Loading
Webinars

CISO Conversations Provide Cybersecurity Insights

This executive series provides guidance and insights to help your company with its OT cybersecurity journey. Listen on demand, at your convenience.
A woman's hand reaches out toward a virtual lock, indicating cybersecurity
Webinars
CISO Conversations Provide Cybersecurity Insights
This executive series provides guidance and insights to help your company with its OT cybersecurity journey. Listen on demand, at your convenience.
Cybersecurity
    • Overview
    • Overview
    • Overview
    • Zero Trust
    • Zero Trust
    • Identity & Access Management
    • Identity & Access Management
    • IT / OT Convergence
    • IT / OT Convergence
    • CIP Security
    • CIP Security
    • Technology & Certification
    • Technology & Certification
    • Security & LifecycleIQ
    • Security & LifecycleIQ
    • Secure Digital Transformation
    • Secure Digital Transformation
    • NIST Cybersecurity Framework
    • NIST Cybersecurity Framework
    • Overview
    • Overview
    • Overview
    • Managed Services
    • Managed Services
    • Threat Detection
    • Threat Detection
    • Incident Response
    • Incident Response
    • SOC as a Service
    • SOC as a Service
    • IT Cybersecurity Services
    • IT Cybersecurity Services
    • Endpoint Protection
    • Endpoint Protection
    • Overview
    • Overview
    • Overview
    • Critical Infrastructure
    • Critical Infrastructure
    • Life Sciences
    • Life Sciences
    • Automotive
    • Automotive
    • Manufacturing
    • Manufacturing
    • Food & Beverage
    • Food & Beverage
    • Mining
    • Mining
    • Overview
    • Overview
    • Overview
    • Advisories & Support
    • Advisories & Support
    • Design & Planning
    • Design & Planning
    • Network Security
    • Network Security
    • Penetration Testing
    • Penetration Testing
    • Respond & Recover
    • Respond & Recover
    • Risk Assessment
    • Risk Assessment
    • Vulnerability Assessment
    • Vulnerability Assessment
  • World Class Partners
    • Blogs
    • Blogs
    • Press Releases
    • Press Releases
    • Webinars
    • Webinars
    • Whitepapers
    • Whitepapers

In these challenging times, we all have a lot on our minds. But this is not the time to get distracted. Make no mistake about it, cyber threats are just as much of a problem as ever, especially in industrial control system environments. With so much at stake, staying vigilant and connected to the latest insights and strategies has never been more crucial.

For everyone tasked with securing their organization’s manufacturing / operational technology (OT) environments, dialogue with other industry professionals can be beneficial. To assist in the sharing of strategies and successes, the CISO Conversations executive series features industry professionals sharing valuable knowledge designed to help you create a strategy to deal with cybersecurity risks in IT / OT, gain a deeper understanding of how to protect your supply chains from cyber threats, and accurately assess the security of your product and services providers.

Whether your organization is just beginning its OT cybersecurity journey, or well on its way, this special executive series can provide the guidance you need to help you move forward with securing your operations. Join us for these worthwhile conversations.  All sessions are 30 minutes and include time for Q and A.

A Next Generation Development Environment for OT
Man using a tablet is standing inside a factory. Symbols show all the activities he might be doing and how cybersecurity is important for all of them
Webinar
A Next Generation Development Environment for OT

Change in OT development – e.g. programming PLCs – has not kept pace with IT development enhancements of the past decade. It is time for a modern OT development environment that leverages the evolution of IT development best practices. During the current global pandemic, the benefits of virtual environments including efficient collaboration, greater scalability and speed are more apparent than ever. Yet, enterprises that rely on industrial control systems have been reluctant to open connections to cloud environments and reap the benefits of true OT/IT convergence. Join Rockwell Automation’s Dawn Cappelli, VP, Global Security & CISO, John Zepecki, VP, Enterprise Software and Edna Conway, VP/GM of Global Security, Risk and Compliance for Azure, Microsoft as they discuss the potential of the cloud in industrial environments to enhance manufacturing fidelity and stability.

Listen on Demand Now
The Cyber-Minded CEO
A man in a suit uses a tablet to look up financial data
Webinar
The Cyber-Minded CEO

One key to successfully fighting cyberattacks is having the commitment, guidance and support of CEOs and board members who recognize the significance of putting plans and policies in place. Join Rockwell Automation’s Dawn Cappelli, VP, Global Security & CISO, Chris Nardecchia, SVP and CIO, and Blake Moret, CEO and Chairman of the Board as they discuss leading practices to help CISOs and CIOs engage with their CEO and board to create and execute an effective cybersecurity strategy.

Listen on Demand Now
Top 10 List for Securing IT/OT Infrastructure
Collage of cybersecurity icons with a fingerprint in the middle
Webinar
Top 10 List for Securing IT/OT Infrastructure

Recent statistics show that manufacturing is the most targeted sector for cyberattacks. Multiple attack methods are used: attackers compromise IT and move into OT, compromise OT directly, or get in through the supply chain. A holistic cybersecurity strategy for converged IT and OT is imperative. Use this Top 10 list developed by a group of leading security executives to benchmark your IT/OT security strategy. Join Dawn Cappelli, VP, Global Security & Chief Information Security Officer from Rockwell Automation and Roy Gundy, Head of Operational Technology (OT) Cyber Security, Johnson & Johnson, as they discuss how security executives can build and execute an effective IT/OT security.

Listen on Demand Now
How to Apply IEC 62443 to Secure Your Industrial Control Systems Environments
Cityscape with cybersecurity icons indicating secure networks
Webinar
How to Apply IEC 62443 to Secure Your Industrial Control Systems Environments

In order to secure your industrial control system (ICS) operations, you need to use secure products, services, and solutions that are architected and operated securely. IEC 62443 is the recognized certification standard for ICS, but adoption is in its infancy. In this session, Rockwell Automation’s Dawn Cappelli, VP, Global Security & Chief Information Security Officer, joins Rachael Conrad, VP & GM, Customer Support & Maintenance and Shoshana Wodzisz, Rockwell Automation Global Product Security Leader, to discuss what you need to understand about IEC 62443 so that you can secure your ICS environment.

Listen on Demand Now
Secure Remote Access for the Long Term
 Business man uses smartphone with virtual screen padlock and interface icons over the network connection
Webinar
Secure Remote Access for the Long Term

Secure remote access for employees and third-party vendors has become a necessity. But an Industrial Control System network that isn’t adequately protected against cybersecurity threats is a risk to operations. Join Dawn Cappelli, VP and Chief Information Security Officer for Rockwell Automation, and Todd Gurela, Chief Technology Officer, Industry Solutions Group from Cisco in an ISE® fireside chat as they discuss best practices for secure remote access. Learn about the permanent options CISOs and technology leaders have deployed to confirm that access to their network is protected and safe - not only for today, but for the long term.

Listen on Demand Now
Ready to talk to a Rockwell Automation consultant?

We offer industry expertise to help design, implement and support your automation investment.

Contact Us

Recommended For You

Loading
  • Sales
  • Customer Care
  • TechConnect Support
  • General Questions
  1. Chevron LeftChevron Left Home Chevron RightChevron Right
  2. Chevron LeftChevron Left Capabilities Chevron RightChevron Right
  3. Chevron LeftChevron Left Industrial Cybersecurity Solutions Chevron RightChevron Right
  4. Chevron LeftChevron Left CISO Conversations Provide Cybersecurity Insights Chevron RightChevron Right