Hi [[ session.user.profile.firstName ]]

Industrial Cyber Security

  • Date
  • Rating
  • Views
  • The Perfect ICS Cyber Storm - And What You Need To Weather It
    The Perfect ICS Cyber Storm - And What You Need To Weather It
    Michael Rothschild Recorded: Apr 23 2019 55 mins
    Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. A confluence of trends has caused all the right conditions for the perfect and potentially devastating security event. This session will immerse you in this rapidly evolving topic and provide you with the expertise to weather the next category 5 cyber storm.
  • Critical Infrastructure Cyber War Game
    Critical Infrastructure Cyber War Game
    IndegyTV Recorded: Apr 15 2019 3 mins
    In the high stakes game of industrial cyber security, which powers will you need to defend your organization. Will you choose player 1 or player 2.
  • Best Practices For Building The Right ICS Security Rulesets
    Best Practices For Building The Right ICS Security Rulesets
    Ran Rayn & Michael Rothschild Recorded: Feb 26 2019 55 mins
    A confluence of factors has put OT networks online and more susceptible to cyber attacks. Without addressing threats targeting the OT network, any manufacturing facility, industrial operation or critical infrastructure can be ground zero to a devastating attack. When tasked with creating the rule sets that are optimized for ICS environments, security experts must take into consideration a number of key areas.
  • Addressing the Cyber Threats on the Horizon
    Addressing the Cyber Threats on the Horizon
    Mille Gandelsman, Yoram Salinger, Guy Dagan, Elad Schulman, Kenneth Schneider Recorded: Jan 29 2019 41 mins
    Cyber threats continue to rise as organizations are embarking on their digital transformation journeys. The continued rise in cyber attacks is a key concern for CISOs in their efforts to protect the enterprise from financially motivated cyber criminals, as well as insider threats.

    Join security experts as they discuss:
    - New on the threat landscape
    - Notable cyber attack methods and strategies and how to protect against them
    - Areas for improvement
    - Solutions for network visibility, breach detection and response
    - Recommendations for improving security and steps to take today

    Panellists
    Elad Schulman, CEO, Segasec
    Yoram Salinger, CEO, Perception Point
    Mille Gandelsman, CTO and co-founder, Indegy
    Guy Dagan, Cofounder and Partner, Consienta
    Kenneth Schneider, VP Fellow, Symantec
  • Active or Passive Detection - Which Is Better & Do I Have To Choose
    Active or Passive Detection - Which Is Better & Do I Have To Choose
    Barak Perelman Recorded: Jan 15 2019 30 mins
    Barak Perelman, CEO and Co-founder of Indegy presents this topic at S4 created by Dale Peterson
  • Video Case Study: How Indegy Secures A Major Public Utility
    Video Case Study: How Indegy Secures A Major Public Utility
    IndegyTV Recorded: Jan 12 2019 4 mins
    Video Success Story
  • Video Case Study: How Indegy Secures A Major Cement Company
    Video Case Study: How Indegy Secures A Major Cement Company
    IndegyTV Recorded: Dec 13 2018 4 mins
  • Cracking The Code on OT Security
    Cracking The Code on OT Security
    Mille Gandelsman & Michael Rothschild Recorded: Dec 11 2018 67 mins
    A confluence of trends has caused the security of industrial operations to take center stage in the C-Suite. The convergence of IT and OT environments, migration of once isolated OT environments to IIoT, and of course increased targeting of industrial networks just to name a few. With these emerging trends, there is an even greater need to have 100% visibility, security and control across industrial environments.

    One of the key design decisions needed when implementing an industrial cyber security solution is the approach best suited for your industrial control environment - passive, active or hybrid. Join us for our next webcast where Mille Gandelsman, CTO and co-founder of Indegy will explain what “active” security is, what it does, why you need it, how it is safe and how to get there. Learn from Indegy's experience of implementing active technology for the past four years in some of the most demanding and sensitive environments globally, and gain the field knowledge needed to secure your industrial operations both now and into the future.
  • Device Integrity - Protection on Both Fronts
    Device Integrity - Protection on Both Fronts
    IndegyTV Recorded: Nov 3 2018 3 mins
    When it comes to security, network only monitoring leaves organizations open to significant risk and threats. Learn more about the proven technology that is achieves complete security across the most demanding OT environments.
  • Conquering The ICS Insider Threat
    Conquering The ICS Insider Threat
    Chris Grove & Michael Rothschild Recorded: Oct 30 2018 59 mins
    Recent studies indicate that the biggest threat to OT security is those already have access, namely the Insider Threat. This session will discuss the three most common forms of insider security threats, how they are carried out and the risks they pose to OT environments. We will discuss best practices for preventing, detecting and limiting the impact of insider threats on operations. We will cover risk assessment, visibility and how leveraging OT Asset Inventory can help to combat the Insider Threat.

Embed in website or blog