Hi [[ session.user.profile.firstName ]]

‘Encrypted IP communications for the Public Domain’

This webinar will give insight in our solution to guarantee reliable and secure communications for those organizations that have remote locations or use mobile deployment. We will explain how SkyTale combines authentication, encryption, provides assured connectivity for a diversity of IP devices.
Recorded Jun 21 2016 28 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Peter C. Geytenbeek MBA
Presentation preview: ‘Encrypted IP communications for the Public Domain’

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • ‘Secured OT and IT Network integration’ Recorded: Jul 19 2016 22 mins
    Peter C. Geytenbeek MBA
    The final webinar of this series will outline how an Oil company needed to protect their core Control Center and prepare to comply with mandatory national safety regulations. Discussion points include OT and IT segregation, Cyber-Attack prevention and ability to send information and data to HQ.
  • ‘Encrypted IP communications for the Public Domain’ Recorded: Jun 21 2016 28 mins
    Peter C. Geytenbeek MBA
    This webinar will give insight in our solution to guarantee reliable and secure communications for those organizations that have remote locations or use mobile deployment. We will explain how SkyTale combines authentication, encryption, provides assured connectivity for a diversity of IP devices.
  • ‘Network security for Nuclear Power Plants’ Recorded: Jun 14 2016 30 mins
    Peter C. Geytenbeek MBA
    For this webinar we will focus on the challenges a Nuclear Power plant faced, as by law they are required to protect core nuclear assets against cyber-attacks at the same time having to comply with national safety regulations. We will discuss OT and IT segregation and explain how we were able to offer 100% HA the highest level of assurance.
  • Protecting Intellectual Property with the Fox DataDiode Recorded: May 19 2016 14 mins
    Mr. Nivard Bakmeijer
    During the 3rd part of our digital use case series, we will explains how a large steel factory protects its intellectual property from being stolen through hacks.
  • 'Distributed Power Plant and Fox DataDiode Form Factor' Recorded: Apr 14 2016 22 mins
    Mr. Peter Geijtenbeek
    During this short 15 minute webinar we will share the example of how a power utility company went about securing their >500 distributed power substations from cyber-attacks
  • ‘Seamless integration of Active Directory with the Fox DataDiode!' Recorded: Mar 29 2016 24 mins
    Mr. Andre Post
    During this short 15 minute webinar we will share the example of how one of Europe’s Law enforcement agencies has extended its secure DataDiode solution by integrating Active Directory, allowing for single sign-on capabilities.

    The organization had a need to use windows domain credentials to reduce the administrative overhead per user. Learn how you too can benefit from integrating Windows Active Directory with the Fox DataDiode and create a secure environment with minimal admin load.
  • ICS and Cyber Security, are you doing the best you can? Recorded: Dec 15 2015 29 mins
    Peter C. Geytenbeek MBA
    With the end of 2015 in sight, we look back on a year when public and private sector cyber-attacks are almost commonplace headlines. Unfortunately confirming the reality that the digital domain is now one of the most dangerous battlegrounds in the modern era.

    During this webinar we will use the intelligence gained from a comprehensive survey that we ran amongst 127,000 professionals in the Oil & Gas IQ community. We will dig deeper into the answers given, offer fortifying insights and suggestions. Additionally we will share example scenarios on how we believe IT Security should become a continuous process.
  • The Fox-IT view on OGIQ's State of Cyber Security report Recorded: Sep 17 2015 40 mins
    Mr. Peter Geijtenbeek
    The current state of Cyber Security within Industrial Control Systems industry is a threat that is, in many cases, underestimated. It has a direct effect on the creation of government regulation and legislation. It can also have a deep financial, health, safety and environmental impact.
    During this webinar we will share our findings and results that are the outcome of the Cyber Security report, that we commissioned together with OGIQ. What are the latest trends in this industry and the valuable data statistics that came to the surface. But most of all we will share our best practice examples that will help this industry prevent a Cyberpocalypse.

    We believe that IT Security is a continuous process. Find out how and join.
Protect secrets and safeguard availability of Critical Assets,
The uninterrupted and correct functioning of networks systems is crucial for today’s society. The key is to securely utilize the benefits while preventing cyber-attacks from your corporate infrastructure directed at your critical or classified infrastructure.
During our webcast we will share our knowledge, expertise and show how you can secure your network infrastructure and operations.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: ‘Encrypted IP communications for the Public Domain’
  • Live at: Jun 21 2016 9:00 am
  • Presented by: Peter C. Geytenbeek MBA
  • From:
Your email has been sent.
or close