We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

CS4CA Europe

Search

Clear Expand Collapse

A Road Map for Securing Our IT/OT Architecture

Sergio Trindade of Águas do Tejo Atlântico shares water utility security program insights, focusing on internal strategies and management communication.

Price
Course duration Duration: 30 minutes

Adapting to New Regulations While Improving OT Security

Rick Kaun presents strategies for managing new regulations like NIS2 while strengthening baseline cybersecurity practices through real-world case studies.

Price
Course duration Duration: 30 minutes

Developing a Human-Centric Approach to Cybersecurity

Malcolm Xavier explores converting human vulnerabilities into strengths through security awareness, digital literacy and staff motivation strategies.

Price
Course duration Duration: 30 minutes

Ensuring a Human-Centric Approach to Cybersecurity

Trish McGill, Gregory Blezard MBE and Marta Majtenyi explore strategies to promote human-centric cybersecurity while protecting against burnout. Session addresses communication, training, and building positive digital culture across organizations.

Price
Course duration Duration: 45 minutes

Fostering Cyber Resilience Amid Geopolitical Instability

Cavus Batki and Melanie Garson explore protecting assets against state-sponsored threats, examining cyber-physical attacks and analyzing geopolitical impacts on cybersecurity strategies.

Price
Course duration Duration: 30 minutes

How Can We Create a Culture of Security Throughout Society?

Andres Prieto Anton, Sergio Trindade, Trish McGill and Emyr Thomas discuss strategies for embedding cybersecurity awareness in organizational culture and daily operations.

Price
Course duration Duration: 35 minutes

How to Protect OT the OT Way

Maurice Snoeren examines distinct approaches for protecting OT systems and interfaces, demonstrating effective security strategies for critical control and safety systems.

Price
Course duration Duration: 30 minutes

How to Use Systems Thinking to Prioritize Risk Understanding

Gregory Blezard, head of BISO at ScottishPower Renewables, explores how systems thinking revolutionizes cybersecurity risk management.

Price
Course duration Duration: 35 minutes

How We Can Build a Resilient OT Security Architecture

Andres Prieto Anton of DSM-Firmenich shares insights on designing secure OT systems using zero trust principles and in-depth protection strategies.

Price
Course duration Duration: 25 minutes

Implementing a Zero Trust Architecture for System Security

Jay Moloo of DB Schenker discusses implementing zero trust architecture in OT environments through network segmentation and modern standards.

Price
Course duration Duration: 30 minutes

Managing the Future of OT Security

Claudio Sangaletti, OT security leader at Medmix, discusses managing increased convergence risks through robust security strategies, addressing future threats and leveraging new standards for enhanced cyber resilience.

Price
Course duration Duration: 25 minutes

Navigating the Evolving Regulatory Landscape

Thomas Mortsell examines strategies for NIS2 implementation and adapting to new European regulations while ensuring comprehensive organizational security.

Price
Course duration Duration: 30 minutes

OT Security 2.0: CS4CA Europe 2024

Ron Yosefi shares strategies for managing OT data explosion, prioritizing threats, and maximizing SecOps resources to improve security posture while addressing skill.

Price
Course duration Duration: 25 minutes

OT-Native Security for Industrial Digital Transformation

Ivan Zhekov of TXOne Networks demonstrates how operations-friendly cyber defense solutions provide real-time protection for mission-critical devices and OT networks while ensuring regulatory compliance.

Price
Course duration Duration: 20 minutes

Overcoming a Breach to Our Supply Chain’s Cybersecurity

Michel Harthoorn, Maurice Snoeren, Anton Shipulin, and Dave White discuss collaborative response strategies to supply chain attacks, focusing on risk management and regulatory compliance.

Price
Course duration Duration: 35 minutes

Overcoming Regulatory Fatigue

Thomas Mortsell, Adam Paturej, Philipp Amann and Antoine d'Haussy discuss pragmatic strategies for implementing multiple EU regulations while maintaining security and operational efficiency.

Price
Course duration Duration: 35 minutes

Real-Time OT Network Protection for Data & Media

Steve Broadwell of OPSWAT examines strategies for protecting OT networks from APT threats through advanced file and removable media security.

Price
Course duration Duration: 25 minutes

Revolutionizing OT Asset Visibility With Discovery

Matan Dobrushin explores the transition from passive to active OT asset discovery, sharing real-world applications in protocols like Modbus and DeltaV while addressing NIS2 compliance challenges.

Price
Course duration Duration: 30 minutes

Risk-Based Vulnerability Management for CPS

Dominic Storey from Tenable explores practical solutions for managing cyber risk in CPS environments, addressing architecture complexities and real-time performance requirements.

Price
Course duration Duration: 30 minutes

Sustaining Cybersecurity Across the Asset Life Cycle

Victor Lough of Schneider Electric outlines life cycle approach for protecting OT assets while maintaining operational availability, focusing on foundational requirements to reduce corporate failure risks.

Price
Course duration Duration: 30 minutes

Taking Cover With Self-Learning AI

Ian Bramson, VP of global industrial cybersecurity at Black & Veatch, reveals how self-learning AI is reshaping cloud security defense.

Price
Course duration Duration: 30 minutes

Turning IT/OT Cyber Strategies into Business RO

Adam Paturej of ICCSS explores transforming cybersecurity investments into business value while maintaining critical infrastructure protection.

Price
Course duration Duration: 30 minutes

Unified SASE & Security in Cyber-Physical Systems

Antoine d'Haussy, OT security practice head for EMEA, Fortinet, shares insights on implementing SASE and SecOps technologies to protect OT CPS environments, focusing on network security enhancement and real-time monitoring for industrial assets.

Price
Course duration Duration: 40 minutes

Vendor-Agnostic Zero Trust Remote Operations in Maritime

Billy Moore explores centralized secure access solutions for maritime OT systems, addressing IACS requirements and critical infrastructure protection.

Price
Course duration Duration: 25 minutes

Why Collaboration Is Key to Our Cyber Strategies

Melanie Garson, Steven Rumbold, Philipp Amann and Michel Harthoorn explore public-private partnerships and information sharing initiatives for enhanced threat detection and incident response.

Price
Course duration Duration: 35 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement