Hi [[ session.user.profile.firstName ]]

Cracking The Code on OT Security

A confluence of trends has caused the security of industrial operations to take center stage in the C-Suite. The convergence of IT and OT environments, migration of once isolated OT environments to IIoT, and of course increased targeting of industrial networks just to name a few. With these emerging trends, there is an even greater need to have 100% visibility, security and control across industrial environments.

One of the key design decisions needed when implementing an industrial cyber security solution is the approach best suited for your industrial control environment - passive, active or hybrid. Join us for our next webcast where Mille Gandelsman, CTO and co-founder of Indegy will explain what “active” security is, what it does, why you need it, how it is safe and how to get there. Learn from Indegy's experience of implementing active technology for the past four years in some of the most demanding and sensitive environments globally, and gain the field knowledge needed to secure your industrial operations both now and into the future.
Recorded Dec 11 2018 67 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mille Gandelsman & Michael Rothschild
Presentation preview: Cracking The Code on OT Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cracking The Code on OT Security Recorded: Dec 11 2018 67 mins
    Mille Gandelsman & Michael Rothschild
    A confluence of trends has caused the security of industrial operations to take center stage in the C-Suite. The convergence of IT and OT environments, migration of once isolated OT environments to IIoT, and of course increased targeting of industrial networks just to name a few. With these emerging trends, there is an even greater need to have 100% visibility, security and control across industrial environments.

    One of the key design decisions needed when implementing an industrial cyber security solution is the approach best suited for your industrial control environment - passive, active or hybrid. Join us for our next webcast where Mille Gandelsman, CTO and co-founder of Indegy will explain what “active” security is, what it does, why you need it, how it is safe and how to get there. Learn from Indegy's experience of implementing active technology for the past four years in some of the most demanding and sensitive environments globally, and gain the field knowledge needed to secure your industrial operations both now and into the future.
  • Device Integrity - Protection on Both Fronts Recorded: Nov 3 2018 3 mins
    IndegyTV
    When it comes to security, network only monitoring leaves organizations open to significant risk and threats. Learn more about the proven technology that is achieves complete security across the most demanding OT environments.
  • Conquering The ICS Insider Threat Recorded: Oct 30 2018 59 mins
    Chris Grove & Michael Rothschild
    Recent studies indicate that the biggest threat to OT security is those already have access, namely the Insider Threat. This session will discuss the three most common forms of insider security threats, how they are carried out and the risks they pose to OT environments. We will discuss best practices for preventing, detecting and limiting the impact of insider threats on operations. We will cover risk assessment, visibility and how leveraging OT Asset Inventory can help to combat the Insider Threat.
  • The Hype, Hysteria, Hyperbole of Critical Infrastructure Protection Recorded: Sep 17 2018 58 mins
    Mark Weatherford & Barak Perelman
    When it comes to critical infrastructure protection, there’s no shortage of cyber fear-mongering. Some of is warranted, while a fair amount is exaggeration and vendor market-speak. How much of the cyber talk around infrastructure attacks is hype, hysteria and hyperbole? Will nations use cyber weapons in the next war and what are the possible impacts? Could they be as devastating as some experts predict?
  • The Importance of the Industrial Control Plane Recorded: Sep 3 2018 3 mins
    IndegyTV
    Why is the industrial control plane so important in securing your Industrial Control System
  • The Five Most Common OT Security Breaches Recorded: Aug 8 2018 54 mins
    Roee Stark & Michael Rothschild
    In the OT world, security was never a concern because it was air-gapped and isolated from the rest of the world. Today however, IIoT is the effective and efficient way to go; but it is not without risk. Join us for this session where we will discuss how hackers can get into your environment given the new operating paradigm and how to stop them before they cause damage.
  • The Need For Automated Asset Management in ICS Recorded: Jun 22 2018 3 mins
    IndegyTV
    Why is automated asset management and discovery needed in industrial networks
  • Industrial Cyber Security 101 - Everything You Were Afraid To Ask Recorded: Jun 12 2018 59 mins
    Chris Grove & Michael Rothschild
    Designed years ago before the cyber threat existed, Industrial Control Systems (ICSs) were designed for operational reliability but they lack the security needed to thwart today's threats. Join us for this exciting webcast that will help you understand the latest when it comes to industrial cyber security and how to protect your organization.
  • Passive, Active or Hybrid Monitoring: What’s the right choice? Recorded: May 18 2018 63 mins
    Barak Perelman & Michael Rothschild
    They are the workhorses of industrial operations and critical infrastructure. Industrial Controllers such as PLCs, RTUs an DCSs have been around forever and control virtually everything. Back when these controllers were deployed, there was little concern for security; but times have changed. As a result, you are now exposed to consistent and confusing noise regarding various ICS security approaches. You must take action, but what is the right action to take?

    In this session we will help unravel the confusion and specifically:
    - Explain the different approaches for ICS security
    - Learn about the differences between active, passive and hybrid ICS security monitoring approaches
    - Understand the benefits and disadvantages of each
    - Learn which security gaps are addressed and not addressed by each approach
    - Know which approach is best suited for protecting your ICS network
  • Bridging The IT/OT Security Gap Recorded: May 10 2018 73 mins
    Chris Grove
    Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. In a very standard environment, thousands of devices exist and are increasingly being connected via the Industrial Internet of Things (IIoT). This creates new challenges in securing industrial environments specifically by making cyber-security threats even more difficult to detect, investigate and remediate.
  • Why Protect Industrial Controllers? Recorded: May 4 2018 3 mins
    IndegyTV
    Why are industrial controllers amongst the most important assets to protect in ICS Networks?
  • Intro to Industrial Control Systems Security Recorded: May 2 2018 2 mins
    IndegyTV
    Industrial control systems are at the heart of every infrastructure. Learn about the steps needed to secure them.
Cyber threat protection for industrial networks
Indegy, the leader in industrial cyber security, protects Industrial networks against cyber threats, malicious insiders and human error, by providing visibility and control. We offer the most advanced Industrial Cyber Security Suite, leveraging a hybrid of policy-based monitoring and networks anomaly detection, with unique device integrity checks for full visibility into ICS activities and threats.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cracking The Code on OT Security
  • Live at: Dec 11 2018 5:00 pm
  • Presented by: Mille Gandelsman & Michael Rothschild
  • From:
Your email has been sent.
or close