Skip to content
Contact Sales

De-risk IT/OT convergence: network path analysis demo

Normalize and standardize current security controls across IT/OT environments through context-driven segmentation and access policies for zone creations.

Learn how to:
  • Use the Skybox network model to perform access queries across the network to validate segmentation from IT/OT.
  • Understand automated analysis and how access can relate to exposure.
  • Implement access policies to validate access and monitor and maintain compliance.

Part two of our exclusive four-part demo hour series; learn how you can eliminate security blind spots, reduce risk and drive compliance with regulatory frameworks across your IT/OT networks.

Visibility is a significant challenge in OT environments, especially when providing insights needed to identify and mitigate vulnerability exposures. An extension to this challenge is context and understanding of what access is permissible in and out of OT environments and providing validation of all possible access paths that otherwise present attack vectors.

Skybox provides visibility into an organization’s network model, visually modeling hybrid IT and OT networks and security policies to detect and analyze open access paths supporting better segregation and security control assurance. Aligned with the Purdue Enterprise Reference Architecture, this four-part demo hour series will walk through different use case to show how organizations can eliminate security blind spots, reduce risk and drive compliance with regulatory frameworks across their IT/OT networks.

This demonstration covers a range of topics, including:
  • The importance of having the correct security policies and network segregation in place.
  • How incorrectly segregated networks can lead to increased risk of security breaches.
  • How segmentation can help to reduce the attack surface.
Presented by:
Technical Director Skybox Security
Senior Product Marketing Manager Skybox Security
John Stevenson is an industry veteran with over 29 years of experience in cybersecurity. An educator, writer, broadcaster, and marketer, John has led multi-million-pound projects for the implementation of cybersecurity education and best practice. He has managed the Critical Infrastructure groups at Skybox Security, Forcepoint, and Deep Secure and has worked with Gartner, Citrix, and IBM. John’s career spans the UK, Europe, the US, Japan, and the Middle East, helping build security solutions for some of the most security-conscious organizations in the world.