̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.
Airports are some of the most complex and interconnected environments in the world — blending IT, OT, and IoT systems across everything from baggage handling and lighting, to fueling and passenger operations. As these systems become more connected, the risk of cyber disruption grows. A single OT outage can ground flights, disrupt services, and cost millions.
Attendees joined us to explore how airports can achieve real-time visibility and strengthen resilience across their critical infrastructure. Attendees learned how OT cybersecurity strategies can help prevent downtime, improve threat detection, and support compliance with TSA and FAA cybersecurity directives. Whether you’re in IT, OT, operations, or airport leadership, you walked away with practical insights on protecting the connected airport from evolving cyber threats.
During this webinar, attendees learned:
Fill out the form below to view this archived event.
This comprehensive whitepaper details the strategic initiative by the United States intelligence agencies, specifically NCIS, to modernize and enhance their capabilities in combating foreign influence within the nation's affairs. Emphasizing the critical need for advanced technologies, it outlines how leveraging analytics, machine learning, language models, and AI can significantly improve investigative efforts. The document highlights the development of a new platform, created in collaboration with IPC Global, utilizing Qlik's analytics and machine learning capabilities to streamline investigative processes and offer quick, actionable insights. Through real-life examples, including the notable arrest of Charles Lieber and the case of Hao Zhang, the paper illustrates the platform's potential in identifying threats, vulnerabilities, and conflicts of interest with unprecedented efficiency and precision. It underscores the urgent requirement for such innovative solutions in an era where foreign entities employ sophisticated means to infringe upon national security and intellectual property.
Fill out the form below to view this Resource.