Loading
Rockwell Automation Logo

Industrial Cybersecurity Webinar Series

Learn how to assess your risk and secure your organization.
Watch Webinar Series On Demand
Industrial cybersecurity and network connectivity concept
Rockwell Automation Logo
Industrial Cybersecurity Webinar Series
Learn how to assess your risk and secure your organization.
Watch Webinar Series On Demand
Cybersecurity
    • Overview
    • Overview
    • Overview
    • Zero Trust
    • Zero Trust
    • Identity & Access Management
    • Identity & Access Management
    • IT / OT Convergence
    • IT / OT Convergence
    • CIP Security
    • CIP Security
    • Technology & Certification
    • Technology & Certification
    • Security & LifecycleIQ
    • Security & LifecycleIQ
    • Secure Digital Transformation
    • Secure Digital Transformation
    • NIST Cybersecurity Framework
    • NIST Cybersecurity Framework
    • Overview
    • Overview
    • Overview
    • Managed Services
    • Managed Services
    • Threat Detection
    • Threat Detection
    • Incident Response
    • Incident Response
    • SOC as a Service
    • SOC as a Service
    • IT Cybersecurity Services
    • IT Cybersecurity Services
    • Endpoint Protection
    • Endpoint Protection
    • Overview
    • Overview
    • Overview
    • Critical Infrastructure
    • Critical Infrastructure
    • Life Sciences
    • Life Sciences
    • Automotive
    • Automotive
    • Manufacturing
    • Manufacturing
    • Food & Beverage
    • Food & Beverage
    • Mining
    • Mining
    • Overview
    • Overview
    • Overview
    • Advisories & Support
    • Advisories & Support
    • Design & Planning
    • Design & Planning
    • Network Security
    • Network Security
    • Penetration Testing
    • Penetration Testing
    • Respond & Recover
    • Respond & Recover
    • Risk Assessment
    • Risk Assessment
    • Vulnerability Assessment
    • Vulnerability Assessment
  • World Class Partners
    • Blogs
    • Blogs
    • Press Releases
    • Press Releases
    • Webinars
    • Webinars
    • Whitepapers
    • Whitepapers

An ever-evolving threat landscape and more advanced adversaries highlight the immediate need for a comprehensive, balanced security team that can showcase both offensive and defensive efforts. In partnership with our technology partner Dragos, we have designed a webinar series that will enable today’s executives to understand the tactics needed within their strategies to build a world class cybersecurity program.

Register now for this three-part webinar series featuring industry-leaders in cybersecurity covering everything from threat intelligence, incident response, and threat hunting.

Manage ICS Cybersecurity Risk
Hands at keyboard with smart phone showing locked login Secure access to user's personal information, secure Internet access, cybersecurity.A person’s hands on laptop keyboard, with a lock symbol superimposed over image, to show information security and encryption
On Demand
Manage ICS Cybersecurity Risk

No manufacturer is fully exempt from a cyberattack. A plant-wide ICS security program is essential to help secure your networks and prevent data breaches.

Join Rockwell Automation and Dragos for the first installment of our cybersecurity webinar series where we will walk through the top five controls all organizations should employ:

  • Develop an ICS/OT Specific Incident Response Plan  
  • Build a defensible architecture
  • Bolster OT monitoring capabilities
  • Prioritize OT vulnerability management 
  • Strengthen remote access authentication

Speakers:

  • Ben Miller – Vice President of Professional Services, Dragos
  • Mark Cristiano - Director of Global Services, Rockwell Automation
Watch On Demand
 
Navigate the OT Cyber Threat Landscape
Group of businesspeople using digital tablet together discussing cybersecurity solutions in front of office building windows
On Demand
Navigate the OT Cyber Threat Landscape

The cyber threat environment is the most volatile it’s ever been. Sift through the noise with the threat intelligence experts at Dragos, and Product Security owners at Rockwell Automation to review the state of the threat landscape for industrial operators in 2022. From ransomware to OT/ICS Specific malware packages like PIPEDREAM, and new product vulnerability releases, understand where security teams should prioritize their efforts, and how to message internally.

Join this webinar and learn:

  • How to increase security awareness throughout the organization
  • Where you should prioritize efforts and investments in protecting your OT
  • How to use threat intelligence and threat hunting to identify risk and advert disaster

Speakers:

  • Sergio Caltagirone – Vice President, Threat Intel, Dragos
  • Tony Baker – CPSO, Rockwell Automation
Watch On Demand
 
How to Accelerate Digital Transformation Securely
Female POC and man smiling and having a discussion at a table in a conference room
On Demand
How to Accelerate Digital Transformation Securely

Digital transformation is necessary to keep up with the ever-increasing demands placed on the manufacturing industry. However, when embracing a digital plant floor, you also open your infrastructure up to increased cybersecurity risks.

In the third installment of our cybersecurity webinar series, we will cover these five security controls for a World-Class OT Cybersecurity Program:

  1. A Defensible Architecture
  2. Industrial Control Systems (ICS) Network Monitoring
  3. Remote Access Authentication
  4. Key Vuln Management 
  5. ICS/OT IR Plan

Speakers:

  • Robert M. Lee – CEO & Founder, Dragos
  • Blake Moret – CEO, Rockwell Automation
Watch On Demand

To register for all three webinars, please fill out the form below.

You might also be interested in:

Loading