We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

CS4CA USA

Search

Clear Expand Collapse

Adopting Zero Trust in Diverse OT Environments

Josh Martin explores flexible zero trust frameworks that adapt to unique industrial settings while providing centralized oversight and control.

Price
Course duration Duration: 30 minutes

Advancing Incident Response in OT

James Brake, James Goosby, Chris Sistrunk and Amanda Bosco provide essential OT incident response guidance.

Price
Course duration Duration: 1 hour

Auto Remediation in Cybersecurity

Syed Belal of Hexagon examines automated remediation in cybersecurity, separating hype from practical reality for critical infrastructure ecosystems.

Price
Course duration Duration: 25 minutes

Automating Zone Segmentation to Protect Industrial Operations

Kevin Holcomb of Cisco discusses software-based segmentation options and virtual segmentation to overcome traditional network modification roadblocks.

Price
Course duration Duration: 25 minutes

Connected Security for Modern OT Operations

Chris Johnson of WSP explores dynamic program frameworks that replace static documentation with interactive cybersecurity road maps.

Price
Course duration Duration: 15 minutes

Effective Risk Assessment & Mitigation

Central Hudson Gas' Danielle Caruso and City Utilities of Springfield's Brad Wynes discuss adapting risk methodologies to evolving threat landscapes.

Price
Course duration Duration: 30 minutes

Enhancing Security Through Network Segmentation in OT

Andy Krapf of Loudoun Water shares real-world experience implementing three-layer network segmentation across utility infrastructure operations.

Price
Course duration Duration: 30 minutes

Getting the Board Onboard With OT Cybersecurity

Matt Fryer of Fortinet addresses positioning cybersecurity as a business priority and avoiding financial damages from cyberattacks.

Price
Course duration Duration: 35 minutes

Integrating Cyber Into New Construction

Ian Bramson of Black & Veatch explores building security into new industrial construction projects using Cyber Asset Lifecycle Management frameworks.

Price
Course duration Duration: 25 minutes

Integrating IT & OT Security for a Resilient Future

John Ballentine, Sherry Hunyadi, Dave Bang, Todd Beebe, Tony Souza and Andy Krapf explore hybrid cybersecurity approaches for IT-OT integration.

Price
Course duration Duration: 30 minutes

Integrating Tech for Better OT Visibility & Security

Bill Moore of Xona covers integrating ICS IDS, firewalls, NAC and SIEM for unified infrastructure visibility while optimizing cost-effectiveness.

Price
Course duration Duration: 15 minutes

Lessons in Third-Party Risk Management

Anthony Perry, Joe Hughes, Bemi Anjous and Nikolai Zlatarev of share insights on building effective third-party risk programs.

Price
Course duration Duration: 50 minutes

Modernizing Security

Brian Foster of Southern California Edison, Connie Devine of Excelerate Energy and Roger Caslow of HRSD share insights on vetting security solutions.

Price
Course duration Duration: 30 minutes

NIST-CSF Insights for Risk-Based OT Security

John Ballentine of Port Authority of New York and New Jersey shares practical deployment strategies for NIST Cybersecurity Framework in OT.

Price
Course duration Duration: 35 minutes

OT-to-Cloud Connectivity

Jake Margolis, Dennis Hackney, Lorena Nunes, Tung Nguyen and Blake Gilson outline secure OT-to-cloud strategies.

Price
Course duration Duration: 50 minutes

Practical Wisdom for Surviving a Cyberattack

Brian Foster of Southern California Edison covers shifting from attack prevention to survival strategies for maintaining operations during incidents.

Price
Course duration Duration: 30 minutes

Real-Life Advice for Unlocking OT Security Budget

Michelle Garcia, Anthony Perry and Logan Nye share proven strategies for securing executive approval and OT security funding.

Price
Course duration Duration: 35 minutes

Securing OT: Lessons Learned From Conducting Assessments

Tung Nguyen reveals critical findings from OT security assessments, covering methodology and vulnerability identification in water utility settings.

Price
Course duration Duration: 30 minutes

Security Leadership Strategies in the IT-OT Convergence Era

James Goosby of Auburn University shares documented cyber risk mitigation approaches and building resilient teams in converged environments.

Price
Course duration Duration: 30 minutes

Simplifying Global OT Asset Inventory Automation

Ralph Langner demonstrates how automation streamlines OT asset inventory management, moving beyond manual Excel processes to real-time tracking.

Price
Course duration Duration: 10 minutes

Strengthening Grid Security with PNNL’s RD2C Initiative

Jerry Cochran presents cutting-edge research on adaptive resilience capabilities for critical energy infrastructure under cyberattack conditions.

Price
Course duration Duration: 25 minutes

Stronger Remote Access for Better Productivity

Arshad Massomi shows how Zero Trust Network Access and privileged access management enhance security while maintaining operational efficiency.

Price
Course duration Duration: 25 minutes

Using Legacy OS Backups for Better Security

Michael Bova and J.D. Perham of Acronis demonstrate how modern backup solutions enable security scanning and malware detection for legacy OT systems.

Price
Course duration Duration: 25 minutes

What You're Missing Without OT Risk Prioritization

Cheldon Brown of Rockwell Automation reveals how dynamic risk scoring systems enable real-time, contextual risk assessment in industrial environments.

Price
Course duration Duration: 20 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement