Videos & Webinars

Watch the latest videos, webinars, interviews and podcasts by OT/ICS cyber security industry thought leaders.

[Webinar] How to Achieve IT Security in OT Environments

Download it here
Filter By:
Webinar

End-to-End OT Patch Management Process

To address these common challenges with vulnerability and patch management, Verve designed a six-step end-to-end patching process safe for OT environments. Designed by industrial control system experts, it allows for global automation with control at the local level.  

Read more
Video

ARC Executive Interview with John Livingston

CEO John Livingston shares Verve’s perspective on the OT cyber security market, how to manage global security operations, and what’s in store for the future of Verve.

Read more
Webinar

Managing prescriptive and auditable regulations in OT environments (such as TSA)

Learn how to address prescriptive cyber security requirements and create efficient means to secure OT environments.

Read more
Video

The Evolution of OT Security Management

Historical trends, missteps, and observations for front line OT security practitioners as seen by a global manufacturer’s response to Log4j.

Read more
Webinar

Rising Demand for Attack Surface Management

Learn how to apply Attack Surface Management in industrial environments in an OT-safe and efficient way.

Read more
Video

Ransomware Attacks on the Rise - How Do We Defend?

Hear from a panel of speakers about managing ransomware in the critical infrastructure industries.

Read more
Webinar

Following CISAs Guidance to Improve ICS Security

Learn how organizations successfully build consistent cyber practices that address existing and emerging threats.

Read more
Webinar

Asset Inventory: The Foundation to a Successful OT Security Program

Regardless of where you are in your security maturity journey, getting asset inventory right is critical to the effectiveness of your program.

Read more
Video

Adopting a Prevention-First Approach to Cybersecurity in Critical Infrastructure

As seen at CS4CA World, this panel aims to discuss a proactive cybersecurity approach for critical infrastructure organizations.

Read more
Video

How to Build a Robust OT Cybersecurity Program

To meet growing regulatory requirements and defend our critical infrastructure from growing attacks, we need an approach that goes beyond perimeter segmentation or network detection.

Read more
Webinar

Taking a Proactive Approach to OT Cybersecurity Protection

The growing threats to our critical infrastructure require a new way of thinking about OT cybersecurity.

Read more
Webinar

Build an effective risk & governance OT security platform

With almost half of the world’s known oil and gas reserves and much of the capacity to process or utilize them, the Middle East and North Africa (MENA) region is a cornerstone of today’s global energy and industrial system. As the region’s energy and utility industries continue to digitalize their assets, they have increasingly become targets of cyber threats. In…

Read more