Hi [[ session.user.profile.firstName ]]

Securing Critical Infrastructure and Compliance with the NIST Framework

Join CB Pacific and Tempered as they discuss their solution to reducing the vulnerabilities and cybersecurity risks of critical infrastructure, all while conforming to the NIST CSF.

Traditionally, these networks have been physically managed and air-gapped. Managing and securing these networks and remote sites today are difficult, as new technologies are added to legacy systems. During this webcast, Tempered and CB Pacific will showcase Airwall's innovative capabilities to secure connectivity across physical, virtual, and cloud platforms, eliminating network-based attacks while lowering costs and reducing complexity.

Webinar highlights:
- How to overcome challenges of protecting critical infrastructure while staying NIST compliant
- Isolating and segmenting SCADA from shared IT networks
- Applying Tempered Airwall's defense-in-depth capabilities: zero-trust, micro-segmentation, secure remote access
- Reviewing customer success examples focused on water utilities, manufacturing, and smart buildings

CB Pacific has been helping oil and gas, water treatment, power, energy, and manufacturing companies connect, manage, and protect IIoT, ICS, and SCADA systems since 1994.
Recorded Aug 4 2020 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Greg Santos, Director, CB Pacific; Matt Senechal, Director, Tempered
Presentation preview: Securing Critical Infrastructure and Compliance with the NIST Framework

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Securing Critical Infrastructure and Compliance with the NIST Framework Recorded: Aug 4 2020 45 mins
    Greg Santos, Director, CB Pacific; Matt Senechal, Director, Tempered
    Join CB Pacific and Tempered as they discuss their solution to reducing the vulnerabilities and cybersecurity risks of critical infrastructure, all while conforming to the NIST CSF.

    Traditionally, these networks have been physically managed and air-gapped. Managing and securing these networks and remote sites today are difficult, as new technologies are added to legacy systems. During this webcast, Tempered and CB Pacific will showcase Airwall's innovative capabilities to secure connectivity across physical, virtual, and cloud platforms, eliminating network-based attacks while lowering costs and reducing complexity.

    Webinar highlights:
    - How to overcome challenges of protecting critical infrastructure while staying NIST compliant
    - Isolating and segmenting SCADA from shared IT networks
    - Applying Tempered Airwall's defense-in-depth capabilities: zero-trust, micro-segmentation, secure remote access
    - Reviewing customer success examples focused on water utilities, manufacturing, and smart buildings

    CB Pacific has been helping oil and gas, water treatment, power, energy, and manufacturing companies connect, manage, and protect IIoT, ICS, and SCADA systems since 1994.
  • Myth v. Fact in Network Security Architectures — How To Leverage True Zero Trust Recorded: Jul 30 2020 56 mins
    Jay Sawyer, Senior Security Architect, Tempered, and Holger Schulze, Founder and CEO, Cybersecurity Insiders
    The term “zero trust” is everywhere, but it is more than just a buzz word. Sorting through the hype to know if your cybersecurity architecture is ‘true’ zero trust can make your head spin. Most of the zero trust players still utilize default/allow architectures and the definition of the zero-trust security model is not trusting by default, so a default/deny architecture is needed.

    Join cybersecurity experts Jay Sawyer, Senior Security Architect, Tempered, and Holger Schulze, Founder and CEO, Cybersecurity Insiders, for an on-demand webinar to sort through the myth’s and facts that create zero trust solutions. During the webinar you will learn how you can reduce your attack surface and risks by knowing the difference.

    We also discuss:

    • The difference between zero trust and non-zero trust solutions
    • How to easily adopt a true zero trust architecture
    • Why trust then verify (default/allow) is no longer the best option for cybersecurity
    • How to control and protect data transferred in and out of your organization
    • Ways to reduce attack surface to secure critical infrastructure and IoT deployments
  • What is Airwall? Recorded: May 16 2020 55 mins
    Bryan Skene, Tempered CTO & VP of Product Development
    Tempered Airwall, a Zero Trust Network Access technology, makes connected things invisible, enabling micro-segmentation, and secure remote access. Bryan Skene, Tempered CTO, introduces and demonstrates Airwall at Security Field Day 3.
  • Who is Tempered? Recorded: May 16 2020 7 mins
    Jeff Hussey, President, CEO, Co-Founder, Tempered
    Tempered co-founder and CEO, Jeff Hussey, already changed the world once as co-founder and CEO of F5 Networks. He’s out to do it again. Tempered is his vision of a secure and private connected world. Learn more about Tempered in this 7 minute video from Security Field Day 3.
  • Tempered's use of Cloud, Virtualization, Containers, and APIs Recorded: May 15 2020 14 mins
    Thomas Kee, Principal Engineer, Tempered
    Thomas Kee covers the finer details of virtualization, cloud, containers, and APIs for Tempered.
  • How Tempered Uses HIP to Achieve Zero Trust Security Recorded: May 15 2020 36 mins
    Ludwin Fuchs, Principal Systems Engineer, Tempered
    Ludwin Fuchs, the authority on Host Identity Protocol (HIP), discusses identities, trust, the networking data plane, and intelligent multi-homing. Recorded at Security Field Day 3 on May 15, 2020.
  • New Security Architecture: Strategies for a Changing World Recorded: May 6 2020 58 mins
    Lee Doyle, Principle Analyst, Doyle Research; Jeff Hussey, Founder & CEO, Tempered; Bryan Skene, CTO, Tempered
    Is your digital transformation being driven by your CIO/CSO, your CEO, your CFO, or Covid-19?

    Today, no one has a choice on timeline for Digital Transformation — it has to evolve now because the world is rapidly changing. Don’t get us wrong, Digital Transformation was already underway with the proliferation of IoT, 4G, 5G and the like; but I.T. professionals need to alter their teams’ strategies to account for an entire mobile workforce and for securely connecting to critical infrastructure and company assets that might not have been managed remotely or through the cloud. Because of this, a new security architecture is necessary — invisibility.

    Join us for a webinar titled: “New Security Architecture: Strategies for a Changing World” where we will discuss strategic insights and practical steps for navigating the future of cybersecurity with analyst Lee Doyle of Doyle Research. We will discuss what the new architecture looks like, things IT teams and CIO/CSOs need to consider for creating a new strategy, and how to keep business continuity without compromising security posture.

    Attendees will learn:
    1. An overview of the new security architecture and why it is needed
    2. Considerations and best practices for navigating Digital Transformation
    3. How to ensure business continuity and not degrade security posture
    4. Customer success with invisible networks
We make networks invisible - as in gone
Securing your company’s distributed network is incredibly expensive and difficult to scale as you grow. Attacks or breaches present massive risk to your company’s reputation. Managing your company’s IoT deployments and network access demands become difficult to manage as your company grows. You’re told that threat visibility is security, that attacks are when not if, and that you should connect first and secure later. We've discovered a better way to keep it all safe. Airwall enables secure access and total invisibility at any scale, across any network. Secure your local datacenter or your global infrastructure. Airwall works with your existing network investments. Airwall eliminates network-based attacks and is the end of lateral movement of threats. It's the elegant solution hackers will never see.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing Critical Infrastructure and Compliance with the NIST Framework
  • Live at: Aug 4 2020 5:30 pm
  • Presented by: Greg Santos, Director, CB Pacific; Matt Senechal, Director, Tempered
  • From:
Your email has been sent.
or close