ON-DEMAND WEBINAR
Unified SOC: Centralized Security Data with OT Visibility for Intelligence Driven Investigations
Original Air Date: 6/27/24
Meet the Speakers
Kai Thomesen
Director, Sr. Service Owner Incident Response Services
Adam Roeckl
Sr. Product Marketing Manager
Sam Van Ryder
Director of Strategic Accounts
In the face of escalating threats to ICS/OT environments, many industrial organizations lack comprehensive visibility across OT networks and their attack surface, making detections, triage, and response difficult at scale.
Security operations teams are breaking the IT/OT silos to arm cybersecurity analysts with context rich ICS/OT asset visibility, threat detection, and vulnerability management by centralizing all security data in one place for full visibility, less complexity, and more efficient investigations.
In this On-Demand webinar, experts from CrowdStrike and Dragos discuss unifying the Security Operations Center (SOC), including:
- Understanding the importance of OT based visibility and threat detection.
- How to correlate assets and logs to scale triage and remediation activities across IT/OT environments.
- How SOC analysts can leverage intel-based high-fidelity detections.
- Real-world benefits of integrating OT Cybersecurity, IT and OT threat intelligence, endpoint detection and response (EDR), and Next-Gen SIEM for a more holistic Security Operations Center (SOC).
Boston Beer Transforms OT Cybersecurity & Reduces Costs
The 7th annual OT Cybersecurity Year in Review report synthesizes the latest OT threat intelligence, vulnerabilities in industrial control systems, and defense mechanisms from the trenches – it’s your blueprint to OT cyber resilience.
Filling the OT Visibility Gap: Improve Detection, Response and Vulnerability Management
During this webinar, Dragos, ServiceNow, and Swimlane discuss strategies for filling the OT visibility gap for enhanced detection, response and vulnerability management across IT and OT environments.
Operationalizing OT Threat Intelligence at Dragos – A Rockwell Automation ControlLogix Case Study
Watch Dragos and Rockwell Automation for this behind-the-scenes look at how we approach this on a regular basis following the disclosure of Rockwell Automation ControlLogix EtherNet/IP (ENIP) communication module vulnerabilities.