Videos & Webinars

Watch the latest videos, webinars, interviews and podcasts by OT/ICS cyber security industry thought leaders.

[Webinar] IT is from Mars, OT is from Venus

[Webinar] IT is from Mars, OT is from Venus
Filter By:
Webinar

Get Ready for CMMC: Improve OT Cyber Maturity in 30 Days

Prepare for CMMC compliance by creating a roadmap that improves OT cybersecurity maturity quickly, demonstrates action for your executives, and provides a long-term strategy for effective risk management.

Read more
Video

Raiders of the Lost RTUs, Meters & Valves

A presentation by Ron Brash during the SANS Oil & Gas Summit, 2020

Read more
Event, Webinar January 28, 2021

[Webinar] IT is from Mars, OT is from Venus

Ever feel like your counterparts are from another planet? It doesn't have to be that way!

Read more
Video, Webinar

How to Defend, Detect and Recover from OT Ransomware

With ransomware cyber security attacks on the rise, it’s important to understand why attackers use this method, what its impacts are for an OT/ICS environment, and how to minimize risk for your organization. By 2021, a ransomware attack will take place every 11 seconds. In the last year, 51% of businesses were impacted by ransomware - just ask Maersk, Mondelez, and Honda how painful this experience can be.

Read more
Video

Think Global, Act Local in Industrial OT Security

A presentation by VP Solutions, Rick Kaun during Bsides Calgary 2020

Read more
Video

Top 5 Lessons to Accelerate Your OT/ICS Cyber Security Journey

In this 20 minute session, John Livingston, CEO of Verve Industrial shares practical recommendations on how to improve an organization's OT/ICS cyber security maturity rapidly, efficiently, and safely.

Read more
Video

Why an OT Systems Management Platform Approach is Critical for Converged IT OT

OT security is based on the same foundations as IT security, but out of a fear of disrupting operations, security practitioners have relied on passive detection and/or network protections as their lines of defense. In a world of accelerating ransomware, increased vulnerabilities, and more state actors trying to disrupt operations and/or steal IP, this just isn’t good enough anymore. In this session, Verve will describe the platform approach it has used with manufacturing and critical infrastructure for over a decade.

Read more
Video October 25, 2020

Technical Outcast: IOCs and CVEs in the OT (ep 02)

Join host Steve Ragan as he discusses technology, security, current events, hackers, and anything else that comes to mind with a running cast of characters and their unique insights. In this episode, Steve and Ron talk about operational technologies (OT), and how CVEs are a tricky task to tackle these days. In addition, the two discuss the issues related to Ripple 20 - the collection of zero-day vulnerabilities in a widely used low-level TCP/IP software library developed by Treck, Inc that were disclosed by JSOF.

Read more
Video

John Livingston, CEO at ARC Industry Forum

Learn more on how Verve Industrial Protection can provide unified to security to industrial assets.

Read more
Video

Rick Kaun, VP of Solutions at Cyber Senate

Get insights into the latest on cyber security markets, rise in cyber breaches, and the challenges facing the cyber security industry.

Read more
Video

Cybersecurity Maturity - ARC Orlando Forum

Justin Kosar Of ARC gives a talk. ARC is the leading technology research and advisory firm for industry and infrastructure.

Read more
Webinar

Understanding Embedded Devices and Firmware in OT

URG11 and network stack flaws are not anything new. They are miscreants leftover from the 90’s and early 2000’s – a period where these types of software flaws were rampant.   For the most part, these flaws represent an era where devices lacked proper robustness testing and customers were obligated to trust the vendor’s security practices. While most of these were stranded in a land of security by obscurity or islanded (“air-gapped”), they were eventually retired or rotated out of deployment and into the hands of researchers with ubiquitous network-stack protocol “fuzzers” (a strategy/application where you test all permutations of a protocol to see if there unintended effects or erroneous logic).   Despite these vendors possibly having visibility or reports on these exact issues (or ones like them), stack-based vulnerabilities are commonly forgotten by vendor quality assurance and systems integration processes. Even if these systems are deployed in critical infrastructure, energy, oil & gas, manufacturing, building automation, or are consumer Internet of Things (IoT) products – the same issues are fundamentally present in all types of systems and represent a variable level of opportunity and susceptibility to exploitation by a malicious entity.   This webinar’s topic is a mile wide but will be a technical deep dive on a variety of components in embedded systems. It is intended for IT persons, asset owners, and those looking to understand the complexities of firmware (as they relate to managing vulnerabilities) at a level sufficient for coverage within a 45-minute webinar.

Read more