OT Security Videos & Webinars

Watch the latest videos, webinars, interviews and podcasts by OT/ICS cyber security industry thought leaders.

Strengthening OT Security Through Managed Services

Watch it here
Filter By:
Video

Think Global, Act Local in Industrial OT Security

A presentation by VP Solutions, Rick Kaun during Bsides Calgary 2020

Read more
News, Podcast December 6, 2020

Ron Brash: Problem Fixer in Critical Infrastructure [OT]

Ron Brash joined The CyberWire podcast to discuss how he started his career in industrial cyber security, what he’s working on now, and advice for others in ICS security.

Read more
Video

Top 5 Lessons to Accelerate Your OT/ICS Cyber Security Journey

In this 20 minute session, John Livingston, CEO of Verve Industrial shares practical recommendations on how to improve an organization’s OT/ICS cyber security maturity rapidly, efficiently, and safely. What to Expect This webinar focuses on the nuts and bolts of making a programmatic cyber security approach effective. You will learn how to: Deliver IT security requirements while ensuring OT/ICS reliability…

Read more
Webinar

Why an OT Systems Management Platform Approach is Critical for Converged IT OT

OT security is based on the same foundations as IT security, but out of a fear of disrupting operations, security practitioners have relied on passive detection and/or network protections as their lines of defense. In a world of accelerating ransomware, increased vulnerabilities, and more state actors trying to disrupt operations and/or steal IP, this just isn’t good enough anymore. In…

Read more
News, Podcast November 11, 2020

Increasing Threats to OT/ICS Assets Need a Robust Cybersecurity Program

What is OT systems management and why is it so critical to protecting our critical infrastructure? What are the necessary controls to ensure ICS/OT cybersecurity? A comprehensive program includes a range of controls and design efforts, In this podcast, industry leaders will discuss the challenges and requirements of protecting Operating Information Technology systems, which includes the need for establishing OT…

Read more
Podcast, Video October 25, 2020

Technical Outcast: IOCs and CVEs in the OT (ep 02)

Join host Steve Ragan as he discusses technology, security, current events, hackers, and anything else that comes to mind with a running cast of characters and their unique insights. In this episode, Steve and Ron talk about operational technologies (OT), and how CVEs are a tricky task to tackle these days. In addition, the two discuss the issues related to…

Read more
Video

John Livingston, CEO at ARC Industry Forum

Learn more on how Verve Industrial Protection can provide unified to security to industrial assets.

Read more
Video

Rick Kaun, VP of Solutions at Cyber Senate

Get insights into the latest on cyber security markets, rise in cyber breaches, and the challenges facing the cyber security industry.

Read more
Video

Cybersecurity Maturity - ARC Orlando Forum

Justin Kosar Of ARC gives a talk. ARC is the leading technology research and advisory firm for industry and infrastructure.

Read more
Webinar

Understanding Embedded Devices and Firmware in OT

URG11 and network stack flaws are not anything new. They are miscreants leftover from the 90’s and early 2000’s – a period where these types of software flaws were rampant. For the most part, these flaws represent an era where devices lacked proper robustness testing and customers were obligated to trust the vendor’s security practices. While most of these were…

Read more
Webinar

Vulnerability Management in OT

Vulnerability management goes beyond threat detection. It safeguards your operational technology (OT) against cyber risks and helps prioritize action for remediation. But where should you start, and how can you ensure safe practices for OT environments? During this webinar, you will learn: The components of a robust OT vulnerability management program How a 360-degree view of your assets provides OT…

Read more
Webinar

Building an OT Cyber Security Roadmap

While there has been significant emphasis on the pursuit of asset inventory as a starting point for many OT cybersecurity programs, asset inventory is the first and most important step in your cybersecurity journey. But many industrial organizations fail to recognize it is only one component of security maturity and end up falling short of their end goal. Hear from…

Read more