Videos & Webinars

Watch the latest videos, webinars, interviews and podcasts by OT/ICS cyber security industry thought leaders.

[Webinar] How to Achieve IT Security in OT Environments

Download it here
Filter By:
Podcast, Video October 25, 2020

Technical Outcast: IOCs and CVEs in the OT (ep 02)

Join host Steve Ragan as he discusses technology, security, current events, hackers, and anything else that comes to mind with a running cast of characters and their unique insights. In this episode, Steve and Ron talk about operational technologies (OT), and how CVEs are a tricky task to tackle these days. In addition, the two discuss the issues related to…

Read more
Video

John Livingston, CEO at ARC Industry Forum

Learn more on how Verve Industrial Protection can provide unified to security to industrial assets.

Read more
Video

Rick Kaun, VP of Solutions at Cyber Senate

Get insights into the latest on cyber security markets, rise in cyber breaches, and the challenges facing the cyber security industry.

Read more
Video

Cybersecurity Maturity - ARC Orlando Forum

Justin Kosar Of ARC gives a talk. ARC is the leading technology research and advisory firm for industry and infrastructure.

Read more
Webinar

Understanding Embedded Devices and Firmware in OT

URG11 and network stack flaws are not anything new. They are miscreants leftover from the 90’s and early 2000’s – a period where these types of software flaws were rampant. For the most part, these flaws represent an era where devices lacked proper robustness testing and customers were obligated to trust the vendor’s security practices. While most of these were…

Read more
Webinar

Vulnerability Management in OT

Vulnerability management goes beyond threat detection. It safeguards your operational technology (OT) against cyber risks and helps prioritize action for remediation. But where should you start, and how can you ensure safe practices for OT environments? During this webinar, you will learn: The components of a robust OT vulnerability management program How a 360-degree view of your assets provides OT…

Read more
Webinar

Building an OT Cyber Security Roadmap

While there has been significant emphasis on the pursuit of asset inventory as a starting point for many OT cybersecurity programs, asset inventory is the first and most important step in your cybersecurity journey. But many industrial organizations fail to recognize it is only one component of security maturity and end up falling short of their end goal. Hear from…

Read more
Webinar

OT Endpoint Management

Securing Operational Technology (OT) systems is an increasingly important, but challenging task. IT cyber security has had the advantage of building on a strong foundation of IT Systems Management processes and technologies over the past decade or more – and even those assets are often left insecure. Unfortunately for OT environments, processes such as accurate and updated hardware and software…

Read more
Webinar

How to Begin the OT Cyber Security Journey

OT cyber security is not a destination, it’s a journey. While there is no silver bullet or one-size-fits-all approach, effective cyber security programs are composed of people, processes and technology that work together to advance the maturity of an organization’s security over time. With numerous cyber security frameworks and governance models out there, it feels daunting to get started. If…

Read more
Video, Webinar

[Webinar] Enhance Your ICS Security Program with Findings from 10+ Years of Vulnerability Assessments

Verve Industrial aggregated information from ten years of vulnerability assessments across industries ranging from power, pharmaceuticals, CPG manufacturing, water utilities, and oil & gas. Several common themes emerged from the findings, but the most apparent takeaway was the growing need for integrated risk management in ICS security. Across all findings, we’ll share what remediation actions should be applied, how to…

Read more
Video August 31, 2020

Cybersecurity talk with Ron Brash

1. Common threats that exist in OT environment 2. What are some of the practical ways to manage and mitigate the risk in OT environment? 3. Parting comments for fresh graduates looking to make a career move in cybersecurity

Read more
Video

When Numbers Are Scarce

How do we estimate the probability of a cyber attack that hasn’t happened yet?

Read more