We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

CS4CA USA

Search

Clear Expand Collapse

Are You Ready for Cyberattack? Advancing Incident Response in OT

James Brake, James Goosby, Chris Sistrunk and Amanda Bosco provide essential OT incident response guidance.

Price
Course duration Duration: 1 hour

Auto Remediation in Cybersecurity: Promise vs. Reality for Critical Infrastructure

Syed Belal of Hexagon examines automated remediation in cybersecurity, separating hype from practical reality for critical infrastructure ecosystems.

Price
Course duration Duration: 25 minutes

Automating Zone Segmentation to Protect Industrial Operations

Kevin Holcomb of Cisco discusses software-based segmentation options and virtual segmentation to overcome traditional network modification roadblocks.

Price
Course duration Duration: 25 minutes

Breaking Silos: Integrating IT and OT Security for a Resilient Future

John Ballentine, Sherry Hunyadi, Dave Bang, Todd Beebe, Tony Souza and Andy Krapf explore hybrid cybersecurity approaches for IT-OT integration.

Price
Course duration Duration: 30 minutes

Decentralized by Design: Adopting Zero Trust in Diverse OT Environments

Josh Martin explores flexible zero trust frameworks that adapt to unique industrial settings while providing centralized oversight and control.

Price
Course duration Duration: 30 minutes

Enhancing Energy Grid Security and Resilience Through the RD2C R&D Initiative at PNNL

Jerry Cochran presents cutting-edge research on adaptive resilience capabilities for critical energy infrastructure under cyberattack conditions.

Price
Course duration Duration: 25 minutes

Enhancing Security Through Network Segmentation in OT: Our Experience

Andy Krapf of Loudoun Water shares real-world experience implementing three-layer network segmentation across utility infrastructure operations.

Price
Course duration Duration: 30 minutes

Exploring Effective Risk Assessment and Mitigation Strategies

Central Hudson Gas' Danielle Caruso and City Utilities of Springfield's Brad Wynes discuss adapting risk methodologies to evolving threat landscapes.

Price
Course duration Duration: 30 minutes

Getting the Board Onboard With OT Cybersecurity

Matt Fryer of Fortinet addresses positioning cybersecurity as a business priority and avoiding financial damages from cyberattacks.

Price
Course duration Duration: 35 minutes

In the Eye of the Storm: Practical Wisdom for Surviving a Cyberattack

Brian Foster of Southern California Edison covers shifting from attack prevention to survival strategies for maintaining operations during incidents.

Price
Course duration Duration: 30 minutes

Industrial Cybersecurity From the Ground Up: Integrating Cyber Into New Construction

Ian Bramson of Black & Veatch explores building security into new industrial construction projects using Cyber Asset Lifecycle Management frameworks.

Price
Course duration Duration: 25 minutes

Intelligent Live Cyber Programs: Connected Security for Modern OT Operations

Chris Johnson of WSP explores dynamic program frameworks that replace static documentation with interactive cybersecurity road maps.

Price
Course duration Duration: 15 minutes

Lessons From NIST-CSF Risk-Based OT Cybersecurity Strategy in Critical Infrastructure

John Ballentine of Port Authority of New York and New Jersey shares practical deployment strategies for NIST Cybersecurity Framework in OT.

Price
Course duration Duration: 35 minutes

Lessons Learned in Preparing, Implementing and Operating Third-Party Risk Management Programs

Anthony Perry, Joe Hughes, Bemi Anjous and Nikolai Zlatarev of share insights on building effective third-party risk programs.

Price
Course duration Duration: 50 minutes

Leveraging Legacy OS Backups for Enhanced Security and Understanding

Michael Bova and J.D. Perham of Acronis demonstrate how modern backup solutions enable security scanning and malware detection for legacy OT systems.

Price
Course duration Duration: 25 minutes

Modernizing Security: How to Choose the Right Advanced Solutions

Brian Foster of Southern California Edison, Connie Devine of Excelerate Energy and Roger Caslow of HRSD share insights on vetting security solutions.

Price
Course duration Duration: 30 minutes

OT-to-Cloud Connectivity: What Does a Secure Path Forward Look Like?

Jake Margolis, Dennis Hackney, Lorena Nunes, Tung Nguyen and Blake Gilson outline secure OT-to-cloud strategies.

Price
Course duration Duration: 50 minutes

Real-Life Advice for Unlocking OT Security Budget

Michelle Garcia, Anthony Perry and Logan Nye share proven strategies for securing executive approval and OT security funding.

Price
Course duration Duration: 35 minutes

Reducing the Complexities of Building an Automated Global OT Asset Inventory

Ralph Langner demonstrates how automation streamlines OT asset inventory management, moving beyond manual Excel processes to real-time tracking.

Price
Course duration Duration: 10 minutes

Securing OT: Lessons Learned From Conducting Assessments

Tung Nguyen reveals critical findings from OT security assessments, covering methodology and vulnerability identification in water utility settings.

Price
Course duration Duration: 30 minutes

Security Leadership Strategies in the IT-OT Convergence Era

James Goosby of Auburn University shares documented cyber risk mitigation approaches and building resilient teams in converged environments.

Price
Course duration Duration: 30 minutes

See What You've Been Missing Without Risk-Based Prioritization to OT Risks and Threats

Cheldon Brown of Rockwell Automation reveals how dynamic risk scoring systems enable real-time, contextual risk assessment in industrial environments.

Price
Course duration Duration: 20 minutes

Strengthen Remote Access Security, Increase Engineer and System Productivity

Arshad Massomi shows how Zero Trust Network Access and privileged access management enhance security while maintaining operational efficiency.

Price
Course duration Duration: 25 minutes

Tech Integration for Enhanced OT Data, Asset Visibility and Secure Access

Bill Moore of Xona covers integrating ICS IDS, firewalls, NAC and SIEM for unified infrastructure visibility while optimizing cost-effectiveness.

Price
Course duration Duration: 15 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement