OT Security Videos & Webinars

Watch the latest videos, webinars, interviews and podcasts by OT/ICS cyber security industry thought leaders.

Strengthening OT Security Through Managed Services

Watch it here
Filter By:
Webinar

Accelerate OT Cyber Security with a Technology-Enabled Vulnerability Assessment

In this cyber security webinar, Verve Industrial shares an approach to vulnerability assessments that provide deep, accurate risk perspectives, and the ability to immediately move from assessment to remediation, accelerating the time to security.

Read more
Video

Challenges of IIoT Cybersecurity: Strategies for Success in a Rapidly Evolving Landscape

Explore effective strategies to tackle emerging challenges in IIoT cybersecurity and stay ahead of evolving threats.

Read more
Video

The Forgotten ICS Endpoint

Explore various ICS topics through invited speakers while showcasing current capabilities available today.

Read more
Video

Navigating the New TSA Directive for Pipelines

Learn key security insights for establishing and managing an OT security compliance program under TSA directives with Verve.

Read more
Webinar

How to Develop an Industrial Cyber Security Strategy

With cyber-related threats on the rise to our industrial and critical infrastructure, it’s crucial to create an effective strategy to protect OT assets. These assets that control manufacturing processes and infrastructure operations are at higher risk as we see ransomware becoming more prevalent and disruptive. This webinar shares how to align leadership, goals, and resources for a successful cyber security…

Read more
Webinar

Dynamic OT Managed Detection & Response

Download this on-demand webinar to learn how to apply endpoint detection and response in OT environments. Specifically, in this webinar you will learn: – How to gather key endpoint and network data to detect risks and threats – How to enable response, not just detection, in sensitive OT environments – Organization implications for successful MDR in OT

Read more
Webinar

The Future of Industrial Cyber Security Compliance

Addressing the coming industrial security compliance challenge: Learnings from 15 years of NERC CIP and other industrial cyber-compliance management. The recent rise of public industrial cyber security incidents is creating a groundswell of regulation across the globe, focused on protecting the world’s critical infrastructure. While each regulatory entity is approaching this in slightly different ways, there are some common learnings…

Read more
Webinar

APAC/Singapore - Think Global but Act Local

SecurityWeek’s ICS Cyber Security Conference is the conference where ICS users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber incidents, analyze their causes and cooperate on solutions.

Read more
Webinar

OT Security: Why Detecting Network Anomalies Isn't Enough

In recent events, such as Colonial Pipeline and MillerCoors, ransomware has maliciously changed process settings, highlighting the growing threats to OT operations from these complex cyber-attacks. When securing the world’s critical infrastructure and manufacturing environments, network anomaly detection is only one component of an overall larger OT security program. Visibility, remediation and protection at the endpoint level is key, to…

Read more
Webinar

Improve OT Security Efficiency & Effectiveness with a Multifunction Platform

It’s no surprise that leading Gartner security analysts say that introducing additional tools adds more complexity into IT and OT security environments. Adopting multifunction platforms provides end-users with simple, but easy-to-manage solutions across all security needs/functions regardless of where organizations find themselves in their cyber security journey and maturity. This webinar aims to explore the efficiency of a centralized data…

Read more
Video

Creating a Programmatic Approach to OT Security

Learn what organizations around the world are doing to reduce OT risk — using methods that are scalable, accurate, and automated.

Read more