-
Industrial managers are more aware than ever of the cyber threats to production safety and reliability. However, OT cybersecurity maturity still lags IT cybersecurity. Maturity levels also often vary widely across sites. Learn how to take a practical, three-step approach to maturing OT cybersecurity throughout your organization.
View now >
-
The shift to remote work within industrial organizations has been underway for some time. COVID-19 has accelerated this shift, but also exposed potential cybersecurity and safety risks. Learn more about remote operations business drivers and current challenges. Hear from companies who have successfully enabled secure, safe remote operations.
View now >
-
“Mind the gap” – an advisory message used in the London Underground subway – reminds passengers to pay attention to the distance between the train and the platform. This same message can also help IT and OT teams better understand the distance between IT and OT cyber forensic analysis and safe restart in a converging IT/OT world.
View now >
-
A type of vulnerability in an OT cybersecurity strategy termed “delicate by design,” poses a great risk since many OT systems contain traits in their configuration schema that can be exploited by threat actors. PAS conducted a statistical analysis on over 50,000 assets to identify common “delicate by design” attributes that increase cybersecurity risks.
View now >
-
Learn how a CISO at a $1.3B electronic materials company successfully converged IT and Operational Technology (OT) teams despite differences in culture, technology, goals, and environment. Hear the challenges she faced, the approach taken, tools used, and what she would do differently if able to do it again.
View now >
-
The last few years in OT cybersecurity have been a wild ride. Despite the many challenges that remain in the OT security world, much good has been achieved. Industrial organizations have generally improved their understanding of OT cyber assets and risk profiles. However, some bad – and even some ugly –issues remain.
View now >
-
Best practices for improving OT cybersecurity are no longer a mystery. In this webinar, learn 8 strategies you can apply today to help your organization optimize its OT cybersecurity posture before an attack occurs and improve your response and recovery after an attack.
View now >
-
Operational Technology (OT) cyber threats are real, but “fixing everything” to protect your organization just isn’t possible. Instead, protecting ICS requires understanding your current threat landscape, recognizing the security architecture for effective defense in your organization, and then determining where to focus first to secure IT and OT endpoints effectively.
View now >
-
This panel discussion with three OT cybersecurity experts dives into critical success factors for effectively managing OT risk while ensuring safe and reliable production within the plant.
View now >
-
[Part 4 of 4] To manage risk in the age of digitalization and Industrie 4.0, ICS security teams must find a balance between digitalization and cybersecurity. Join us as we analyze strategies that OT cybersecurity practicioners in the field recommend.
View now >
-
[Part 3 of 4] Hear from the OT cybersecurity experts: Join us as we share valuable insights from interviews with five industry experts. We’ll cover case studies, best practices, and lessons learned to most effectively secure a plant from cyber attacks.
View now >
-
[Part 2 of 4] We asked industry experts on the frontlines of OT cybersecurity risk mitigation to share practical advice for making control systems more secure. Join us for the second of a four-part webinar series as Mark Carrigan, COO at PAS Global, delves into their real-world insights and lessons learned on how to leverage IT/OT convergence and develop an effective OT cybersecurity program.
View now >
-
[Part 1 of 4] We asked 20 security professionals to share their top three recommendations for securing the industrial control systems that enable safe production in critical infrastructure globally. Join Jason Haward-Grau, CISO at PAS, as he shares those insights and his expertise to inform effective OT risk management strategies.
View now >
-
Even with a good ICS vulnerability management process, most companies struggle to keep up with the myriad ICS alerts and advisories issued by ICS-CERT and automation vendors each month. It is tough to remediate a vulnerability when you don’t know what you have. In this recorded webinar, Sid Snitkin from ARC Advisory Group and Scott Hollis from PAS Global exchange views on the current state of industrial vulnerability management maturity and critique the relative effectiveness of existing approaches.
View now >
-
In today’s power plants and facilities, process control networks (PCNs) have their own sharks swimming just below the surface waiting to strike: vulnerabilities. In this recorded webinar, Steven Parker, Managing Partner of Archer Security Group and President of Energy Sector Security Consortium (EnergySec), and Scott Hollis, Director of Product Management at PAS, discuss the state of vulnerability management within the power industry and exchange best practices that leading power companies are employing to address risk.
View now >
-
What are the top five ICS cybersecurity myths, and are they hindering you from securing your industrial process control environment? Hear from a panel of industry experts as they dive into the top five ICS cybersecurity myths – including air gapping and system complexity effectively provide protection from attack, cybersecurity personnel have visibility into most cyber assets in a facility, and more.
View now >
-
It has become an ongoing debate – does government or self-regulation work better to secure an industry? Which of these two different drivers for industrial control system (ICS) cybersecurity is better? Who is more prepared for the ever-evolving threat landscape facing today’s critical infrastructure? Listen to two industry veterans – one from Power and one from O&G – debate the merits of both approaches. Learn from their experience working within their respective areas and what companies must do to secure process control networks.
View now >
-
Industrial process control facilities need baselines to secure both production and IT-centric endpoints. Baselines allow facilities to monitor more easily the configuration changes that impact security, compliance, governance, and operations. In this webinar, learn how PAS Cyber Integrity's enhanced baseline capabilities significantly reduce the time that engineering and cybersecurity personnel spend investigating and pinpointing configuration changes.
View now >