ARC has been providing market research on the industrial cybersecurity for many years. Here are some insights on emerging technologies, practices, and processes for enhancing cybersecurity in industrial operations.


Larry O'Brien — Acquisition or Partnership

NEC and Fortinet Team Up to Deliver End to End 5G Security

Japanese multinational IT giant NEC has entered into an agreement with cybersecurity supplier Fortinet to provide high performance end-to-end 5G security for the rapidly growing world of 5G networks.
Sid Snitkin — Industry Trends

ARC Forum Cybersecurity Program Addresses Top OT Security Challenges

The 2022 ARC Forum Cybersecurity program provided attendees with an overview of the latest trends, technologies, and people challenges faced by the world of OT and industrial cybersecurity. End user case studies, panel discussions, workshops, and networking events were supplemented by a series of supplier-sponsored workshops.
Larry O'Brien — Technology Trends

ARC Forum Nozomi Networks Workshop: Real-World OT and IoT Cybersecurity

On Monday, June 6 at 1:15 PM you can attend a workshop sponsored by OT cybersecurity supplier Nozomi Networks. During this session and demo, you will see real-time asset visibility, monitoring and threat detection in action. Learn how to quickly identify and protect your networks from threats while accelerating digital transformation and IT/OT convergence for your company. 
Larry O'Brien — Technology Trends

ARC Forum OPSWAT Workshop: Critical Defense for Critical Infrastructure

On Monday, June 6 at 1:15 PM you can attend a workshop sponsored by OT cybersecurity supplier OPSWAT  In this interactive presentation on Critical Defense for Critical Infrastructure, Benny Czarny, Founder & CEO of OPSWAT, and Oren Dvoskin, VP, OT & Industry Marketing at OPSWAT, will explain how past cybersecurity attacks on critical infrastructure have shaped the future of technology for OT/ICS. Oren will outline the surprising connection between these cybersecurity incidents and the reasons why these breaches happened, as well as how they could have been prevented by taking a deep dive into the anatomy of the attacks.
Subscribe to Cybersecurity RSS Feed by ARC Advisory Group