ON-DEMAND WEBINAR
Filling the OT Visibility Gap: Improve Detection, Response and Vulnerability Management
Original Air Date: 5/29/24
Meet the Speakers
Phil Tonkin
Field CTO
Robert Rash
Product Director
Jay Spann
Senior Solutions Engineer
As industrial infrastructure organizations continue their digital transformation journeys, expanding network connectivity and process efficiencies, adversaries can now target both IT and Operational Technology (OT) networks.
In light of the continued integration of these networks, cybersecurity analysts not only need to understand what IT and OT threats exist but can monitor, detect and respond to threats across their IT and OT environments to reduce their mean time to recover (MTTR).
During the webinar, experts from ServiceNow, Swimlane and Dragos discuss filling the OT visibility gap, including:
- Improving OT network monitoring, threat detection and vulnerability management through automation, workflows, and Incident Response.
- Enable ICS/OT corrected, automated enriched, and prioritized guidance that allows customers to manage the entire lifecycle of specific vulnerabilities.
- Providing well-established workflows that equate to improved business efficiencies and a more effective response program when performing incident response across both networks.
Boston Beer Transforms OT Cybersecurity & Reduces Costs
The 7th annual OT Cybersecurity Year in Review report synthesizes the latest OT threat intelligence, vulnerabilities in industrial control systems, and defense mechanisms from the trenches – it’s your blueprint to OT cyber resilience.
2023 OT Cybersecurity Year in Review
Not ready for all the in-depth data that the Year in Review report provides? The Dragos OT Cybersecurity Executive Summary gives you just the highlights from this year’s report to help you stay ahead of cyber attacks and protect your business operations in 2024.
Operationalizing OT Threat Intelligence at Dragos – A Rockwell Automation ControlLogix Case Study
Watch Dragos and Rockwell Automation for this behind-the-scenes look at how we approach this on a regular basis following the disclosure of Rockwell Automation ControlLogix EtherNet/IP (ENIP) communication module vulnerabilities.