CS Banner-3

Industrial Cyber Security Network Visibility Workshop | Insights to Assets & Threats with Dexcent's OT Security Experts


Improving a plant's security operation requires strategic investments in technical innovation and expert knowledge in identifying weakness. Hence, Dexcent’s experienced consultants will be conducting a FREE TWO-PART WORKSHOP discussing Cyber Security Network Architecture (A review of organization’s OT network design and current cyber security controls in place). 


Why Register?

These workshops will help to identify weaknesses in the OT process, people and technology environments that can be exploited by cyber threat actors, and help them build strategic roadmaps and plans to mature and improve their Cyber Security capabilities and defensibility, reducing operational risk, while maintaining safe and highly available production capabilities.


Facilitator: Gerrit Nel, Industrial Cyber Security Expert Consultant

Gerrit Nel, has over 45 years of IT experience of which the last 20 years of experience is focused on delivering Information Security management consulting services to clients. The last 3 years specifically focused on Industrial companies and their needs for Cyber Security and Infrastructure support for OT and Industrial Control Systems (ICS) environments.

He has a successful track record of assisting clients to reduce impact of threats to the business and meet compliance requirements through proactive management of information security risk in a controlled manner. 


During these workshops, you'll learn about:

Part 1: Network visibility, identifying your weakness

  • Network segmentation controls (layered network model (firewalls and zoning delimitation))
  • Network traffic analysis capabilities (traffic flows analysis and visualization)
  • Threat detection controls in place (perimeter defences, intrusion detection and anomalous traffic monitoring)

Part 2: Managing your weakness (Think, Automation, Secure)

  • OT network attached cyber asset management
  • Cyber assets vulnerability management
  • Remote access and external file transfer controls
  • Conclusions and recommendations




Stay connected to the latest trends and best practices in Industrial Cyber Security by checking out Blogs