Government & Private Sector - Working Together for Cybersecurity Protection of Critical Infrastructure
Join this discussion to explore how Government and the Private Sector will need to work together for the protection of Critical Infrastructure in Australia. This session will consider the functional requirements, national and international cyber-attack trends and more
OT-ISAC Digital Series: Cyberattack Implications on OT Network
Join OT-ISAC, CSA, Adm. Rogers and Claroty in an engaging conversation to uncover details of recent cyberattack implications on OT network and what are the key efforts to improve OT cybersecurity posture against these threats.
Deliver Continuous Threat Detection Across Your Enterprise
Learn about how you can deliver continuous threat detection across your enterprise. Rockwell Automation partners with Claroty, the leading industrial cybersecurity platform to provide you proven protection against security threats and long-term support.
Claroty has researched the CIP protocol attack surface from basic CIP to the advanced CIP Security. As part of our research methodology, we assume the attacker role and look for vulnerabilities and other security weaknesses in order to attack industrial equipment and networks that use the CIP protocol. We want to understand what vulnerabilities an attacker would exploit that allow them deeper access into an industrial network, or how they would disrupt or modify processes.
As more organizations strategize around the integration of IT and OT systems and networks, a converged security operations center (SOC) becomes the focal point for visibility and incident response into both realms. In this webinar, Claroty Senior Vice President of Customer Care Guilad Regev and SANS Institute instructor Don Weber will explore this growing trend of an integrated IT/OT SOC.
In this webinar, Admiral (Ret.) Michael S. Rogers joins Claroty experts to explain the implications of ransomware in industrial environments such as Colonial Pipeline’s. The team reviews a few topics such as- how a ransomware attack against IT systems impacts OT networks and processes, what motivates cybercrime groups, and what basic security practices you should have in place to lessen the impact of a ransomware attack.
Securing the Supply Chain: A Discussion with Pfizer
Securing a global supply chain is an inherently complex endeavor with far-reaching implications — and few examples illustrate this reality better than the lifesaving Pfizer vaccine and medicines being used to combat COVID-19
How Electric Utilities Providers are Powering Up OT Security
OT/IT convergence is expanding the attack surface available to threat actors, a number of which have been attracted to the energy and utilities sector. How do you address the challenge of protecting these increasingly connected environments? Join Senior Vice President Global Customer Success Guilad Regev, who will explain how utilities should manage risks introduced by converged environments.
Understanding and Reducing Risk to Water and Wastewater Utilities
Join us for a roundtable discussing the top cybersecurity challenges facing water utilities, including a lack of asset visibility, secure remote access, and compliance with new regulations, as well as how to best reduce risk in this critical infrastructure sector. Featured speakers include Michael Shum and Cecil McMaster, NYC Environmental Protection, Grant Geyer, Chief Product Officer, Claroty, Janine Nielsen, Rockwell Automation, Judith H Germano, GermanoLaw LLC.
Examining the ICS Risk & Vulnerability Landscape: 2H 2020
Join Chen Fradkin and Sharon Brizinov, Claroty's Research team as they discuss not only the number and severity of industrial cybersecurity vulnerabilities disclosed during 2H 2020, but also emerging trends affecting how security decision makers will tactically and strategically manage risk.