Filter By:

Showing 1-12 of 28
April 19, 2021
Webinar
Securing the Supply Chain: A Discussion with Pfizer

Securing a global supply chain is an inherently complex endeavor with far-reaching implications — and few examples illustrate this reality better than the lifesaving Pfizer vaccine and medicines being used to combat COVID-19

Learn More
March 30, 2021
Webinar
How Electric Utilities Providers are Powering Up OT Security

OT/IT convergence is expanding the attack surface available to threat actors, a number of which have been attracted to the energy and utilities sector. How do you address the challenge of protecting these increasingly connected environments? Join Senior Vice President Global Customer Success Guilad Regev, who will explain how utilities should manage risks introduced by converged environments.

Learn More
March 24, 2021
Webinar
Exploring the OPC Attack Surface

Join Uri Katz as he discusses the recently published research paper “Exploring the OPC Attack Surface,” which is an extensive examination and security analysis of the protocol stack.

Learn More
March 4, 2021
Webinar
Understanding and Reducing Risk to Water and Wastewater Utilities

Join us for a roundtable discussing the top cybersecurity challenges facing water utilities, including a lack of asset visibility, secure remote access, and compliance with new regulations, as well as how to best reduce risk in this critical infrastructure sector. Featured speakers include Michael Shum and Cecil McMaster, NYC Environmental Protection, Grant Geyer, Chief Product Officer, Claroty, Janine Nielsen, Rockwell Automation, Judith H Germano, GermanoLaw LLC.

Learn More
March 3, 2021
Webinar
Examining the ICS Risk & Vulnerability Landscape: 2H 2020

Join Chen Fradkin and Sharon Brizinov, Claroty's Research team as they discuss not only the number and severity of industrial cybersecurity vulnerabilities disclosed during 2H 2020, but also emerging trends affecting how security decision makers will tactically and strategically manage risk.

Learn More
February 24, 2021
Webinar
Oldsmar Water Hack Teaches Us About Secure Remote Access

The recent cyberattack against the Oldsmar, Fla., water-treatment facility has put organizations on notice that remote connections to critical infrastructure that are not secure can have devastating public safety implications. In this webinar, Claroty researcher Sharon Brizinov will explain the risks posed by remote desktop-sharing applications frequently preferred for their usability and cost, rather than their security capabilities

Learn More
December 10, 2020
Webinar
Detecting Cyber Attacks in Substation Networks

Join us for a live webinar presented by Claroty Principal Vulnerability Researcher Sharon Brizinov and Triangle Microworks Senior Applications Engineer Matthew Green to learn more about these challenges in the context of Industroyer malware. Brizinov and Green will share technical details about Industroyer, its objectives in industrial networks, and how it has demonstrated real risk to power grids.

Learn More
December 3, 2020
Webinar
Extending Security Controls to OT Networks with the CrowdStrike-Claroty Joint Solution

Join Claroty and CrowdStrike for a live webinar on how you can benefit from our new partnership that aims to tackle the IT & OT security risks and challenges facing industrial enterprises as they undergo digital transformation

Learn More
November 16, 2020
Virtual
Rockwell Automation Fair @ Home

Claroty is a proud sponsor of Rockwell Automation's Automation Fair® At Home, a virtual opportunity to engage with leading OT experts through hands-on labs, training sessions, forums, and presentations.

Learn More
October 21, 2020
Virtual
Australia- Israel Innovation Summit

Claroty is a proud sponsor of the Australia- Israel Innovation Summit- Stop by our booth to discuss how Claroty can help you with your OT security needs

Learn More
October 15, 2020
Virtual
Fal.con 2020

Join Grant Geyer and Nadav Erez as they take a look inside the CrowdStrike-Claroty joint solution- A new approach to ICS Visibility & Threat Detection

Learn More
September 16, 2020
Virtual
Hack The Capitol

Join Rei Henigman, Claroty Security Researcher who'll be presenting "The Journey of ICS Project Files - Visibility and Forensics to Exploitability- Many ICS asset inventory methods are in use today, but the most reliable and user-friendly method involves importing project files from the ICS environment’s engineering software.

Learn More