NIS2 Compliance with Cisco Industrial Security
58:43
Andrew McPhee, a solution manager for industrial security at Cisco, discusses how Cisco Cyber Vision and Cisco Secure Equipment Access can assist with NIS2 compliance.
Related Videos
In IoT - Internet of Things
-
Play video Introduction: Cisco Radio Aware Routing using DLEP
Introduction: Cisco Radio Aware Routing using DLEP
See how Cisco Embedded Series Routers can maintain network connectivity—even while on the move—with Cisco Radio Aware Routing using Dynamic Link Exchange Protocol (DLEP).
2:07
-
Play video Overview: Introduction to software image management (SWIM)
Overview: Introduction to software image management (SWIM)
Learn the importance of keeping your network equipment up-to-date with approved software images, why it can be difficult in a large installation, and how Cisco Catalyst Center can streamline this process.
8:12
-
Play video Sustainable battery manufacturing to advance a decarbonized future
Sustainable battery manufacturing to advance a decarbonized future
Cisco’s integrated IT and OT networking infrastructure enables Northvolt to employ smart manufacturing techniques, make data-driven decisions, and scale their operations in their quest to build and recycle batteries with low carbon footprint.
7:21
-
Play video Demo: Effortlessly update software images using Cisco Catalyst Center
Demo: Effortlessly update software images using Cisco Catalyst Center
Follow the simple steps for Software Image Management (SWIM) process in Cisco Catalyst Center to identify devices that need updates, load new images in the Catalyst Center, and automatically update the software in those devices.
14:43
-
Play video Orange chooses Cisco for their industrial LAN service
Orange chooses Cisco for their industrial LAN service
Orange Business, Orange Cyberdefense, and Cisco have joined forces to offer a secure industrial LAN service to help deploy, manage, and secure industrial networks, enabling organizations to protect and scale their industrial operations worldwide.
8:34
-
Play video Creating a Zero Trust Environment in DoD
Creating a Zero Trust Environment in DoD
A discussion with Marcos Rogers: Leveraging a Comply to Connect Security Architecture
4:31