Watch our collection of webinars to learn about unique solutions to industrial control system cybersecurity challenges.

Webinar: Shadow OT — Keeping the World’s Lights on With the OT Security Add-on for Splunk

This webinar will explain how to shine light on your Shadow OT using Splunk and Industrial Defender.

Webinar: Managing OT Data

Get this webinar recording to learn about the different OT security personas that consume OT data and how they process that data differently.

Webinar: Prepare and Prevent: Using the AESCSF to Prepare for the SLACIP Bill 2022

Watch this webinar recording to learn how critical infrastructure companies in Australia can kickstart an OT security program and use the AESCSF as a model to prepare for future legislation.

Webinar: Why Do Ransomware Gangs Target Private Equity Portfolio Companies?

Register for this webinar to learn how ransomware groups identify their targets and how both private equity firms and their critical infrastructure portfolio companies can evaluate cyber risk and strengthen their security posture.

Webinar: Predicting ICS and OT Cybersecurity Trends in 2022 & Beyond

Watch this webinar to learn what ICS security trends to expect in 2022. Hear from Jim Crowley, Industrial Defender CEO, and Peter Lund, VP Product Management, as they discuss predictions and trends for the 2022 OT cybersecurity landscape.

OT Security 101 Training: How to Get Started

Join our webinar for helpful insights on how to apply foundational OT cybersecurity controls to protect the availability and safety of your ICS environment.

Webinar – Why Hasn’t SOAR Taken Off in OT?

Learn how to enable SOAR in your OT environment and gain access to contextual asset data in this webinar featuring Splunk.

How to Navigate Operational Technology (OT) Cybersecurity in Port Environments

Learn how to manage the complexities of connected OT systems and their cybersecurity needs in port and marine environments.

Webinar – Breaking Down TSA’s Cybersecurity Requirements for Pipeline Operators: What to Do Now

Learn what pipeline operators should do now to deal with this new Security Directive and satisfy TSA’s Pipeline Security Guidelines.

Webinar – Squashing Spreadsheets: How to Orchestrate OEM Patch & Vulnerability Management

Learn how to automate your OEM patch & vulnerability monitoring processes to make smarter patching decisions in this webinar featuring FoxGuard Solutions.

Webinar: What’s Hiding in Your Software? How SBOMs Reduce Supply Chain Risk

Learn how to read and understand a Software Bill of Materials (SBOM) to implement data-driven decisions around supply chain risk reduction.

Webinar: Are You Using MITRE ATT&CK for ICS Correctly?

Learn how ICS asset owners can leverage diverse data collection methods to create a threat-informed defense using the MITRE ATT&CK for ICS Matrix.

Webinar: How to Build a Cybersecurity Strategy for Your Building Management System

Learn the ins and outs of building a cybersecurity strategy for your building management system, including tips for attack prevention and standards implementation.