Webinar information

In the webinar packed with real life examples, we will show how an attacker can compromise an IOT device and gain a foothold in an organization without being detected without the proper tooling. Want to learn how an attacker can compromise an OT device and shutdown critical infrastructure? With the proper tooling within your OT infrastructure, you can learn how to protect OT devices. As a bonus we will show the future and power of an IT/OT converged SOC.


  • Introduction Nedscaper
  • Microsoft Defender for Endpoint | Enterprise IOT
  • Microsoft Defender for IoT
  • Microsoft Sentinel
  • Q&A