{"id":17181,"date":"2026-04-20T21:57:12","date_gmt":"2026-04-20T19:57:12","guid":{"rendered":"https:\/\/limessecurity.com\/events\/webinar-cyber-security-in-der-produktion\/"},"modified":"2026-04-20T21:57:12","modified_gmt":"2026-04-20T19:57:12","slug":"webinar-cyber-security-in-der-produktion","status":"publish","type":"etn","link":"https:\/\/limessecurity.com\/en\/events\/webinar-cyber-security-in-der-produktion\/","title":{"rendered":"Webinar: Cyber security in production"},"content":{"rendered":"<p class=\"inf-pre-text inf-phone-margintop--big\">Industrial plants are at great risk today. This is due to outdated systems, uncontrolled IoT devices and a lack of visibility &#8211; and IT approaches that are not effective in OT. In the <a href=\"https:\/\/www.digital-manufacturing-magazin.de\/\" target=\"_blank\" rel=\"noopener\">Digital Manufacturing Magazine<\/a> web conference, you will learn more about current threats in OT and how you can counter them.  <\/p>\n<p class=\"inf-pre-text inf-phone-margintop--big\">The <b>web conference &#8220;Cyber Security in Production&#8221;<\/b> highlights, among other things:<\/p>\n<div class=\"inf-vendorsection__description\">\n<ul>\n<li><b>Current threats<\/b> &amp; <b>OT security trends 2026<\/b><\/li>\n<li>Special <b>challenges in OT security<\/b><\/li>\n<li>How <b>optimization potential<\/b> can be identified <b>through risk analyses and penetration tests<\/b>.<\/li>\n<li>How companies can systematically develop their <b>shopfloor<\/b> towards <b>NIS2 readiness<\/b>.<\/li>\n<li><b>etc&#8230;<\/b><\/li>\n<\/ul>\n<\/div>\n<p>Limes Security is also taking part in the conference. IT\/OT Security Specialist Lucas Brandst\u00e4tter reports on NIS-2 in manufacturing: From compliance pressure to resilient production. <\/p>\n<h5><a href=\"https:\/\/www.digital-manufacturing-magazin.de\/cybersecurity-in-der-produktion-w-69d8943ad2668\/\" target=\"_blank\" rel=\"noopener\">REGISTER NOW FOR FREE<\/a><\/h5>\n","protected":false},"excerpt":{"rendered":"<p>Industrial plants are at great risk today. This is due to outdated systems, uncontrolled IoT devices and a lack of visibility &#8211; and IT approaches that are not effective in&#8230;<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"template":"","etn_category":[321],"etn_tags":[],"class_list":{"0":"post-17181","1":"etn","2":"type-etn","3":"status-publish","5":"etn_category-webcast"},"_links":{"self":[{"href":"https:\/\/limessecurity.com\/en\/wp-json\/wp\/v2\/etn\/17181","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/limessecurity.com\/en\/wp-json\/wp\/v2\/etn"}],"about":[{"href":"https:\/\/limessecurity.com\/en\/wp-json\/wp\/v2\/types\/etn"}],"author":[{"embeddable":true,"href":"https:\/\/limessecurity.com\/en\/wp-json\/wp\/v2\/users\/5"}],"wp:attachment":[{"href":"https:\/\/limessecurity.com\/en\/wp-json\/wp\/v2\/media?parent=17181"}],"wp:term":[{"taxonomy":"etn_category","embeddable":true,"href":"https:\/\/limessecurity.com\/en\/wp-json\/wp\/v2\/etn_category?post=17181"},{"taxonomy":"etn_tags","embeddable":true,"href":"https:\/\/limessecurity.com\/en\/wp-json\/wp\/v2\/etn_tags?post=17181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}