Hi [[ session.user.profile.firstName ]]

Industrial Cyber Security

  • Date
  • Rating
  • Views
  • How Healthy Is Your OT Environment
    How Healthy Is Your OT Environment
    Ben Abigadol & Michael Rothschild Recorded: Jun 25 2019 58 mins
    With an expanding attack surface and new attack vectors, what you thought was once secured in your industrial or critical infrastructure environment may indeed have new threats that you were unaware of.

    Join us for this exciting webinar which will cover:
    a.The changing security environment given recent attacks – and the increasing need to address industrial security threats
    b.The potential complexity in securing your environment given the new reality
    c.Take the OT HealthCheck by Indegy. What it is. How it works. And what you get.
    d.Learn where your vulnerabilities may be and what you should consider to address them
    e.Beyond the HealthCheck. How to take the next step.
  • The Perfect ICS Cyber Storm - And What You Need To Weather It
    The Perfect ICS Cyber Storm - And What You Need To Weather It
    Michael Rothschild Recorded: Apr 23 2019 55 mins
    Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. A confluence of trends has caused all the right conditions for the perfect and potentially devastating security event. This session will immerse you in this rapidly evolving topic and provide you with the expertise to weather the next category 5 cyber storm.
  • Critical Infrastructure Cyber War Game
    Critical Infrastructure Cyber War Game
    IndegyTV Recorded: Apr 15 2019 3 mins
    In the high stakes game of industrial cyber security, which powers will you need to defend your organization. Will you choose player 1 or player 2.
  • Best Practices For Building The Right ICS Security Rulesets
    Best Practices For Building The Right ICS Security Rulesets
    Ran Rayn & Michael Rothschild Recorded: Feb 26 2019 55 mins
    A confluence of factors has put OT networks online and more susceptible to cyber attacks. Without addressing threats targeting the OT network, any manufacturing facility, industrial operation or critical infrastructure can be ground zero to a devastating attack. When tasked with creating the rule sets that are optimized for ICS environments, security experts must take into consideration a number of key areas.
  • Addressing the Cyber Threats on the Horizon
    Addressing the Cyber Threats on the Horizon
    Mille Gandelsman, Yoram Salinger, Guy Dagan, Elad Schulman, Kenneth Schneider Recorded: Jan 29 2019 41 mins
    Cyber threats continue to rise as organizations are embarking on their digital transformation journeys. The continued rise in cyber attacks is a key concern for CISOs in their efforts to protect the enterprise from financially motivated cyber criminals, as well as insider threats.

    Join security experts as they discuss:
    - New on the threat landscape
    - Notable cyber attack methods and strategies and how to protect against them
    - Areas for improvement
    - Solutions for network visibility, breach detection and response
    - Recommendations for improving security and steps to take today

    Panellists
    Elad Schulman, CEO, Segasec
    Yoram Salinger, CEO, Perception Point
    Mille Gandelsman, CTO and co-founder, Indegy
    Guy Dagan, Cofounder and Partner, Consienta
    Kenneth Schneider, VP Fellow, Symantec
  • Active or Passive Detection - Which Is Better & Do I Have To Choose
    Active or Passive Detection - Which Is Better & Do I Have To Choose
    Barak Perelman Recorded: Jan 15 2019 30 mins
    Barak Perelman, CEO and Co-founder of Indegy presents this topic at S4 created by Dale Peterson
  • Video Case Study: How Indegy Secures A Major Public Utility
    Video Case Study: How Indegy Secures A Major Public Utility
    IndegyTV Recorded: Jan 12 2019 4 mins
    Video Success Story
  • Video Case Study: How Indegy Secures A Major Cement Company
    Video Case Study: How Indegy Secures A Major Cement Company
    IndegyTV Recorded: Dec 13 2018 4 mins
  • Cracking The Code on OT Security
    Cracking The Code on OT Security
    Mille Gandelsman & Michael Rothschild Recorded: Dec 11 2018 67 mins
    A confluence of trends has caused the security of industrial operations to take center stage in the C-Suite. The convergence of IT and OT environments, migration of once isolated OT environments to IIoT, and of course increased targeting of industrial networks just to name a few. With these emerging trends, there is an even greater need to have 100% visibility, security and control across industrial environments.

    One of the key design decisions needed when implementing an industrial cyber security solution is the approach best suited for your industrial control environment - passive, active or hybrid. Join us for our next webcast where Mille Gandelsman, CTO and co-founder of Indegy will explain what “active” security is, what it does, why you need it, how it is safe and how to get there. Learn from Indegy's experience of implementing active technology for the past four years in some of the most demanding and sensitive environments globally, and gain the field knowledge needed to secure your industrial operations both now and into the future.
  • Device Integrity - Protection on Both Fronts
    Device Integrity - Protection on Both Fronts
    IndegyTV Recorded: Nov 3 2018 3 mins
    When it comes to security, network only monitoring leaves organizations open to significant risk and threats. Learn more about the proven technology that is achieves complete security across the most demanding OT environments.

Embed in website or blog