Videos & Webinars

Watch the latest videos, webinars, interviews and podcasts by OT/ICS cyber security industry thought leaders.

[Webinar] Find & Protect Hidden Flaws in OT Security

Download it here
Filter By:
Webinar

[Webinar] Find & Protect Hidden Flaws in OT Security

IT-based vulnerability detection solutions often miss more OT vulnerabilities than they detect – or they generate an unmanageable flood of false positives, wasting your already over-stretched cyber resources. This webinar aims to show how decades of OT product naming inconsistency limits the ability of traditional vulnerability tools to determine which of your assets are affected by a vulnerability – or…

Read more
Video

Taking Security Directly to the Endpoint

There is no shortage of security solutions that aim to protect the perimeter, the network and to provide alerting and monitoring. What is sorely missing, however, is significant risk reduction on the endpoints themselves.  This has traditionally been due to ‘poorly fitting’ security tools, gaps in traditional IT security tools, and the inability to scale what is usually a manual…

Read more
Video

Inventorying Transient & Distributed Rail Assets

Learn how to get ahead of asset management in the rail transport industry to ensure operational safety and reliability.   Using what we have learned in oil and gas, mining datasets, and aviation with e-Enabled aircraft – we are going to take you on an educational tour on how to tackle inventories of connected (but potentially not always on) distributed…

Read more
Webinar

IT is from Mars, OT is from Venus

Ever feel like your counterparts are from another planet? Maybe they are – and that’s okay! Verve has 25 years of experience connecting extraterrestrials (you know like IT and OT teams) to understand how each planet operates. Join us for best practice models from our 25 years of experience bridging the worlds of IT and OT. During this webinar, you…

Read more
Video

Next Generation OT/ICS Endpoint Detection & Response

This session covers how to overcome challenges in industrial cyber security such as gathering a full risk view of assets and how to create a roadmap for vulnerabilities.

Read more
Webinar

Get Ready for CMMC: Improve OT Cyber Maturity in 30 Days

Prepare for CMMC compliance by creating a roadmap that improves OT cybersecurity maturity quickly, demonstrates action for your executives, and provides a long-term strategy for effective risk management.

Read more
Video

Raiders of the Lost RTUs, Meters & Valves

A presentation by Ron Brash during the SANS Oil & Gas Summit, 2020

Read more
Event, Webinar April 6, 2021

[Webinar] How to Make Sense of OT Security from an IT Perspective

Hosted by CAMP IT, this webinar aims to teach IT security professionals how to approach OT security for true IT OT convergence.

Read more
Webinar

How to Defend, Detect and Recover from OT Ransomware

With ransomware cyber security attacks on the rise, it’s important to understand why attackers use this method, what its impacts are for an OT/ICS environment, and how to minimize risk for your organization. By 2021, a ransomware attack will take place every 11 seconds. In the last year, 51% of businesses were impacted by ransomware – just ask Maersk, Mondelez,…

Read more
Video

Think Global, Act Local in Industrial OT Security

A presentation by VP Solutions, Rick Kaun during Bsides Calgary 2020

Read more
Video

Top 5 Lessons to Accelerate Your OT/ICS Cyber Security Journey

In this 20 minute session, John Livingston, CEO of Verve Industrial shares practical recommendations on how to improve an organization’s OT/ICS cyber security maturity rapidly, efficiently, and safely.

Read more
Video

Why an OT Systems Management Platform Approach is Critical for Converged IT OT

OT security is based on the same foundations as IT security, but out of a fear of disrupting operations, security practitioners have relied on passive detection and/or network protections as their lines of defense. In a world of accelerating ransomware, increased vulnerabilities, and more state actors trying to disrupt operations and/or steal IP, this just isn’t good enough anymore. In…

Read more