Not sure that you need OT Cybersecurity? A Sentryo Assessment can quickly provide the data and guidance that you need
The messages that you are hearing in the industry, from vendors, pundits, governments and others, is that your industrial environment is at risk and under attack and you better do something about it. But what? Where should you start? You don’t know what you don’t know. You suspect that your industrial environment is exposed and vulnerable but how can you be sure? How do you gain visibility and insights into your OT networks security risk posture? If the first step is understanding all of your assets and communications, how do you start? How many devices do you have on your industrial network? What talks to what? What talks to the outside world? Do you have vulnerabilities and weak spots? Is all of your firmware up to date?Watch Now
Access a replay of our past webinars!
Duration: 30 minutesCISOs and Security Managers must collaborate with the industrial world and in particular with the industrial control and automation systems teams.Through return of experience, Sentryo will review the key success factors of effective collaboration between OT and IT teams.Collaboration with the OT teams requires an organizational approach supported by advanced technological tools. Sentryo will show how Artificial Intelligence or Data Visualization can involve many people with various skill-sets in setting up cybersecurity processes within industrial control networks.Discover how Sentryo, named a Gartner Cool Vendor in Industrial IoT and OT security offers an innovative approach dedicated to addressing the issues and threats targeting the Industrial Internet and the security of industrial networks.Replay
Duration: 30 minutesSCADAs and ICS are now an ideal target for cybercriminals. The resultant service interruptions always have far-reaching negative consequences. If these systems are so vital and sensitive, why are they currently so vulnerable? Obsolete workstations, security missing from the protocols and tools design, the internet of things in the plant…In 30 minutes, Laurent Hausermann, co-founder of Sentryo, will explain why ICS & SCADA are vulnerable to cyberattacks.Replay
Duration: 30 minutesUtilities such as electricity and water production and distribution, oil and gas, and transportation systems are controlled by OT technologies and are prime targets for cyber attacks. Subject to governmental regulations (USA, EU and National), these critical industrial sites must integrate cyber security into their processes.Through this webinar and thanks to a customer feedback, learn how a gas transport and storage infrastructure operator tackles the specific challenges of securing his large and distributed industrial network and complies with the applicable regulations with the implementation of an industrial cyber security solution.Replay
Duration: 30 minutesOn December 23rd 2015, the ukrainian power distribution grid was struck by a cyberattack causing several hours of power outages for hundreds of thousands of homes. A year later, on December 18th, 2016, a second cyberattack caused multiple power outages in the Ukrainian capital.With this webinar and thanks to the research carried out by the Security Labs of Sentryo, you will discover the analysis of these two cyberattacks, their scenario and their impacts. You will also discover the technical solutions that critical infrastructure operators can apply to avoid such attacks.Replay