Hi [[ session.user.profile.firstName ]]

Passive, Active or Hybrid Monitoring: What’s the right choice?

They are the workhorses of industrial operations and critical infrastructure. Industrial Controllers such as PLCs, RTUs an DCSs have been around forever and control virtually everything. Back when these controllers were deployed, there was little concern for security; but times have changed. As a result, you are now exposed to consistent and confusing noise regarding various ICS security approaches. You must take action, but what is the right action to take?

In this session we will help unravel the confusion and specifically:
- Explain the different approaches for ICS security
- Learn about the differences between active, passive and hybrid ICS security monitoring approaches
- Understand the benefits and disadvantages of each
- Learn which security gaps are addressed and not addressed by each approach
- Know which approach is best suited for protecting your ICS network
Recorded May 18 2018 63 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Barak Perelman & Michael Rothschild
Presentation preview: Passive, Active or Hybrid Monitoring: What’s the right choice?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Best Practices For Building The Right ICS Security Rulesets Feb 26 2019 5:00 pm UTC 75 mins
    Ran Rayn & Michael Rothschild
    A confluence of factors has put OT networks online and more susceptible to cyber attacks. Without addressing threats targeting the OT network, any manufacturing facility, industrial operation or critical infrastructure can be ground zero to a devastating attack. When tasked with creating the rule sets that are optimized for ICS environments, security experts must take into consideration a number of key areas.
  • Addressing the Cyber Threats on the Horizon Recorded: Jan 29 2019 41 mins
    Mille Gandelsman, Yoram Salinger, Guy Dagan, Elad Schulman, Kenneth Schneider
    Cyber threats continue to rise as organizations are embarking on their digital transformation journeys. The continued rise in cyber attacks is a key concern for CISOs in their efforts to protect the enterprise from financially motivated cyber criminals, as well as insider threats.

    Join security experts as they discuss:
    - New on the threat landscape
    - Notable cyber attack methods and strategies and how to protect against them
    - Areas for improvement
    - Solutions for network visibility, breach detection and response
    - Recommendations for improving security and steps to take today

    Panellists
    Elad Schulman, CEO, Segasec
    Yoram Salinger, CEO, Perception Point
    Mille Gandelsman, CTO and co-founder, Indegy
    Guy Dagan, Cofounder and Partner, Consienta
    Kenneth Schneider, VP Fellow, Symantec
  • Cracking The Code on OT Security Recorded: Dec 11 2018 67 mins
    Mille Gandelsman & Michael Rothschild
    A confluence of trends has caused the security of industrial operations to take center stage in the C-Suite. The convergence of IT and OT environments, migration of once isolated OT environments to IIoT, and of course increased targeting of industrial networks just to name a few. With these emerging trends, there is an even greater need to have 100% visibility, security and control across industrial environments.

    One of the key design decisions needed when implementing an industrial cyber security solution is the approach best suited for your industrial control environment - passive, active or hybrid. Join us for our next webcast where Mille Gandelsman, CTO and co-founder of Indegy will explain what “active” security is, what it does, why you need it, how it is safe and how to get there. Learn from Indegy's experience of implementing active technology for the past four years in some of the most demanding and sensitive environments globally, and gain the field knowledge needed to secure your industrial operations both now and into the future.
  • Device Integrity - Protection on Both Fronts Recorded: Nov 3 2018 3 mins
    IndegyTV
    When it comes to security, network only monitoring leaves organizations open to significant risk and threats. Learn more about the proven technology that is achieves complete security across the most demanding OT environments.
  • Conquering The ICS Insider Threat Recorded: Oct 30 2018 59 mins
    Chris Grove & Michael Rothschild
    Recent studies indicate that the biggest threat to OT security is those already have access, namely the Insider Threat. This session will discuss the three most common forms of insider security threats, how they are carried out and the risks they pose to OT environments. We will discuss best practices for preventing, detecting and limiting the impact of insider threats on operations. We will cover risk assessment, visibility and how leveraging OT Asset Inventory can help to combat the Insider Threat.
  • The Hype, Hysteria, Hyperbole of Critical Infrastructure Protection Recorded: Sep 17 2018 58 mins
    Mark Weatherford & Barak Perelman
    When it comes to critical infrastructure protection, there’s no shortage of cyber fear-mongering. Some of is warranted, while a fair amount is exaggeration and vendor market-speak. How much of the cyber talk around infrastructure attacks is hype, hysteria and hyperbole? Will nations use cyber weapons in the next war and what are the possible impacts? Could they be as devastating as some experts predict?
  • The Importance of the Industrial Control Plane Recorded: Sep 3 2018 3 mins
    IndegyTV
    Why is the industrial control plane so important in securing your Industrial Control System
  • The Five Most Common OT Security Breaches Recorded: Aug 8 2018 54 mins
    Roee Stark & Michael Rothschild
    In the OT world, security was never a concern because it was air-gapped and isolated from the rest of the world. Today however, IIoT is the effective and efficient way to go; but it is not without risk. Join us for this session where we will discuss how hackers can get into your environment given the new operating paradigm and how to stop them before they cause damage.
  • The Need For Automated Asset Management in ICS Recorded: Jun 22 2018 3 mins
    IndegyTV
    Why is automated asset management and discovery needed in industrial networks
  • Industrial Cyber Security 101 - Everything You Were Afraid To Ask Recorded: Jun 12 2018 59 mins
    Chris Grove & Michael Rothschild
    Designed years ago before the cyber threat existed, Industrial Control Systems (ICSs) were designed for operational reliability but they lack the security needed to thwart today's threats. Join us for this exciting webcast that will help you understand the latest when it comes to industrial cyber security and how to protect your organization.
  • Passive, Active or Hybrid Monitoring: What’s the right choice? Recorded: May 18 2018 63 mins
    Barak Perelman & Michael Rothschild
    They are the workhorses of industrial operations and critical infrastructure. Industrial Controllers such as PLCs, RTUs an DCSs have been around forever and control virtually everything. Back when these controllers were deployed, there was little concern for security; but times have changed. As a result, you are now exposed to consistent and confusing noise regarding various ICS security approaches. You must take action, but what is the right action to take?

    In this session we will help unravel the confusion and specifically:
    - Explain the different approaches for ICS security
    - Learn about the differences between active, passive and hybrid ICS security monitoring approaches
    - Understand the benefits and disadvantages of each
    - Learn which security gaps are addressed and not addressed by each approach
    - Know which approach is best suited for protecting your ICS network
  • Bridging The IT/OT Security Gap Recorded: May 10 2018 73 mins
    Chris Grove
    Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. In a very standard environment, thousands of devices exist and are increasingly being connected via the Industrial Internet of Things (IIoT). This creates new challenges in securing industrial environments specifically by making cyber-security threats even more difficult to detect, investigate and remediate.
  • Why Protect Industrial Controllers? Recorded: May 4 2018 3 mins
    IndegyTV
    Why are industrial controllers amongst the most important assets to protect in ICS Networks?
  • Intro to Industrial Control Systems Security Recorded: May 2 2018 2 mins
    IndegyTV
    Industrial control systems are at the heart of every infrastructure. Learn about the steps needed to secure them.
Cyber threat protection for industrial networks
Indegy, the leader in industrial cyber security, protects Industrial networks against cyber threats, malicious insiders and human error, by providing visibility and control. We offer the most advanced Industrial Cyber Security Suite, leveraging a hybrid of policy-based monitoring and networks anomaly detection, with unique device integrity checks for full visibility into ICS activities and threats.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Passive, Active or Hybrid Monitoring: What’s the right choice?
  • Live at: May 18 2018 9:30 pm
  • Presented by: Barak Perelman & Michael Rothschild
  • From:
Your email has been sent.
or close