Securing Operational Technology (OT) systems is an increasingly important, but challenging task. IT cyber security has had the advantage of building on a strong foundation of IT Systems Management processes and technologies over the past decade or more – and even those assets are often left insecure. Unfortunately for OT environments, processes such as accurate and updated hardware and software inventory, patch management, configuration hardening, user and account management, etc. do not exist. This is due to a range of factors from skill-gaps to sensitive OT environments. To truly secure these systems, simply monitoring and detecting threats is not enough. We must conduct the other critical elements of security such as identification, protection and response. This requires overcoming these endpoint management challenges. The good news is there is a way. Download this on-demand webinar to learn a practical approach to applying many of the same best practice IT principles into the OT environment and hear a real-world example of an operator bringing the appropriate skills, technology and processes to enable similar endpoint risk management to OT as to IT.Read more
Videos & Webinars
Watch the latest videos, webinars, interviews and podcasts by OT/ICS cyber security industry thought leaders.
[Webinar] IT is from Mars, OT is from Venus[Webinar] IT is from Mars, OT is from Venus
OT cyber security is not a destination, it’s a journey. While there is no silver bullet or one-size-fits-all approach, effective cyber security programs are composed of people, processes and technology that work together to advance the maturity of an organization’s security over time. With numerous cyber security frameworks and governance models out there, it feels daunting to get started. If you’re unsure where/how to begin, who should be involved, what the most important things to tackle first are, or how OT security differs from IT security, you’ve come to the right place.Read more
[Webinar] Enhance Your ICS Security Program with Findings from 10+ Years of Vulnerability Assessments
Verve Industrial aggregated information from ten years of vulnerability assessments across industries ranging from power, pharmaceuticals, CPG manufacturing, water utilities, and oil & gas. Several common themes emerged from the findings, but the most apparent takeaway was the growing need for integrated risk management in ICS security. Across all findings, we’ll share what remediation actions should be applied, how to determine which assets are most critical to reduce the risk to operations, and how to sequence activities to increase cyber security maturity over time. Download our on-demand webinar to discover how to achieve the greatest risk reduction for the time and money available.Read more