How to Remediate Log4j and Other Supply Chain Vulnerabilities in OT
Learn how to efficiently safeguard against supply chain vulnerabilities like Log4j without the risk of aggressive scanning.
Read moreSubscribe to stay in the loop with the latest OT cyber security best practices.
Watch the latest videos, webinars, interviews and podcasts by OT/ICS cyber security industry thought leaders.
Learn how to efficiently safeguard against supply chain vulnerabilities like Log4j without the risk of aggressive scanning.
Read moreIn today’s complex industrial organizations, the right cyber security governance structure depends on the culture and existing models in place. Whether you’re just getting started or well on your cyber security journey, governance is foundational in securing critical infrastructure and industrial operations. Download our on-demand webinar to learn how to align IT and OT security initiatives to make progress against…
Read moreThe IEC/ISA 62443 standard is becoming more widespread in usage and application for industrial control systems cybersecurity. In this webinar, we will walk through an introduction to the overall standards and try to help make sense out of different terminology in a practical manner. We will also share practical experiences on how to address these standards and make meaningful progress…
Read moreJohn Livingston discusses best practices for incident response, managing IT security practices in OT environments, and more!
Read moreJohn Livingston and Ryan Zahn share how to protect endpoints leveraging concepts from the 62443 family.
Read moreThis webinar focuses on how to raise awareness of the cyber risk in your industrial environment. Many people see the threats facing their controls systems environments, but do not know how to best raise awareness and mobilize the organization to act. In this webinar, we share experiences in how to create a shared awareness of risks and urgency with IT…
Read moreIn this cyber security webinar, Verve Industrial shares an approach to vulnerability assessments that provide deep, accurate risk perspectives, and the ability to immediately move from assessment to remediation, accelerating the time to security.
Read moreLearn about the emerging set of actors that will drive significant new requirements for IIOT/ICS security in the next 2-3 years.
Read moreExplore various ICS topics through invited speakers while showcasing current capabilities available today.
Read moreWatch Verve review a number of security learnings around setting up and maintaining an OT security compliance program.
Read moreWith cyber-related threats on the rise to our industrial and critical infrastructure, it’s crucial to create an effective strategy to protect OT assets. These assets that control manufacturing processes and infrastructure operations are at higher risk as we see ransomware becoming more prevalent and disruptive. This webinar shares how to align leadership, goals, and resources for a successful cyber security…
Read moreDownload this on-demand webinar to learn how to apply endpoint detection and response in OT environments. Specifically, in this webinar you will learn: – How to gather key endpoint and network data to detect risks and threats – How to enable response, not just detection, in sensitive OT environments – Organization implications for successful MDR in OT
Read more