Hi [[ session.user.profile.firstName ]]

Industrial Cyber Security

  • Date
  • Rating
  • Views
  • Cracking The Code on OT Security
    Cracking The Code on OT Security
    Mille Gandelsman & Michael Rothschild Recorded: Dec 11 2018 67 mins
    A confluence of trends has caused the security of industrial operations to take center stage in the C-Suite. The convergence of IT and OT environments, migration of once isolated OT environments to IIoT, and of course increased targeting of industrial networks just to name a few. With these emerging trends, there is an even greater need to have 100% visibility, security and control across industrial environments.

    One of the key design decisions needed when implementing an industrial cyber security solution is the approach best suited for your industrial control environment - passive, active or hybrid. Join us for our next webcast where Mille Gandelsman, CTO and co-founder of Indegy will explain what “active” security is, what it does, why you need it, how it is safe and how to get there. Learn from Indegy's experience of implementing active technology for the past four years in some of the most demanding and sensitive environments globally, and gain the field knowledge needed to secure your industrial operations both now and into the future.
  • Device Integrity - Protection on Both Fronts
    Device Integrity - Protection on Both Fronts
    IndegyTV Recorded: Nov 3 2018 3 mins
    When it comes to security, network only monitoring leaves organizations open to significant risk and threats. Learn more about the proven technology that is achieves complete security across the most demanding OT environments.
  • Conquering The ICS Insider Threat
    Conquering The ICS Insider Threat
    Chris Grove & Michael Rothschild Recorded: Oct 30 2018 59 mins
    Recent studies indicate that the biggest threat to OT security is those already have access, namely the Insider Threat. This session will discuss the three most common forms of insider security threats, how they are carried out and the risks they pose to OT environments. We will discuss best practices for preventing, detecting and limiting the impact of insider threats on operations. We will cover risk assessment, visibility and how leveraging OT Asset Inventory can help to combat the Insider Threat.
  • The Hype, Hysteria, Hyperbole of Critical Infrastructure Protection
    The Hype, Hysteria, Hyperbole of Critical Infrastructure Protection
    Mark Weatherford & Barak Perelman Recorded: Sep 17 2018 58 mins
    When it comes to critical infrastructure protection, there’s no shortage of cyber fear-mongering. Some of is warranted, while a fair amount is exaggeration and vendor market-speak. How much of the cyber talk around infrastructure attacks is hype, hysteria and hyperbole? Will nations use cyber weapons in the next war and what are the possible impacts? Could they be as devastating as some experts predict?
  • The Importance of the Industrial Control Plane
    The Importance of the Industrial Control Plane
    IndegyTV Recorded: Sep 3 2018 3 mins
    Why is the industrial control plane so important in securing your Industrial Control System
  • The Five Most Common OT Security Breaches
    The Five Most Common OT Security Breaches
    Roee Stark & Michael Rothschild Recorded: Aug 8 2018 54 mins
    In the OT world, security was never a concern because it was air-gapped and isolated from the rest of the world. Today however, IIoT is the effective and efficient way to go; but it is not without risk. Join us for this session where we will discuss how hackers can get into your environment given the new operating paradigm and how to stop them before they cause damage.
  • The Need For Automated Asset Management in ICS
    The Need For Automated Asset Management in ICS
    IndegyTV Recorded: Jun 22 2018 3 mins
    Why is automated asset management and discovery needed in industrial networks
  • Industrial Cyber Security 101 - Everything You Were Afraid To Ask
    Industrial Cyber Security 101 - Everything You Were Afraid To Ask
    Chris Grove & Michael Rothschild Recorded: Jun 12 2018 59 mins
    Designed years ago before the cyber threat existed, Industrial Control Systems (ICSs) were designed for operational reliability but they lack the security needed to thwart today's threats. Join us for this exciting webcast that will help you understand the latest when it comes to industrial cyber security and how to protect your organization.
  • Passive, Active or Hybrid Monitoring: What’s the right choice?
    Passive, Active or Hybrid Monitoring: What’s the right choice?
    Barak Perelman & Michael Rothschild Recorded: May 18 2018 63 mins
    They are the workhorses of industrial operations and critical infrastructure. Industrial Controllers such as PLCs, RTUs an DCSs have been around forever and control virtually everything. Back when these controllers were deployed, there was little concern for security; but times have changed. As a result, you are now exposed to consistent and confusing noise regarding various ICS security approaches. You must take action, but what is the right action to take?

    In this session we will help unravel the confusion and specifically:
    - Explain the different approaches for ICS security
    - Learn about the differences between active, passive and hybrid ICS security monitoring approaches
    - Understand the benefits and disadvantages of each
    - Learn which security gaps are addressed and not addressed by each approach
    - Know which approach is best suited for protecting your ICS network
  • Bridging The IT/OT Security Gap
    Bridging The IT/OT Security Gap
    Chris Grove Recorded: May 10 2018 73 mins
    Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. In a very standard environment, thousands of devices exist and are increasingly being connected via the Industrial Internet of Things (IIoT). This creates new challenges in securing industrial environments specifically by making cyber-security threats even more difficult to detect, investigate and remediate.

Embed in website or blog