Securing the Supply Chain: A Discussion with Pfizer
Securing a global supply chain is an inherently complex endeavor with far-reaching implications — and few examples illustrate this reality better than the lifesaving Pfizer vaccine and medicines being used to combat COVID-19
How Electric Utilities Providers are Powering Up OT Security
OT/IT convergence is expanding the attack surface available to threat actors, a number of which have been attracted to the energy and utilities sector. How do you address the challenge of protecting these increasingly connected environments? Join Senior Vice President Global Customer Success Guilad Regev, who will explain how utilities should manage risks introduced by converged environments.
Understanding and Reducing Risk to Water and Wastewater Utilities
Join us for a roundtable discussing the top cybersecurity challenges facing water utilities, including a lack of asset visibility, secure remote access, and compliance with new regulations, as well as how to best reduce risk in this critical infrastructure sector. Featured speakers include Michael Shum and Cecil McMaster, NYC Environmental Protection, Grant Geyer, Chief Product Officer, Claroty, Janine Nielsen, Rockwell Automation, Judith H Germano, GermanoLaw LLC.
Examining the ICS Risk & Vulnerability Landscape: 2H 2020
Join Chen Fradkin and Sharon Brizinov, Claroty's Research team as they discuss not only the number and severity of industrial cybersecurity vulnerabilities disclosed during 2H 2020, but also emerging trends affecting how security decision makers will tactically and strategically manage risk.
Oldsmar Water Hack Teaches Us About Secure Remote Access
The recent cyberattack against the Oldsmar, Fla., water-treatment facility has put organizations on notice that remote connections to critical infrastructure that are not secure can have devastating public safety implications. In this webinar, Claroty researcher Sharon Brizinov will explain the risks posed by remote desktop-sharing applications frequently preferred for their usability and cost, rather than their security capabilities
Join us for a live webinar presented by Claroty Principal Vulnerability Researcher Sharon Brizinov and Triangle Microworks Senior Applications Engineer Matthew Green to learn more about these challenges in the context of Industroyer malware. Brizinov and Green will share technical details about Industroyer, its objectives in industrial networks, and how it has demonstrated real risk to power grids.
Extending Security Controls to OT Networks with the CrowdStrike-Claroty Joint Solution
Join Claroty and CrowdStrike for a live webinar on how you can benefit from our new partnership that aims to tackle the IT & OT security risks and challenges facing industrial enterprises as they undergo digital transformation
Claroty is a proud sponsor of Rockwell Automation's Automation Fair® At Home, a virtual opportunity to engage with leading OT experts through hands-on labs, training sessions, forums, and presentations.
Join Rei Henigman, Claroty Security Researcher who'll be presenting "The Journey of ICS Project Files - Visibility and Forensics to Exploitability- Many ICS asset inventory methods are in use today, but the most reliable and user-friendly method involves importing project files from the ICS environment’s engineering software.