _builder_version=”4.9.11″ _module_preset=”6c780f83-10d3-4482-b3c1-6d72a79d5315″ locked=”off” global_colors_info=”{}”][/et_pb_button][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.9.11″ _module_preset=”default” global_colors_info=”{}”][et_pb_button button_url=”#key-takeways” button_text=”Key Takeaways” module_id=”tab3″ _builder_version=”4.9.11″ _module_preset=”6c780f83-10d3-4482-b3c1-6d72a79d5315″ locked=”off” global_colors_info=”{}”][/et_pb_button][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.9.11″ _module_preset=”default” global_colors_info=”{}”][et_pb_button button_url=”#resources” button_text=”Resources” module_id=”tab4″ _builder_version=”4.9.11″ _module_preset=”6c780f83-10d3-4482-b3c1-6d72a79d5315″ locked=”off” global_colors_info=”{}”][/et_pb_button][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.9.11″ _module_preset=”default” global_colors_info=”{}”][et_pb_button button_url=”#discussion-points” button_text=”Discussion Points” module_id=”tab5″ _builder_version=”4.9.11″ _module_preset=”6c780f83-10d3-4482-b3c1-6d72a79d5315″ locked=”off” global_colors_info=”{}”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ module_id=”overview” _builder_version=”4.9.11″ _module_preset=”default” custom_padding=”40px||40px||true|” global_colors_info=”{}”][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” locked=”off” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.9.10″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.9.11″ _module_preset=”97e27830-760f-4eb0-bd7a-8b59162fda8a” background_enable_image=”off” background_size=”initial” background_position=”bottom_center” custom_margin=”||0px||false|false” custom_padding=”||0px||false|false” global_colors_info=”{}”]

Overview

[/et_pb_text][et_pb_code _builder_version=”4.10.4″ _module_preset=”default” text_orientation=”center” locked=”off” global_colors_info=”{}”] [/et_pb_code][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.9.11″ _module_preset=”default” custom_padding=”0px|||||” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.9.11″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.9.11″ _module_preset=”8e2720fd-17de-4aa7-959f-49b5857d42c4″ locked=”off” global_colors_info=”{}”]Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.9.11″ _module_preset=”default” locked=”off” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.9.11″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.9.11″ _module_preset=”8e2720fd-17de-4aa7-959f-49b5857d42c4″ custom_margin=”||3px|||” locked=”off” global_colors_info=”{}”]

  • Automate threat data collection into a single, high fidelity set of threat intelligence
  • Improve your security posture by diversifying intelligence sources

[/et_pb_text][et_pb_text _builder_version=”4.9.11″ _module_preset=”8e2720fd-17de-4aa7-959f-49b5857d42c4″ locked=”off” global_colors_info=”{}”]

  • Automate threat data collection into a single, high fidelity set of threat intelligence
  • Improve your security posture by diversifying intelligence sources

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.9.11″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https://sectrio.com/wp-content/uploads/2021/08/Webinar-Overview.jpg” title_text=”Webinar Overview” _builder_version=”4.9.11″ _module_preset=”default” border_radii=”on|12px|12px|12px|12px” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ module_id=”speakers” _builder_version=”4.9.11″ _module_preset=”default” custom_padding=”40px||0px||false|false” global_colors_info=”{}”][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” custom_padding=”||0px|||” locked=”off” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.9.10″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.9.11″ _module_preset=”97e27830-760f-4eb0-bd7a-8b59162fda8a” background_enable_image=”off” background_size=”initial” background_position=”bottom_center” custom_margin=”||0px||false|false” custom_padding=”||0px||false|false” global_colors_info=”{}”]

Speakers

[/et_pb_text][et_pb_code _builder_version=”4.10.4″ _module_preset=”default” text_orientation=”center” locked=”off” global_colors_info=”{}”] [/et_pb_code][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.9.11″ _module_preset=”default” custom_padding=”0px|||||” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.9.11″ _module_preset=”default” global_colors_info=”{}”][et_pb_code _builder_version=”4.9.11″ _module_preset=”default” global_colors_info=”{}”][awsmteam id=”21398″][/et_pb_code][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ module_id=”key-takeways” _builder_version=”4.9.11″ _module_preset=”default” custom_padding=”0px||40px||false|false” global_colors_info=”{}”][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” locked=”off” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.9.10″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.9.11″ _module_preset=”97e27830-760f-4eb0-bd7a-8b59162fda8a” background_enable_image=”off” background_size=”initial” background_position=”bottom_center” custom_margin=”||0px||false|false” custom_padding=”||0px||false|false” global_colors_info=”{}”]

Key Takeaways

[/et_pb_text][et_pb_code _builder_version=”4.10.4″ _module_preset=”default” text_orientation=”center” locked=”off” global_colors_info=”{}”] [/et_pb_code][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.9.11″ _module_preset=”default” custom_css_main_element=”display:flex;||align-items:center;” locked=”off” global_colors_info=”{}” custom_css_main_element_last_edited=”on|tablet” custom_css_main_element_tablet=”display:block;”][et_pb_column type=”1_2″ _builder_version=”4.9.11″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https://sectrio.com/wp-content/uploads/2021/08/Key-Takeaways.jpg” title_text=”Key Takeaways” _builder_version=”4.9.11″ _module_preset=”default” border_radii=”on|12px|12px|12px|12px” global_colors_info=”{}”][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.9.11″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.9.11″ _module_preset=”8e2720fd-17de-4aa7-959f-49b5857d42c4″ custom_margin=”||3px|||” locked=”off” global_colors_info=”{}”]

  • Automate threat data collection into a single, high fidelity set of threat intelligence
  • Improve your security posture by diversifying intelligence sources

[/et_pb_text][et_pb_text _builder_version=”4.9.11″ _module_preset=”8e2720fd-17de-4aa7-959f-49b5857d42c4″ locked=”off” global_colors_info=”{}”]

  • Automate threat data collection into a single, high fidelity set of threat intelligence
  • Improve your security posture by diversifying intelligence sources

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ module_id=”resources” _builder_version=”4.9.11″ _module_preset=”default” custom_padding=”40px||40px||true|false” global_colors_info=”{}”][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” locked=”off” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.9.10″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.9.11″ _module_preset=”97e27830-760f-4eb0-bd7a-8b59162fda8a” background_enable_image=”off” background_size=”initial” background_position=”bottom_center” custom_margin=”||0px||false|false” custom_padding=”||0px||false|false” global_colors_info=”{}”]

Resources

[/et_pb_text][et_pb_code _builder_version=”4.10.4″ _module_preset=”default” text_orientation=”center” locked=”off” global_colors_info=”{}”] [/et_pb_code][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.9.11″ _module_preset=”default” custom_css_main_element=”display:flex;||align-items:center;” locked=”off” global_colors_info=”{}” custom_css_main_element_last_edited=”on|tablet” custom_css_main_element_tablet=”display:block;”][et_pb_column type=”1_2″ _builder_version=”4.9.11″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb image=”https://sectrio.com/wp-content/uploads/2021/08/Group-20896.svg” image_max_width=”88%” _builder_version=”4.10.5″ _module_preset=”92d8f379-7067-4c3c-9b76-60274be4d6be” transform_translate_linked__hover=”off” custom_css_blurb_image=”margin: 20px 0;” locked=”off” global_colors_info=”{}” custom_css_blurb_image_last_edited=”off|desktop” transform_scale__hover_enabled=”on|desktop” transform_styles__hover_enabled=”on|hover” transform_translate__hover_enabled=”on|hover” transform_rotate__hover_enabled=”on|desktop” transform_skew__hover_enabled=”on|desktop” transform_origin__hover_enabled=”on|desktop” transform_translate__hover=”0px|-6px”]

Cybersecurity essential buyers guide, 2021 | PDF

[/et_pb_blurb][et_pb_blurb image=”https://sectrio.com/wp-content/uploads/2021/08/Group-21002.svg” image_max_width=”88%” _builder_version=”4.9.11″ _module_preset=”92d8f379-7067-4c3c-9b76-60274be4d6be” transform_translate_linked__hover=”off” custom_css_blurb_image=”margin: 20px 0;” locked=”off” global_colors_info=”{}” custom_css_blurb_image_last_edited=”off|desktop” transform_styles__hover_enabled=”on|hover” transform_scale__hover_enabled=”on|desktop” transform_translate__hover=”0px|-6px” transform_translate__hover_enabled=”on|hover” transform_rotate__hover_enabled=”on|desktop” transform_skew__hover_enabled=”on|desktop” transform_origin__hover_enabled=”on|desktop”]

Practical cybersecurity tips | Video

[/et_pb_blurb][et_pb_blurb image=”https://sectrio.com/wp-content/uploads/2021/08/Group-20896.svg” image_max_width=”88%” _builder_version=”4.10.5″ _module_preset=”92d8f379-7067-4c3c-9b76-60274be4d6be” transform_translate_linked__hover=”off” custom_css_blurb_image=”margin: 20px 0;” locked=”off” global_colors_info=”{}” custom_css_blurb_image_last_edited=”off|desktop” transform_styles__hover_enabled=”on|hover” transform_scale__hover_enabled=”on|desktop” transform_translate__hover=”0px|-6px” transform_translate__hover_enabled=”on|hover” transform_rotate__hover_enabled=”on|desktop” transform_skew__hover_enabled=”on|desktop” transform_origin__hover_enabled=”on|desktop”]

Cybersecurity essential buyers guide, 2021 | PDF

[/et_pb_blurb][et_pb_blurb image=”https://sectrio.com/wp-content/uploads/2021/08/Group-21002.svg” _builder_version=”4.10.5″ _module_preset=”92d8f379-7067-4c3c-9b76-60274be4d6be” transform_translate_linked__hover=”off” custom_css_blurb_image=”margin: 20px 0;” locked=”off” global_colors_info=”{}” custom_css_blurb_image_last_edited=”off|desktop” transform_styles__hover_enabled=”on|hover” transform_scale__hover_enabled=”on|desktop” transform_translate__hover=”0px|-6px” transform_translate__hover_enabled=”on|hover” transform_rotate__hover_enabled=”on|desktop” transform_skew__hover_enabled=”on|desktop” transform_origin__hover_enabled=”on|desktop”]

Practical cybersecurity tips | Video

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.9.11″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https://sectrio.com/wp-content/uploads/2021/08/Resources-Webinar-Landing.jpg” title_text=”Resources Webinar Landing” _builder_version=”4.9.11″ _module_preset=”default” border_radii=”on|12px|12px|12px|12px” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.10.1″ _module_preset=”default” use_background_color_gradient=”on” background_color_gradient_start=”#ecf7ff” background_color_gradient_end=”#ffffff” background_color_gradient_direction=”90deg” background_color_gradient_start_position=”50%” background_color_gradient_end_position=”50%” custom_padding=”0px||0px|||” background_last_edited=”on|tablet” use_background_color_gradient_tablet=”on” background_color_gradient_end_tablet=”#ecf7ff” background_color_gradient_direction_tablet=”180deg” background_color_gradient_start_position_tablet=”50%” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.10.5″ _module_preset=”default” custom_css_main_element=”display:flex;||align-items:center;” global_colors_info=”{}” custom_css_main_element_last_edited=”on|tablet” custom_css_main_element_tablet=”display:block;”][et_pb_column type=”1_2″ _builder_version=”4.10.1″ _module_preset=”default” background_enable_color=”off” custom_padding=”|60px|||false|false” global_colors_info=”{}”][et_pb_text _builder_version=”4.10.1″ _module_preset=”27667242-fafa-4905-bd2a-5632a104eee0″ header_3_font=”Poppins|700|||||||” custom_margin=”||27px|||” global_colors_info=”{}”]

Find out how critical is having a cybersecurity strategy for your organization through this survey

[/et_pb_text][et_pb_button button_text=”Start Free Trial” _builder_version=”4.9.11″ _module_preset=”52504b64-d587-49c6-8246-8c566bfabb75″ global_colors_info=”{}”][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ module_id=”discussion-points” _builder_version=”4.9.11″ _module_preset=”default” background_enable_color=”off” custom_padding=”10px|80px|40px||false|false” global_colors_info=”{}”][et_pb_text _builder_version=”4.9.11″ _module_preset=”default” custom_margin=”||30px|||” global_colors_info=”{}”]

Discussion Points

[/et_pb_text][et_pb_text _builder_version=”4.9.11″ _module_preset=”8e2720fd-17de-4aa7-959f-49b5857d42c4″ custom_margin=”||3px|||” locked=”off” global_colors_info=”{}”]

  • Automate threat data collection into a single, high fidelity set of threat intelligence
  • Improve your security posture by diversifying intelligence sources

[/et_pb_text][et_pb_text _builder_version=”4.9.11″ _module_preset=”8e2720fd-17de-4aa7-959f-49b5857d42c4″ custom_margin=”||3px|||” locked=”off” global_colors_info=”{}”]

  • Automate threat data collection into a single, high fidelity set of threat intelligence
  • Improve your security posture by diversifying intelligence sources

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.9.11″ _module_preset=”default” global_colors_info=”{}”][et_pb_row custom_padding_last_edited=”on|phone” _builder_version=”4.10.1″ _module_preset=”default” custom_padding=”40px|40px|40px|40px|true|true” custom_padding_tablet=”40px|20px|20px|20px|false|true” custom_padding_phone=”|10px||10px|false|true” border_radii=”on|25px|25px|25px|25px” box_shadow_style=”preset1″ box_shadow_vertical=”1px” box_shadow_blur=”5px” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.9.11″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.9.11″ _module_preset=”97e27830-760f-4eb0-bd7a-8b59162fda8a” background_enable_image=”off” background_size=”initial” background_position=”bottom_center” custom_margin=”||0px||false|false” custom_padding=”||0px||false|false” locked=”off” global_colors_info=”{}”]

Register for the Webinar

[/et_pb_text][et_pb_code _builder_version=”4.10.4″ _module_preset=”default” text_orientation=”center” locked=”off” global_colors_info=”{}”] [/et_pb_code][et_pb_code _builder_version=”4.10.1″ _module_preset=”default” global_colors_info=”{}”][ninja_form id=2][/et_pb_code][/et_pb_column][/et_pb_row][/et_pb_section]

Register Now

Speakers

About Sectrio

Sectrio is a market and technology leader in the Internet of Things (IoT), Operational Technology (OT), and 5G Cybersecurity segments. We excel in securing the most critical assets, data, networks, supply chains, and device architectures across geographies and scale on a single platform. Sectrio today runs the largest IoT and OT focused threat intelligence gathering facility in the world. To learn more, visit our website here: Sectrio

Scroll to Top