Recorded: What Lies Beneath - Avoiding the Unseen Dangers of OT Vulnerabilities

Learn best practices to manage OT vulnerabilities

Remember the movie Jaws? On the surface, the ocean seemed quiet and unaffected, but lurking just beneath was a 25-foot great white shark waiting to strike without warning. In today’s power plants and facilities, process control networks (PCNs) have their own sharks swimming just below the surface: vulnerabilities.

In this recorded webinar, Steven Parker, Managing Partner of Archer Security Group and President of Energy Sector Security Consortium (EnergySec), and Scott Hollis, Director of Product Management at PAS, discuss the state of vulnerability management within the power industry and exchange best practices that leading power companies are employing to address risk. 

Key takeaways

  • The state of vulnerability management best practices
  • Vulnerability management gaps and regulatory impacts to organizations
  • Security best practices that address all cyber assets within a power plant

Register to View Recording