Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Manufacturing
Securing industrial manufacturing systems, supply chains, and smart factories.
SecurityGate's Ted Gutierrez presents three actionable tactics for enhancing cyber programs across OT, IT and IoT convergence.
Mihirr P Thaker, Yogesh Kulkarni, and Aditya Sarangapani explore threat intelligence for OT security. Learn strategies for asset visibility, cybersecurity resilience, and mitigating risks in legacy systems.
SSH Communications' Eduardo Giancristofaro discusses secure access control solutions enabling digital transformation in OT environments.
Rick Kaun, VP solutions at Verve, shares practical strategies for building resilient OT security, offering insights on implementing effective security programs, proven strategies and efficiency gains in manufacturing environments.
Commanding the IT-OT Convergence is designed for leaders tasked with driving the secure convergence of IT and OT systems. Click continue to start!
Eduardo Giancristofaro, channel development director at SSH Communications Security, discusses how to overcome cybersecurity concerns in digital transformation, focusing on secure access control for production systems.
Engineering Secure ICS and OT Environments is designed for industrial and critical infrastructure technical leaders and technical professionals. Build more secure ICS and OT environments today!
Kaspersky's Georgy Kucherin explores APT41's evolution in 2024, examining their shift from supply chain attacks to targeted operations, new persistence mechanisms and enhanced detection evasion techniques.
Maurice Snoeren examines distinct approaches for protecting OT systems and interfaces, demonstrating effective security strategies for critical control and safety systems.
Learn the basics of Industrial Control Systems (ICS) and Operational Technology (OT) to protect your organization from cybersecurity related threats!
Navigating ICS and OT Compliance is for industrial and critical infrastructure technical leaders and technical professionals. Get the resources you need to implement your ICS and OT cybersecurity compliance strategy today!
"OT Attack!" is a hands-on tabletop simulating cyber-attacks on OT systems.
Chris Johnson, senior director at WSP, presents a structured approach to OT cybersecurity road maps, covering strategic planning, life cycle integration and practical frameworks drawn from real-world infrastructure projects.
John Ballentine, ICS Security Program Manager at Port Authority of New York and New Jersey shares, strategies for managing OT assets in large infrastructure, including monitoring air-gapped systems.
Learn about taming ICS and OT cyber threats to implement more secure cybersecurity risk management strategies today!
WSP's Christopher Johnson examines the evolution of OT-focused security operations centers, highlighting critical differences from traditional IT SOCs.
Yair Attar, CTO and co-founder of Otorio, demonstrates why reactive OT security approaches fall short in large industrial settings. Through an automotive case study, he shows how automated, context-aware strategies can replace manual processes, delivering better protection at lower costs.
Venkatesh Vanjaku of CloudSEK discusses proactive measures for identifying and mitigating software supply chain risks in the modern digital ecosystem.
Antoine d'Haussy, OT security practice head for EMEA, Fortinet, shares insights on implementing SASE and SecOps technologies to protect OT CPS environments, focusing on network security enhancement and real-time monitoring for industrial assets.