Webinars

  • Recorded Webinar: The Power of Regulation Versus Well-Oiled Industry Standards


    It has become an ongoing debate – does government or self-regulation work better to secure an industry? The power industry is currently on NERC CIP Version 6 of its regulatory requirements with future regulations expected on supply chain security. Oil & Gas (O&G) has no such regulatory regime, but does have standards that it uses to reduce cybersecurity risk, such as NIST 800-82 and IEC 62443. For O&G, compliance is an internally generated activity. Which of these two different drivers for industrial control system ... View >

  • Recorded Webinar: See Through the Noise with Industrial Control System Configuration Baselines


    Industrial process control facilities need baselines to secure both production- and IT-centric endpoints. Baselines allow facilities to monitor more easily the configuration changes that impact security, compliance, governance, and operations. By focusing on the configuration data deemed most critical, Cyber Integrity’s enhanced baseline capabilities significantly reduce the time that engineering and cybersecurity personnel spend investigating and pinpointing configuration changes.   Cyber Integrity uniquely addresses the p... View >

  • Recorded Webinar: How Do We Move to a Production-Centric Cybersecurity Model?


    Successful industrial control system (ICS) cybersecurity programs are carefully planned, progressively implemented, and consistently maintained.  Best practices prescribe an “inside-out” defense-in-depth approach that moves from perimeter-based monitoring and protection to automatically inventorying and securing the proprietary systems most responsible for production and safety.  Companies that include these systems in a comprehensive cybersecurity program reduce cyber risk and sustainability costs.Resources are a c... View >

  • Recorded Webinar: ICS Cybersecurity - What You Do Not Know Can Hurt You


    Careers end when security breaches make the news. Doing nothing is not an option. You can’t solely rely on air gaps or firewalls to protect your production environment from increasingly sophisticated attack vectors. And of course, there are internal threats you need to guard against - sabotage and inadvertent engineering changes.In this webinar, we discuss how plant personnel, OT engineering, and corporate IT can reach beyond the limitations of today’s IT-centric solutions and adopt a more production-centric approach to ICS c... View >

  • Recorded Webinar: ICS Cybersecurity - You Cannot Secure What You Cannot See


    In this session, we discuss requirements for a comprehensive, evergreen cyber asset inventory as prescribed by ICS-CERT to provide the necessary foundation for effective operational and cyber risk management. We explore the required elements of a layered defense cyber security program and examine three documented cybersecurity scenarios that illustrate how having a proper inventory can remediate cybersecurity breaches before they affect productivity, safety, or company liability. View >

  • Recorded Webinar: Three Things You Need to Know to Ace Your Cybersecurity Report Card


    Hosted by POWER Magazine, in this webinar, we’ll explore the takeaways and case studies that illustrate how leaders in the Power industry are addressing compliance and cybersecurity standards. We’ve gathered a panel of industry leaders to discuss emerging best practices, and the top three considerations for ensuring secure, safe, and compliant operations.  View >

  • Recorded Webinar: Determine Company-Wide Exposure to Published ICS Vulnerability in Minutes


    (1 in 3 Series) When you get call from corporate asking what the enterprise exposure is to a newly published ICS-CERT vulnerability, how long will it take you to assess the threat? How accurate will your answer be? Can you monitor for exposure to that vulnerability in the future? Find out how you can know within minutes whether that vulnerability applies to your plant. View >

  • Recorded Webinar: Detect an Unauthorized Change to an SIS Using Cyber Integrity


    (2 in 3 Series) Find out how operations personnel can receive alerts when an unauthorized configuration change occurs (in this case, an SIS) and how you can remediate the change and validate within an audit ready system. View >

  • Recorded Webinar: Automate NERC CIP V5 Testing Using Cyber Integrity


    (3 in 3 Series) Find out how Cyber Integrity automates change control and configuration management through tracking for all modifications to critical change assets (hardware or software) and ports, services, and programs. View >

  • Recorded Webinar: A Cybersecurity Checkup for the Power Industry


    We are getting closer to the July deadline for NERC CIP v6. While we’ve come a long way, we have much further to go before we reach ICS cybersecurity standards that ensure industry reliability goals. After the December 2015 Ukrainian attack in which 225,000 people lost power due to a malicious attack, we should all be asking have we done enough to prevent a similarly successful attack on our own operations? Hosted by EnergyCentral, in this session, Chuck Tickles and David Zahn as they delve into this question and several timely to... View >

  • Recorded Webinar: ICS Inventory Discovery: The First Step in Implementing ICS Cybersecurity


    (1 in 3 series) As the saying goes, “You can’t manage what you don’t measure.” This especially applies to security for industrial control systems. Many organizations do not have a reliable inventory of equipment at the process control layer, simply because it is a time-intensive and manual process that requires precious engineering resources.  The effort is often passed over with the hopes that protecting the perimeter will protect the core.    The increase in the number of attacks on industrial con... View >

  • Recorded Webinar: ICS Cyber Threat Assessment: How Vulnerable Are You?


    (2 in 3 series) Once an organization implements an inventory discovery process, the next step is to identify and prioritize cyber security controls based on potential risk. No amount of security control completely eliminates risk.  Rather, the proper application of cybersecurity controls reduces residual risk to an acceptable level for the business.    The stakes are high for industries with process control networks, as the consequences of a successful cyber attack can be particularly devastating – resulting in lost ... View >

  • Recorded Webinar: ICS Cybersecurity: What Happens when the Eggshell Breaks


    (3 in 3 series) Are you aware that your critical proprietary automation infrastructure is still at risk – even if you’ve implemented firewalls, intrusion detection systems, and whitelisting protection?  Current cybersecurity practices focus mostly on the perimeter of our control systems – much like the shell of an egg.  Once through the shell, an intruder can compromise the entire control system.  Guarding the perimeter is not enough.   A centralized configuration management program for industrial co... View >