Newsletter Subject

Protecting industrial operations against cyber threats is a top priority

From

cisco.com

Email Address

engage@b2me.cisco.com

Sent On

Mon, Oct 31, 2022 06:33 PM

Email Preheader Text

Register for this 3 part OT security webinar series to learn how Register for this 3 part OT securit

Register for this 3 part OT security webinar series to learn how Register for this 3 part OT security webinar series [Cisco.com]( [Contact Us]( [Contact](27098?DTID=oemels001119&ECID=32666&EID=122996&CCID=cc002176&oid=otrit023992&dtid=oemels001119&elqTrackId=d80dfd4b3b6f4d8e8d1454d5e4b290de&elq=b56f5f4236bf4c979d8d1c1f2e98dd22&elqaid=50661&elqat=1&elqCampaignId=32791) [Cisco OT Security Webinar Series](31548?OID=wbrit030206&DTID=oemels001119&ECID=32666&EID=122996&CCID=cc002176&elqTrackId=d71b1f6297e14e0d8f159fdb52d44378&elq=b56f5f4236bf4c979d8d1c1f2e98dd22&elqaid=50661&elqat=1&elqCampaignId=32791) Industrial Cybersecurity Webinar Series Session 1: Thursday, November 10th Session 2: Tuesday, December 6th Session 3: Thursday, December 15th [Register](31548?OID=wbrit030206&DTID=oemels001119&ECID=32666&EID=122996&CCID=cc002176&elqTrackId=4b275d6296cf4b47a3b37f31ed7f946e&elq=b56f5f4236bf4c979d8d1c1f2e98dd22&elqaid=50661&elqat=1&elqCampaignId=32791) Protecting industrial operations against cyber threats is a top priority. Register to this 3 part webinar series to learn about IEC-62443 3-3 and implementing key OT security capabilities. Keep reading for more details on each session. What is ISA/IEC-62443 3-3 and How to Comply? Thursday, November 10th 8:00 AM PT / 5:00 PM CET Securing industrial operations is top of mind. But knowing where to start can be challenging. Fortunately, the ISA/IEC-62443 set of standards gives IT and OT teams common ground to work together in building industrial infrastructures that are effectively protected and that drive continuous improvement. In this webinar, we’ll discuss how industrial organizations can leverage ISA/IEC-62443 3-3 to build secure and resilient Industrial Automation and Control Systems (IACS): - What makes the ISA/IEC-62443 standard so important? - What are industrial zones and conduits? - What security capabilities are required by the standard? - What technical solutions are needed to comply? - What does the journey to compliance look like? Featured Speakers Maik Sewald Member of IEC and ISA99 industrial security workgroups, and Senior Technical Lead, Industrial IoT, Cisco Andrew McPhee Cybersecurity Solutions Manager, Cisco IoT Securing industrial networks: A path to micro-segmentation Thursday, December 6th 8:00 AM PT / 5:00 PM CET With the rise in cyber threats to industrial operations and critical infrastructures, segmenting industrial networks is becoming a priority. Beyond the industrial DMZ, the zones and conduits model as defined by ISA/IEC-62443 is key to build secure and resilient Industrial Automation and Control Systems (IACS). In this webinar, we’ll see how industrial organizations can implement micro-segmentation and move towards a zero-trust architecture: - What is ISA/IEC62443 and its zones and conduits model? - What are the prerequisites for an effective OT micro-segmentation? - How can IT and OT teams work together to define network segments? - How can Cisco solutions help implement micro-segmentation? Featured Speakers Andrew McPhee Cybersecurity Solutions Manager, Cisco IoT Steve Matthews Technical Solutions Architect, Cisco IoT Extending IT security to industrial operations Thursday, December 15th 8:00 AM PT / 5:00 PM CET As industrial networks and critical infrastructures have become a target for cyber-attacks, IT security leaders are asked to monitor and secure business critical industrial networks. But it might not be that simple! In this webinar we’ll discuss how to leverage existing IT security skills and tools to detect threats and secure industrial operations: - Why industrial networks require a different approach to security? - What are the security requirements beyond the industrial DMZ? - What OT information does the SOC need to build security policies? - How can SOC analysts investigate and remediate threats across both IT and OT domains? - How can Cisco solutions help extend IT security to OT? Featured Speakers Andrew McPhee Cybersecurity Solutions Manager, Cisco IoT Robert Albach Product Line Manager, Threat Security, Cisco Secure [Cisco.com]( | [Privacy]( | [Terms & Conditions]( | [Cookies]( | [Trademarks]( [Click here to unsubscribe](3709?&emailName=AMER_US_EN_IoT_Security-Webinar-Series_INEM_FY23Q2_50661&ECID=32791&elqTrackId=a36057a236d344658b0681a3e73f6e88&elq=b56f5f4236bf4c979d8d1c1f2e98dd22&elqaid=50661&elqat=1&elqCampaignId=32791&elqcst=272&elqcsid=10487) from Cisco marketing communications. Cisco will continue to send service/transactional communications, including those that have to do with any accounts that you may have with us. Copyright © 2022, Cisco Systems, Inc. All rights reserved. Cisco, Cisco Systems and the Cisco Systems logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134-1706 USA

Marketing emails from cisco.com

View More
Sent On

25/06/2024

Sent On

03/06/2024

Sent On

23/04/2024

Sent On

26/03/2024

Sent On

13/03/2024

Sent On

28/02/2024

Email Content Statistics

Subscribe Now

Subject Line Length

Data shows that subject lines with 6 to 10 words generated 21 percent higher open rate.

Subscribe Now

Average in this category

Subscribe Now

Number of Words

The more words in the content, the more time the user will need to spend reading. Get straight to the point with catchy short phrases and interesting photos and graphics.

Subscribe Now

Average in this category

Subscribe Now

Number of Images

More images or large images might cause the email to load slower. Aim for a balance of words and images.

Subscribe Now

Average in this category

Subscribe Now

Time to Read

Longer reading time requires more attention and patience from users. Aim for short phrases and catchy keywords.

Subscribe Now

Average in this category

Subscribe Now

Predicted open rate

Subscribe Now

Spam Score

Spam score is determined by a large number of checks performed on the content of the email. For the best delivery results, it is advised to lower your spam score as much as possible.

Subscribe Now

Flesch reading score

Flesch reading score measures how complex a text is. The lower the score, the more difficult the text is to read. The Flesch readability score uses the average length of your sentences (measured by the number of words) and the average number of syllables per word in an equation to calculate the reading ease. Text with a very high Flesch reading ease score (about 100) is straightforward and easy to read, with short sentences and no words of more than two syllables. Usually, a reading ease score of 60-70 is considered acceptable/normal for web copy.

Subscribe Now

Technologies

What powers this email? Every email we receive is parsed to determine the sending ESP and any additional email technologies used.

Subscribe Now

Email Size (not include images)

Font Used

No. Font Name
Subscribe Now

Copyright © 2019–2025 SimilarMail.