Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
SecurityGate's Ted Gutierrez presents three actionable tactics for enhancing cyber programs across OT, IT and IoT convergence.
Sergio Trindade of Águas do Tejo Atlântico shares water utility security program insights, focusing on internal strategies and management communication.
Mihirr P Thaker, Yogesh Kulkarni, and Aditya Sarangapani explore threat intelligence for OT security. Learn strategies for asset visibility, cybersecurity resilience, and mitigating risks in legacy systems.
Rick Kaun presents strategies for managing new regulations like NIS2 while strengthening baseline cybersecurity practices through real-world case studies.
Industry leaders Erwin Eimers, Keon McEwen and Lorena Nunes explore the intersection of cybersecurity and operational safety in industrial systems.
SSH Communications' Eduardo Giancristofaro discusses secure access control solutions enabling digital transformation in OT environments.
Mostafa Nassar examines why standard GRC platforms fail in industrial settings and provides strategies for developing OT-specific solutions that integrate with IT frameworks while addressing specialized operational needs.
Rick Kaun, VP solutions at Verve, shares practical strategies for building resilient OT security, offering insights on implementing effective security programs, proven strategies and efficiency gains in manufacturing environments.
Join a conversation with healthtech cybersecurity experts Phil Englert, Patty Ryan, Anahi Santiago and Luisa Soares de Brito in a conversation about managing hospital device security.
Dr. Mohamed Abdur Rahman demonstrates how generative AI can monitor OT operations, detect attacks, block attackers and restore assets to working states, showing how AI-driven tools can fortify OT networks against evolving threats.
Commanding the IT-OT Convergence is designed for leaders tasked with driving the secure convergence of IT and OT systems. Click continue to start!
Eduardo Giancristofaro, channel development director at SSH Communications Security, discusses how to overcome cybersecurity concerns in digital transformation, focusing on secure access control for production systems.
MITRE Labs' Mark Bristow discusses current threat landscape and strategies for efficiently reducing risks to critical infrastructure.
Engineering Secure ICS and OT Environments is designed for industrial and critical infrastructure technical leaders and technical professionals. Build more secure ICS and OT environments today!
Nasser Al-Alawi demonstrates a life cycle-based security assurance approach, exploring best practices for stakeholder engagement, implementing "security walks" and embedding cybersecurity in change management.
FortiGuard Labs' Aamir Lakhani analyzes real-world OT attack cases and honeypot data to reveal cybercriminal tactics, tools and motivations targeting critical infrastructure.
Cavus Batki and Melanie Garson explore protecting assets against state-sponsored threats, examining cyber-physical attacks and analyzing geopolitical impacts on cybersecurity strategies.
Andres Prieto Anton, Sergio Trindade, Trish McGill and Emyr Thomas discuss strategies for embedding cybersecurity awareness in organizational culture and daily operations.
Kaspersky's Georgy Kucherin explores APT41's evolution in 2024, examining their shift from supply chain attacks to targeted operations, new persistence mechanisms and enhanced detection evasion techniques.
Maurice Snoeren examines distinct approaches for protecting OT systems and interfaces, demonstrating effective security strategies for critical control and safety systems.
Andres Prieto Anton of DSM-Firmenich shares insights on designing secure OT systems using zero trust principles and in-depth protection strategies.
Paul Barnes, Malek Abu Tayeh, Asma Habeeb, Dr. Mohamed Abdur Rahman and Jean-Baptiste Abbal discuss presenting risk-based approaches to boards, securing budgets, improving communication and developing compelling business cases for OT security.
Learn the basics of Industrial Control Systems (ICS) and Operational Technology (OT) to protect your organization from cybersecurity related threats!
The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption.
Christian Harter of UPS reveals how they built a proactive OT vulnerability and patch management program across hundreds of automated facilities, sharing key insights on gaining visibility, and overcoming implementation challenges.
Hexagon's Roya Gordon presents case studies demonstrating effective collaboration between cybersecurity and engineering teams in OT environments.
Andreas Östrin and Thomas Bonello Zuliani will discuss the breach's impact, key response measures, and best practices for strengthening security and ensuring business continuity.
Biju Hameed shares insights from two decades in the energy and aviation sectors, focusing on effective communication between IT and OT teams, understanding true convergence, and addressing barriers that create an "illusion of understanding."
Claudio Sangaletti, OT security leader at Medmix, discusses managing increased convergence risks through robust security strategies, addressing future threats and leveraging new standards for enhanced cyber resilience.
Join Phillip Englert and Suzanne Schwartz in a conversation about medical device security.
Navigating ICS and OT Compliance is for industrial and critical infrastructure technical leaders and technical professionals. Get the resources you need to implement your ICS and OT cybersecurity compliance strategy today!
Palo Alto Networks' Robert Albach explores recent regulatory shifts in petrochemical security, including CFATS changes and TSA amendments.
Debbie Lay, principal solutions engineer at TXone Networks, shares best practices for assessing OT cybersecurity posture, vetting external resources and developing holistic solutions for effective threat mitigation in OT environments.
"OT Attack!" is a hands-on tabletop simulating cyber-attacks on OT systems.
Chris Johnson, senior director at WSP, presents a structured approach to OT cybersecurity road maps, covering strategic planning, life cycle integration and practical frameworks drawn from real-world infrastructure projects.
Ron Yosefi shares strategies for managing OT data explosion, prioritizing threats, and maximizing SecOps resources to improve security posture while addressing skill.
SCADAfence's Elad Ben-Meir discusses strategies for managing OT data explosion and transforming security data into actionable insights for improved security posture.
Ben C. Garber, lead solutions engineer at SCADAfence, reveals strategies for navigating the OT data explosion, prioritizing threats and maximizing SecOps resources to improve organizational security posture.
John Ballentine, ICS Security Program Manager at Port Authority of New York and New Jersey shares, strategies for managing OT assets in large infrastructure, including monitoring air-gapped systems.
Ivan Zhekov of TXOne Networks demonstrates how operations-friendly cyber defense solutions provide real-time protection for mission-critical devices and OT networks while ensuring regulatory compliance.
Steve Broadwell of OPSWAT examines strategies for protecting OT networks from APT threats through advanced file and removable media security.
Join John Fahey in a discussion of how to detect threats in healthcare networks early in the kill chain.
Matan Dobrushin explores the transition from passive to active OT asset discovery, sharing real-world applications in protocols like Modbus and DeltaV while addressing NIS2 compliance challenges.
Dominic Storey from Tenable explores practical solutions for managing cyber risk in CPS environments, addressing architecture complexities and real-time performance requirements.
Victor Lough of Schneider Electric outlines life cycle approach for protecting OT assets while maintaining operational availability, focusing on foundational requirements to reduce corporate failure risks.
Braskem's Lorena Nunes shares insights on implementing the "OT Cybersecurity Champions" program to build security culture in industrial environments.
Douglas Santos, director of advanced threat intelligence at FortiGuard Labs, Fortinet, exposes real-world OT attack techniques in manufacturing, revealing how threat actors gain access and bypass security measures.
Learn about taming ICS and OT cyber threats to implement more secure cybersecurity risk management strategies today!
WSP's Christopher Johnson examines the evolution of OT-focused security operations centers, highlighting critical differences from traditional IT SOCs.
Yair Attar, CTO and co-founder of Otorio, demonstrates why reactive OT security approaches fall short in large industrial settings. Through an automotive case study, he shows how automated, context-aware strategies can replace manual processes, delivering better protection at lower costs.
1 2 Next