Digital Trust Finland is organizing a webinar where we present the results of a market study on Operational technology (OT) cybersecurity with Frost & Sullivan.
During the last year we got feedback from our customers that it would be useful to research OT cybersecurity in detail, and also OT/IT systems’ dependencies. The needs include understanding trends and drivers on target markets and key industries, expected disruptions and enhancements, OT actors’ decision-makers, investments, technologies and market needs. These matters have been analysed and described in a market research study about OT cybersecurity by Frost & Sullivan.
13:00 Welcoming words & introductions, Digital Trust Finland program
13:10 Presenting the findings of the market study, Frost & Sullivan
13:40 Q&A
14:00 Webinar ends (flexibility to continue discussion when needed)
Parminder Kaur, co-author of this report, is an Associate Director of the Cybersecurity Practice at Frost & Sullivan. She has over eighteen years of strategic consulting, research and project management experience with particular expertise in Go to Market Strategy, Business Strategy & Planning, Competitive Intelligence and benchmarking, as well as Technology and Market Analysis. Her industry experience spans a broad range of sectors including Cyber Security, Unified Communications & Collaboration, Contact Centres, Telecom Services, Data Centres and Cloud IT Services. This has positioned her to understand, analyse and interpret the trend impacts of cybersecurity in all its capability and product areas across multiple industry applications.
Rajarshi Dhar, co-author of the report, is a Senior Consultant with the Cybersecurity Practice at Frost & Sullivan. He has over nine years of professional experience in research and consulting on cybersecurity. He has been involved in engagements on technology consulting, business advisory and research looking at Market expansion, trend analysis, business process re-engineering and change management engagements. He closely tracks the cyber security space with regular interaction with most security vendors and service providers and has a detailed understanding of the cyber security market (network, data, endpoint, and managed security services), with opportunity assessment and evaluation of various cybersecurity technologies, processes and techniques.