Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Join Kevin Fu, Acting Director, Medical Device Cybersecurity, FDA Center for Devices and Radiological Health and Tom Field as they discuss the state of medical device security.
The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption.
Commanding the IT-OT Convergence is designed for leaders tasked with driving the secure convergence of IT and OT systems. Click continue to start!
Uniting Legacy and Emerging OT Security explores the cybersecurity implications of integrating new digital tools into existing infrastructures. Develop strategies to protect both new and legacy systems from vulnerabilities today!
Engineering Secure ICS and OT Environments is designed for industrial and critical infrastructure technical leaders and technical professionals. Build more secure ICS and OT environments today!
Learn about taming ICS and OT cyber threats to implement more secure cybersecurity risk management strategies today!
Learn the basics of Industrial Control Systems (ICS) and Operational Technology (OT) to protect your organization from cybersecurity related threats!
Navigating ICS and OT Compliance is for industrial and critical infrastructure technical leaders and technical professionals. Get the resources you need to implement your ICS and OT cybersecurity compliance strategy today!
Christian Harter of UPS reveals how they built a proactive OT vulnerability and patch management program across hundreds of automated facilities, sharing key insights on gaining visibility, and overcoming implementation challenges.
Yair Attar, CTO and co-founder of Otorio, demonstrates why reactive OT security approaches fall short in large industrial settings. Through an automotive case study, he shows how automated, context-aware strategies can replace manual processes, delivering better protection at lower costs.
Debbie Lay, principal solutions engineer at TXone Networks, shares best practices for assessing OT cybersecurity posture, vetting external resources and developing holistic solutions for effective threat mitigation in OT environments.
Chris Johnson, senior director at WSP, presents a structured approach to OT cybersecurity road maps, covering strategic planning, life cycle integration and practical frameworks drawn from real-world infrastructure projects.
Ben C. Garber, lead solutions engineer at SCADAfence, reveals strategies for navigating the OT data explosion, prioritizing threats and maximizing SecOps resources to improve organizational security posture.
Douglas Santos, director of advanced threat intelligence at FortiGuard Labs, Fortinet, exposes real-world OT attack techniques in manufacturing, revealing how threat actors gain access and bypass security measures.
Jeff Rotberg, strategic partnerships director, and Tim Oroszi, principal security engineer at Tenable, explore how identity serves as the critical connection between IT and OT, transforming risk management approaches.
Rick Kaun, VP solutions at Verve, shares practical strategies for building resilient OT security, offering insights on implementing effective security programs, proven strategies and efficiency gains in manufacturing environments.
Eduardo Giancristofaro, channel development director at SSH Communications Security, discusses how to overcome cybersecurity concerns in digital transformation, focusing on secure access control for production systems.
FortiGuard Labs' Aamir Lakhani analyzes real-world OT attack cases and honeypot data to reveal cybercriminal tactics, tools and motivations targeting critical infrastructure.
Palo Alto Networks' Robert Albach explores recent regulatory shifts in petrochemical security, including CFATS changes and TSA amendments.
WSP's Christopher Johnson examines the evolution of OT-focused security operations centers, highlighting critical differences from traditional IT SOCs.
SSH Communications' Eduardo Giancristofaro discusses secure access control solutions enabling digital transformation in OT environments.
SCADAfence's Elad Ben-Meir discusses strategies for managing OT data explosion and transforming security data into actionable insights for improved security posture.
Braskem's Lorena Nunes shares insights on implementing the "OT Cybersecurity Champions" program to build security culture in industrial environments.
Industry leaders Erwin Eimers, Keon McEwen and Lorena Nunes explore the intersection of cybersecurity and operational safety in industrial systems.
Hexagon's Roya Gordon presents case studies demonstrating effective collaboration between cybersecurity and engineering teams in OT environments.
John Ballentine, ICS Security Program Manager at Port Authority of New York and New Jersey shares, strategies for managing OT assets in large infrastructure, including monitoring air-gapped systems.
Join John Fahey in a discussion of how to detect threats in healthcare networks early in the kill chain.
Join Phillip Englert and Suzanne Schwartz in a conversation about medical device security.
Join a conversation with healthtech cybersecurity experts Phil Englert, Patty Ryan, Anahi Santiago and Luisa Soares de Brito in a conversation about managing hospital device security.
Claudio Sangaletti, OT security leader at Medmix, discusses managing increased convergence risks through robust security strategies, addressing future threats and leveraging new standards for enhanced cyber resilience.
Antoine d'Haussy, OT security practice head for EMEA, Fortinet, shares insights on implementing SASE and SecOps technologies to protect OT CPS environments, focusing on network security enhancement and real-time monitoring for industrial assets.
Victor Lough of Schneider Electric outlines life cycle approach for protecting OT assets while maintaining operational availability, focusing on foundational requirements to reduce corporate failure risks.
Maurice Snoeren examines distinct approaches for protecting OT systems and interfaces, demonstrating effective security strategies for critical control and safety systems.
Ron Yosefi shares strategies for managing OT data explosion, prioritizing threats, and maximizing SecOps resources to improve security posture while addressing skill.
Rick Kaun presents strategies for managing new regulations like NIS2 while strengthening baseline cybersecurity practices through real-world case studies.
Cavus Batki and Melanie Garson explore protecting assets against state-sponsored threats, examining cyber-physical attacks and analyzing geopolitical impacts on cybersecurity strategies.
Andres Prieto Anton, Sergio Trindade, Trish McGill and Emyr Thomas discuss strategies for embedding cybersecurity awareness in organizational culture and daily operations.
Ivan Zhekov of TXOne Networks demonstrates how operations-friendly cyber defense solutions provide real-time protection for mission-critical devices and OT networks while ensuring regulatory compliance.
Matan Dobrushin explores the transition from passive to active OT asset discovery, sharing real-world applications in protocols like Modbus and DeltaV while addressing NIS2 compliance challenges.
Dominic Storey from Tenable explores practical solutions for managing cyber risk in CPS environments, addressing architecture complexities and real-time performance requirements.
Steve Broadwell of OPSWAT examines strategies for protecting OT networks from APT threats through advanced file and removable media security.
Sergio Trindade of Águas do Tejo Atlântico shares water utility security program insights, focusing on internal strategies and management communication.
Adam Paturej of ICCSS explores transforming cybersecurity investments into business value while maintaining critical infrastructure protection.
Andres Prieto Anton of DSM-Firmenich shares insights on designing secure OT systems using zero trust principles and in-depth protection strategies.
MITRE Labs' Mark Bristow discusses current threat landscape and strategies for efficiently reducing risks to critical infrastructure.
SecurityGate's Ted Gutierrez presents three actionable tactics for enhancing cyber programs across OT, IT and IoT convergence.
Mihirr P Thaker, Yogesh Kulkarni, and Aditya Sarangapani explore threat intelligence for OT security. Learn strategies for asset visibility, cybersecurity resilience, and mitigating risks in legacy systems.
Kaspersky's Georgy Kucherin explores APT41's evolution in 2024, examining their shift from supply chain attacks to targeted operations, new persistence mechanisms and enhanced detection evasion techniques.
Venkatesh Vanjaku of CloudSEK discusses proactive measures for identifying and mitigating software supply chain risks in the modern digital ecosystem.
Andreas Östrin and Thomas Bonello Zuliani will discuss the breach's impact, key response measures, and best practices for strengthening security and ensuring business continuity.
1 2 3 Next