Videos & Webinars

Watch the latest videos, webinars, interviews and podcasts by OT/ICS cyber security industry thought leaders.

Building an OT Cyber Security Roadmap

On-Demand Webinar: Building an OT Cyber Security Roadmap
Filter By:
Video

Top 5 Lessons to Accelerate Your OT/ICS Cyber Security Journey

In this 20 minute session, John Livingston, CEO of Verve Industrial shares practical recommendations on how to improve an organization's OT/ICS cyber security maturity rapidly, efficiently, and safely.

Read more
Video

Why an OT Systems Management Platform Approach is Critical for Converged IT OT

OT security is based on the same foundations as IT security, but out of a fear of disrupting operations, security practitioners have relied on passive detection and/or network protections as their lines of defense. In a world of accelerating ransomware, increased vulnerabilities, and more state actors trying to disrupt operations and/or steal IP, this just isn’t good enough anymore. In this session, Verve will describe the platform approach it has used with manufacturing and critical infrastructure for over a decade.

Read more
Video

John Livingston, CEO at ARC Industry Forum

Learn more on how Verve Industrial Protection can provide unified to security to industrial assets.

Read more
Video

Rick Kaun, VP of Solutions at Cyber Senate

Get insights into the latest on cyber security markets, rise in cyber breaches, and the challenges facing the cyber security industry.

Read more
Video

Cybersecurity Maturity - ARC Orlando Forum

Justin Kosar Of ARC gives a talk. ARC is the leading technology research and advisory firm for industry and infrastructure.

Read more
Webinar

Understanding Embedded Devices and Firmware in OT

URG11 and network stack flaws are not anything new. They are miscreants leftover from the 90’s and early 2000’s – a period where these types of software flaws were rampant.   For the most part, these flaws represent an era where devices lacked proper robustness testing and customers were obligated to trust the vendor’s security practices. While most of these were stranded in a land of security by obscurity or islanded (“air-gapped”), they were eventually retired or rotated out of deployment and into the hands of researchers with ubiquitous network-stack protocol “fuzzers” (a strategy/application where you test all permutations of a protocol to see if there unintended effects or erroneous logic).   Despite these vendors possibly having visibility or reports on these exact issues (or ones like them), stack-based vulnerabilities are commonly forgotten by vendor quality assurance and systems integration processes. Even if these systems are deployed in critical infrastructure, energy, oil & gas, manufacturing, building automation, or are consumer Internet of Things (IoT) products – the same issues are fundamentally present in all types of systems and represent a variable level of opportunity and susceptibility to exploitation by a malicious entity.   This webinar’s topic is a mile wide but will be a technical deep dive on a variety of components in embedded systems. It is intended for IT persons, asset owners, and those looking to understand the complexities of firmware (as they relate to managing vulnerabilities) at a level sufficient for coverage within a 45-minute webinar.

Read more
Webinar

Building an OT Cyber Security Roadmap

Recently, there has been a significant emphasis on the pursuit of asset inventory as a starting point for many OT cybersecurity programs. While asset inventory is the first and most important step in your cybersecurity journey, many organizations fail to recognize it is only one component of security maturity and end up falling short of their end goal. Hear from aeSolutions’ VP Industrial Cybersecurity, John Cusimano and Verve’s VP Solutions, Rick Kaun, as they discuss building an OT cybersecurity roadmap.

Read more
Webinar

OT Endpoint Management

Securing Operational Technology (OT) systems is an increasingly important, but challenging task. IT cyber security has had the advantage of building on a strong foundation of IT Systems Management processes and technologies over the past decade or more – and even those assets are often left insecure. Unfortunately for OT environments, processes such as accurate and updated hardware and software inventory, patch management, configuration hardening, user and account management, etc. do not exist. This is due to a range of factors from skill-gaps to sensitive OT environments. To truly secure these systems, simply monitoring and detecting threats is not enough. We must conduct the other critical elements of security such as identification, protection and response. This requires overcoming these endpoint management challenges. The good news is there is a way. Download this on-demand webinar to learn a practical approach to applying many of the same best practice IT principles into the OT environment and hear a real-world example of an operator bringing the appropriate skills, technology and processes to enable similar endpoint risk management to OT as to IT.

Read more
Webinar

How to Begin the OT Cyber Security Journey

OT cyber security is not a destination, it’s a journey. While there is no silver bullet or one-size-fits-all approach, effective cyber security programs are composed of people, processes and technology that work together to advance the maturity of an organization’s security over time. With numerous cyber security frameworks and governance models out there, it feels daunting to get started. If you’re unsure where/how to begin, who should be involved, what the most important things to tackle first are, or how OT security differs from IT security, you’ve come to the right place.

Read more
Podcast

CSIA Podcast on Industrial Cyber Security

An open discussion on the challenges to overcome and insights for achieving your goals in ICS cybersecurity program planning and execution.

Read more