OT Security Videos & Webinars

Watch the latest videos, webinars, interviews and podcasts by OT/ICS cyber security industry thought leaders.

Strengthening OT Security Through Managed Services

Watch it here
Filter By:
Webinar

OT Endpoint Management

Securing Operational Technology (OT) systems is an increasingly important, but challenging task. IT cyber security has had the advantage of building on a strong foundation of IT Systems Management processes and technologies over the past decade or more – and even those assets are often left insecure. Unfortunately for OT environments, processes such as accurate and updated hardware and software…

Read more
Webinar

How to Begin the OT Cyber Security Journey

OT cyber security is not a destination, it’s a journey. While there is no silver bullet or one-size-fits-all approach, effective cyber security programs are composed of people, processes and technology that work together to advance the maturity of an organization’s security over time. With numerous cyber security frameworks and governance models out there, it feels daunting to get started. If…

Read more
Video, Webinar

[Webinar] Enhance Your ICS Security Program with Findings from 10+ Years of Vulnerability Assessments

Verve Industrial aggregated information from ten years of vulnerability assessments across industries ranging from power, pharmaceuticals, CPG manufacturing, water utilities, and oil & gas. Several common themes emerged from the findings, but the most apparent takeaway was the growing need for integrated risk management in ICS security. Across all findings, we’ll share what remediation actions should be applied, how to…

Read more
Video August 31, 2020

Cybersecurity talk with Ron Brash

1. Common threats that exist in OT environment 2. What are some of the practical ways to manage and mitigate the risk in OT environment? 3. Parting comments for fresh graduates looking to make a career move in cybersecurity

Read more
Podcast

CS2IA Podcast on Industrial Cyber Security

An open discussion on the challenges to overcome and insights for achieving your goals in ICS cybersecurity program planning and execution.

Read more