<img src="https://ad.doubleclick.net/ddm/activity/src=9826842;type=pagev0;cat=allsi0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ord=1?" width="1" height="1" alt="">
  • ON-DEMAND WEBINAR

    Unified SOC: Centralized Security Data with OT Visibility for Intelligence Driven Investigations

    Original Air Date: 6/27/24

    Meet the Speakers


    Kai Thomsen - Headshot 400






    Kai Thomesen
    Director, Sr. Service Owner Incident Response Services

    AdamRoeckl-CRWD






    Adam Roeckl
    Sr. Product Marketing Manager

    Sam Van Ryder






    Sam Van Ryder
    Director of Strategic Accounts

    In the face of escalating threats to ICS/OT environments, many industrial organizations lack comprehensive visibility across OT networks and their attack surface, making detections, triage, and response difficult at scale. 

    Security operations teams are breaking the IT/OT silos to arm cybersecurity analysts with context rich ICS/OT asset visibility, threat detection, and vulnerability management by centralizing all security data in one place for full visibility, less complexity, and more efficient investigations. 

    In this On-Demand webinar, experts from CrowdStrike and Dragos discuss unifying the Security Operations Center (SOC), including: 

    • Understanding the importance of OT based visibility and threat detection. 
    • How to correlate assets and logs to scale triage and remediation activities across IT/OT environments. 
    • How SOC analysts can leverage intel-based high-fidelity detections. 
    • Real-world benefits of integrating OT Cybersecurity, IT and OT threat intelligence, endpoint detection and response (EDR), and Next-Gen SIEM for a more holistic Security Operations Center (SOC). 
    LinkedIn - Boston Beer Case Study (1200 x 628 px)
    CASE STUDY
    Boston Beer Transforms OT Cybersecurity & Reduces Costs

    The 7th annual OT Cybersecurity Year in Review report synthesizes the latest OT threat intelligence, vulnerabilities in industrial control systems, and defense mechanisms from the trenches – it’s your blueprint to OT cyber resilience. 

    dragos-servicenow-swimlane-webinar-watch-1200x628-1
    WEBINAR ON-DEMAND
    Filling the OT Visibility Gap: Improve Detection, Response and Vulnerability Management

    During this webinar, Dragos, ServiceNow, and Swimlane discuss strategies for filling the OT visibility gap for enhanced detection, response and vulnerability management across IT and OT environments.

     

    OT-Threat-Intelligence-Webinar-OD-LinkedIn-RN-1200x628
    WEBINAR ON-DEMAND
    Operationalizing OT Threat Intelligence at Dragos – A Rockwell Automation ControlLogix Case Study

    Watch Dragos and Rockwell Automation for this behind-the-scenes look at how we approach this on a regular basis following the disclosure of Rockwell Automation ControlLogix EtherNet/IP (ENIP) communication module vulnerabilities.