Videos & Webinars

Watch the latest videos, webinars, interviews and podcasts by OT/ICS cyber security industry thought leaders.

Reviewing 2022 ICS Vulnerabilities: How to Manage Growing Risks

Download it here
Filter By:
Webinar

The Future of Industrial Cyber Security Compliance

Addressing the coming industrial security compliance challenge: Learnings from 15 years of NERC CIP and other industrial cyber-compliance management. The recent rise of public industrial cyber security incidents is creating a groundswell of regulation across the globe, focused on protecting the world’s critical infrastructure. While each regulatory entity is approaching this in slightly different ways, there are some common learnings…

Read more
Webinar

APAC/Singapore - Think Global but Act Local

SecurityWeek’s ICS Cyber Security Conference is the conference where ICS users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber incidents, analyze their causes and cooperate on solutions.

Read more
Webinar

OT Security: Why Detecting Network Anomalies Isn't Enough

In recent events, such as Colonial Pipeline and MillerCoors, ransomware has maliciously changed process settings, highlighting the growing threats to OT operations from these complex cyber-attacks. When securing the world’s critical infrastructure and manufacturing environments, network anomaly detection is only one component of an overall larger OT security program. Visibility, remediation and protection at the endpoint level is key, to…

Read more
Webinar

Improve OT Security Efficiency & Effectiveness with a Multifunction Platform

It’s no surprise that leading Gartner security analysts say that introducing additional tools adds more complexity into IT and OT security environments. Adopting multifunction platforms provides end-users with simple, but easy-to-manage solutions across all security needs/functions regardless of where organizations find themselves in their cyber security journey and maturity. This webinar aims to explore the efficiency of a centralized data…

Read more
Video

Creating a Programmatic Approach to OT Security

Learn what organizations around the world are doing to reduce OT risk — using methods that are scalable, accurate, and automated.

Read more
Video

A Tale of Two Wireless RTUS – Sinking Titanic and Ransoming It

SANS ICS Security Summit 2021 with Ron Brash As a technical follow up to my SANS oil & gas session – tale of the lost RTUs, I am going to discuss how a Software Bill of Materials (SBOM) for two commonly used cellular Remote Terminal Units (RTUs) resulted in disclosures using merely their firmware to guide a research process to…

Read more
Webinar

[Webinar] Achieve CMMC Compliance Maturity

As the DoD’s Cybersecurity Maturity Model Certification (CMMC) gains momentum, it’s important to understand how the standard applies to both OT and IT systems, what compliance entails, and how to meet requirements. Partnering with the DoD’s cybersecurity hub for manufacturing, Verve helped define the necessary capabilities, education, and tools necessary to improve ICS cyber security for the defense industrial base.…

Read more
Video

Supply Chain Cyber Security in ICS

Supply chain cybersecurity in ICS: what’s going on, why it matters, and where we are going

Read more
Video

Rapidly Reduce OT Cyber Risk Through OT Endpoint Management

Hear from Rick Kaun as he shares the OT safe, scalable, accurate, and automated way to rapidly reduce risk in industrial security.

Read more
Video

Reading ICS Advisories & Including Insights into your Cyber Security Program

Sweat it or forget it: An ICS insider’s guide to navigating ICS advisories

Read more
Webinar

Bridging the Divide: Bring IT Security into OT

For 20 years, IT teams have applied foundational techniques to improve IT system security, reliability, lower operating costs, and create better customer satisfaction with IT as an organization. But these types of tools, techniques and processes are missing in OT environments – and for good reason. OT environments are inherently different from IT, requiring a unique approach to systems management.…

Read more