OT Security Videos & Webinars
Watch the latest videos, webinars, interviews and podcasts by OT/ICS cyber security industry thought leaders.
What is Operational Technology?
Join the discussion as Verve OT experts as they discuss the definition of Operational Technology (OT), the differences between OT and IT, and the unique challenges of securing industrial control systems in episode 2 of OT After Hours, An OT Security Podcast.
Read moreOT After Hours Episode 1: Why OT Security Matters
Join the OT After Hours podcast as experts dive into why OT security matters, sharing insights, challenges, and real-world examples of industrial cybersecurity.
Read moreHow to Prepare for the Future of OT Security
The rapidly evolving OT cybersecurity landscape is threatened by new risks that target critical systems and make organizations more vulnerable than ever.
Read moreBuilding a Business Case for OT Security | RSA 2024 Interview with Rick Kaun
Learn from Rick Kaun, VP of Solutions at Verve Industrial, how to build a compelling OT security business case with strategies for legacy systems, risk quantification, and scalable security.
Read moreStrengthening OT Security Through Managed Services
Many industrial organizations are lacking enough skilled resources to manage and maintain complex OT environments. To fill this gap, external resources provide the necessary knowledge and experience to scale the security and reliability of OT cyber programs.
Read moreSecurity Breach: SBOMs, AI and the Crown Jewels
Learn how prioritizing the wrong data and assets is leading to more OT cyber risk.
Read moreHow to Integrate Risk and Lifecycle Management in OT
Learn about the latest OT cybersecurity capabilities from Rockwell Automation and Verve.
Read moreHow to Build a Successful Business Case for OT Cybersecurity
Presented at SecurityWeek’s ICS Cybersecurity Conference 2023
Read moreCyber Attacks on Industrial Control Systems and Technology
In this panel discussion from 2023 Critical Infrastructure Cyber Security Summit, experts discuss industrial cybersecurity, covering attack surface reduction, tool deployment, OT attacks, security tools, and awareness.
Read moreEnsuring Sustainability in Your OT Security Program
Part 3 in a 3-Part Series: Start, Build & Maintain an OT Security Program
Read more