{"id":89153,"date":"2024-07-31T06:43:06","date_gmt":"2024-07-31T13:43:06","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/webinars\/microsoft-forescout-strategic-partnership-copy\/"},"modified":"2024-09-18T17:00:49","modified_gmt":"2024-09-19T00:00:49","slug":"rough-around-the-edges-webinar","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/webinars\/rough-around-the-edges-webinar\/","title":{"rendered":"Rough Around the Edges webinar"},"content":{"rendered":"<p>WEBINAR<\/p>\n<h1>Rough Around the Edges: The State of OT\/IoT Routers in the Software Supply Chain<\/h1>\n\n<p>Operational Technology (OT) and Internet of Things (IoT) routers play a crucial role in connecting critical devices in environments such as electrical substations, oil and gas fields, and temporary healthcare facilities. Unfortunately, these routers are frequent targets for cybercriminals, nation-state actors, and hacktivists. In this joint webinar with Finite State, we will present findings from the recently released report, Rough Around the Edges, which highlights the state of software supply chain components commonly used in this type of device.<\/p>\n<h4 style=\"color: #009dea\">Featured Speakers:<\/h4>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-46206\" style=\"width: 100%;height: auto\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/larry-pesce-in-circle.webp\" alt=\"\" width=\"300\" height=\"300\"><\/p>\n<p style=\"text-align: center\"><strong>Larry Pesce<\/strong><br \/>\nProduct Security Research and Analysis Director<br \/>\nFinite State\n\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-46206\" style=\"width: 100%;height: auto\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/09\/elisa-constantine.png\" alt=\"\" width=\"300\" height=\"300\"><\/p>\n<p style=\"text-align: center\"><strong>Elisa Costante<\/strong><br \/>\nVP, Research<br \/>\nForescout\n\n<h5 style=\"color: #009dea\">What You\u2019ll Learn by Attending:<\/h5>\n<ul>\n<li><strong>Key Findings:<\/strong> Explore the vulnerabilities identified in OT\/IoT routers, such as the risks posed by outdated software components, lack of binary hardening and custom patching.<\/li>\n<li><strong>Software Supply Chain Insights:<\/strong> Learn about the challenges associated with supply-chain vulnerabilities in router firmware and how they allow attackers to exploit multiple devices with a single vulnerability. <\/li>\n<li><strong>Security Posture Improvement:<\/strong> Discover practical strategies for securing OT and IoT routers, including patch management, leveraging Software Bill of Materials (SBoM) solutions, and enhancing authentication practices. <\/li>\n<\/ul>\n<p><a target=\"_blank\" href=\"\/company\/legal\/notice-of-collection\/\" rel=\"noopener\">Notice of Collection<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WEBINAR Rough Around the Edges: The State of OT\/IoT Routers in the Software Supply Chain Operational Technology (OT) and Internet of Things (IoT) routers play a crucial role in connecting critical devices in environments such as electrical substations, oil and gas fields, and temporary healthcare facilities. Unfortunately, these routers are frequent targets for cybercriminals, nation-state [&hellip;]<\/p>\n","protected":false},"author":165,"featured_media":89156,"parent":84198,"menu_order":204,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[712],"class_list":["post-89153","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Securing OT &amp; IoT Routers: Key Insights<\/title>\n<meta name=\"description\" content=\"Explore OT\/IoT router vulnerabilities and security strategies in the &#039;Rough Around the Edges&#039; report with Finite State.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/webinars\/rough-around-the-edges-webinar\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing OT &amp; IoT Routers: Key Insights\" \/>\n<meta property=\"og:description\" content=\"Explore OT\/IoT router vulnerabilities and security strategies in the &#039;Rough Around the Edges&#039; report with Finite State.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/webinars\/rough-around-the-edges-webinar\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-19T00:00:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/Rough-Around-the-Edges-Webinar_featured-image-1200x628-v1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/webinars\/rough-around-the-edges-webinar\/\",\"url\":\"https:\/\/www.forescout.com\/webinars\/rough-around-the-edges-webinar\/\",\"name\":\"Securing OT & IoT Routers: Key Insights\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/webinars\/rough-around-the-edges-webinar\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/webinars\/rough-around-the-edges-webinar\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/Rough-Around-the-Edges-Webinar_featured-image-1200x628-v1.webp\",\"datePublished\":\"2024-07-31T13:43:06+00:00\",\"dateModified\":\"2024-09-19T00:00:49+00:00\",\"description\":\"Explore OT\/IoT router vulnerabilities and security strategies in the 'Rough Around the Edges' report with Finite State.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/webinars\/rough-around-the-edges-webinar\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/webinars\/rough-around-the-edges-webinar\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/webinars\/rough-around-the-edges-webinar\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/Rough-Around-the-Edges-Webinar_featured-image-1200x628-v1.webp\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/Rough-Around-the-Edges-Webinar_featured-image-1200x628-v1.webp\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/webinars\/rough-around-the-edges-webinar\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webinars\",\"item\":\"https:\/\/www.forescout.com\/webinars\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Rough Around the Edges webinar\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing OT & IoT Routers: Key Insights","description":"Explore OT\/IoT router vulnerabilities and security strategies in the 'Rough Around the Edges' report with Finite State.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/webinars\/rough-around-the-edges-webinar\/","og_locale":"en_US","og_type":"article","og_title":"Securing OT & IoT Routers: Key Insights","og_description":"Explore OT\/IoT router vulnerabilities and security strategies in the 'Rough Around the Edges' report with Finite State.","og_url":"https:\/\/www.forescout.com\/webinars\/rough-around-the-edges-webinar\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2024-09-19T00:00:49+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/Rough-Around-the-Edges-Webinar_featured-image-1200x628-v1.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/webinars\/rough-around-the-edges-webinar\/","url":"https:\/\/www.forescout.com\/webinars\/rough-around-the-edges-webinar\/","name":"Securing OT & IoT Routers: Key Insights","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/webinars\/rough-around-the-edges-webinar\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/webinars\/rough-around-the-edges-webinar\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/Rough-Around-the-Edges-Webinar_featured-image-1200x628-v1.webp","datePublished":"2024-07-31T13:43:06+00:00","dateModified":"2024-09-19T00:00:49+00:00","description":"Explore OT\/IoT router vulnerabilities and security strategies in the 'Rough Around the Edges' report with Finite State.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/webinars\/rough-around-the-edges-webinar\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/webinars\/rough-around-the-edges-webinar\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/webinars\/rough-around-the-edges-webinar\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/Rough-Around-the-Edges-Webinar_featured-image-1200x628-v1.webp","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/Rough-Around-the-Edges-Webinar_featured-image-1200x628-v1.webp","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/webinars\/rough-around-the-edges-webinar\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Webinars","item":"https:\/\/www.forescout.com\/webinars\/"},{"@type":"ListItem","position":3,"name":"Rough Around the Edges webinar"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/Rough-Around-the-Edges-Webinar_featured-image-1200x628-v1.webp","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/89153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/165"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=89153"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/89153\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/84198"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/89156"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=89153"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=89153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}