We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

ManuSec Europe

Search

Clear Expand Collapse

Aligning Business & Security Goals

Martin Cullen, Giovanni Vassallo, George Prokopos, Belén Brunet and Matthias Glawe discuss how to develop effective cyber strategies that ensure ROI and align business and security goals.

Price
Course duration Duration: 20 minutes

Automation & Human-Centric Risk Management

Rainer Rodler, Claudio Sangaletti, Jose Seara and Kai Thomsen explore how automation and human-centric approaches can work in synergy for effective cyber risk management in manufacturing plants.

Price
Course duration Duration: 50 mins

Building a Human Firewall for Cyber Awareness

Jonas Rendahl of Aurobay examines strategies to boost the human firewall through increased awareness, training and education while building mental toughness to protect individuals and companies in high-pressure situations.

Price
Course duration Duration: 30 minutes

Building a Successful Business Case for OT Cybersecurity

Stefan Turi of Rockwell Automation shares how to develop a robust business plan that creates momentum, focus and budget for protecting against cyberthreats while making measurable improvements in OT security posture.

Price
Course duration Duration: 30 minutes

Critical Decision-Making: Navigating an OT Cyber Crisis

Ron Yosefi and Ariel Rotman demonstrate a high-stakes war game inspired by real OT incidents, showing how to think quickly, avoid common pitfalls and outsmart adversaries targeting critical systems.

Price
Course duration Duration: 30 minutes

Cybersecurity Platformization in Smart Manufacturing

Tony Hadzima of Palo Alto Networks explores how industrial organizations can navigate cybersecurity challenges in smart manufacturing and why security has become a strategic imperative at leadership levels.

Price
Course duration Duration: 30 minutes

Cybersecurity's Role in Digital Transformation

Massimo Nardone demonstrates how zero trust security principles can be applied to manufacturing environments to enable safer digital transformation with focus on access management challenges.

Price
Course duration Duration: 10 minutes

Enabling Secure & Simple Privileged Remote Access to OT

Ian Cuthbertson of Cyolo demonstrates how a zero-trust approach can simplify user experience while strengthening security controls for privileged remote access to OT environments through real customer examples.

Price
Course duration Duration: 25 minutes

EU AI Act: What It Means for Manufacturing

Ali Baccouche of Texas Instruments provides a holistic view of the EU AI Act implementation guidelines and compliance requirements, covering risk categories and explaining how it applies in practice with clear takeaways.

Price
Course duration Duration: 30 minutes

How Advens OT+IT SOC Secured 2024 Paris Olympic Games

Stéphane Potier reveals how Advens joined forces with French ANSSI to protect the Paris 2024 Olympic Games ecosystem through groundbreaking technological approaches tackling unprecedented infrastructure challenges.

Price
Course duration Duration: 30 minutes

How Mars & Knauf Tackle Risk Through IT-OT Convergence

Frank Polky of Mars and Guillermo Pedezert of Knauf share how they created centers of excellence and implemented targeted solutions that transform security challenges into opportunities for operational improvement.

Price
Course duration Duration: 35 minutes

How to Use Modern Honeypots to Secure ICS Environments

Barbara Hauer of NTT Data and Daniel Buhmann of Fortinet demonstrate why deception technology is a powerful tool for protecting OT infrastructures without requiring AI or machine learning.

Price
Course duration Duration: 25 minutes

IT/OT Convergence: Boosting Cybersecurity

Jonas Rendahl, Ricardo Hormann, Karol Herta, Jan Bau and Will Stefan Roth explore how to overcome cultural barriers between IT/OT teams and establish unified security approaches that respect both domains' strengths.

Price
Course duration Duration: 40 minutes

Navigating OT Asset Management

Ricardo Hormann explores how to navigate the "cycle of chaos and pain" in OT asset management initiatives using Volkswagen Group's journey as a case study for breaking through organizational barriers.

Price
Course duration Duration: 35 minutes

Open Platform to Bridge the Gap Between OT & IT

Sami Petäjäsoja of SensorFleet introduces an open NDR architecture that scales across IT, OT/IoT and cloud environments, with support for multi-vendor deployments to minimize vendor lock-in.

Price
Course duration Duration: 15 minutes

OT Security: Zero Trust With IEC 62443 & NIST

OT Security Expert Tamas Buzgo explores why a zero trust approach is essential for protection against ransomware and malware, and how to ensure zero trust with NIST, ISA 62443 and ISO 27001.

Price
Course duration Duration: 25 minutes

Plant Availability & Cybersecurity

Mirco Kloss of TXOne Networks provides insights on installation-free inspection of assets, on-premises endpoint protection and network protection including virtual patching and segmentation implementation for uninterrupted operations.

Price
Course duration Duration: 25 minutes

Real-World Lessons in OT Risk Assessment

Diego Fernando Guerrero Bautista of Airbus Protect shares valuable lessons from conducting risk assessments across manufacturing, energy and nuclear industries, highlighting key successes and common pitfalls in OT risk management.

Price
Course duration Duration: 30 minutes

Reimagining OT

Tobias Kletz, Simon Heberl, Sebastian Haußmann and Ralf Kovacevic explore how workflow platforms can address critical OT challenges through ServiceNow and Siemens partnership examples.

Price
Course duration Duration: 25 minutes

Risk Management Model in Almirall

Ramón Serres shares how Almirall evolved from qualitative risk assessments to a sophisticated deterministic model balancing long-term process maturity with real-time risk indicators in pharmaceutical manufacturing.

Price
Course duration Duration: 20 minutes

Securing Cyber-Physical Systems for NIS2 Compliance

Ryan Davis of Acronis examines the people, process and technology strategies manufacturing leaders can adopt to protect cyber-physical infrastructure for NIS 2 compliance with focus on recovery measures.

Price
Course duration Duration: 30 minutes

The Role of Vulnerability Management in OT/IT Security

Thomas Becker of AMDT explores why comprehensive vulnerability management that combines prevention with rapid recovery capabilities is essential for today's industrial operations.

Price
Course duration Duration: 15 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement