Event Recording

On the Charge: Securing the Energy Sector

Show description
Speakers
Jerry Onesti
Security Analyst
E.ON
Jerry Onesti
In 2015, after returning from living abroad, Jerry pursued a career in infosec by gaining a vocational degree as an IT security technician. He then joined E.ON in 2020 as a Security Analyst in the CERT Nordic OT team focusing on Threat detection, Threat intelligence, Threat Research and Log...
View profile
Jochen Tösmann
Cyber Security – Resilience and CyberRange Senior Expert
E.ON
Jochen Tösmann
Jochen is working as Resilience and CyberRange-e Senior Expert in the cyber security unit of E.ON. His main focus is to support E.ON’s DSOs during trainings at the CyberRange-e, managing critical suppliers in the OT infrastructure, and consulting E.ON’s regional units in regards to...
View profile
Top related content
Webinar Recording
Industrial Control System Security: Getting a Grip on OT Cyber Security
Mar 06, 2015
Are your operational technology (OT) networks hosting Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems, well secured? For many organizations, the answer is still “no”. Information security generally focuses on Information Technology (IT) networks and systems, not on the OT systems used in manufacturing, utilities and critical industrial infrastructures.
Analyst Chat
Analyst Chat #99: Protecting OT and ICS
Oct 18, 2021

John Tolbert sits down with Matthias and shares his insights into current approaches for protecting and defending essential enterprise systems beyond traditional, often office-focused cybersecurity. Safeguarding Operational Technology (OT), Industrial Control Systems (ICS), and the Industrial Internet of Things (IIoT) is getting increasingly important. John explains that modern approaches like Network Detection and Response (NDR) and especially Distributed Deception Platforms (DDP) can be valuable building blocks in an overall strategy for defending, for example, the factory floor or critical clinical systems.

Event Recording
Panel: Managing Cyber Supply Chain Risks and Achieving Digital Business Resilience
Jun 09, 2020

Businesses face various risks when deploying external products and services. Among them is the possibility of cyber intrusion which can pose a major challenge to the company’s infrastructure and require a re-think of cybersecurity strategy. A well thought-out and properly structured management of a supplier base classified as trustworthy is just as much a part of this discipline as the use of standardized certification procedures for such products. In this panel we will discuss the importance of cyber supply chain risk management (C-SCRM) and its effect on resilience of a digital business.

Event Recording
Challenges, Risks and Rewards of Energy Grid Smartification
May 09, 2023
Event Recording
Securing Industry 4.0: Thoughts on How Established Technologies from IAM and Cybersecurity Can Help
Oct 27, 2021

In his talk, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at security challenges in Industry 4.0 and how established technologies from IAM and cybersecurity might be utilized for improving security. His talk will also cover the wide range of themes to look at from a security perspective in Industry 4.0, including Edge Computing and SASE.

Webinar Recording
The Evolution of Secure Access in Critical Infrastructure
Oct 13, 2023

Join security experts from KuppingerCole Analysts and Cyolo as they discuss how access is evolving and the challenges that brings for OT/ICS/CIS environments. They will look at the potential benefits of technologies such as SIEM, SOAR, ITSM, PAM, IAM and XDR, and concepts such as MFA, ZTA, and ZTNA, as well as ways of reducing risk and meeting insurance requirements.

John Tolbert, Lead Analyst at KuppingerCole will give examples of threats to OT/ICS/CIS environments and the associated risks. He will describe how critical infrastructure differs from general IT, and how IT security tools can help protect it. He will also look at Zero Trust Network Access principles and how they apply.

Kevin Kumpf, Chief OT Strategist at Cyolo will explain the concept of application access, discuss a unified approach to using IT security tools, look at how these tools and process change can help address OT staff shortages, examine the impact of devices such as software PLCs on organizations, and explain how to achieve future-proof secure remote access.

Event Recording
Panel | Industry 4.0 - How to Build a Dynamic Cyber Defence
Nov 11, 2021
Event Recording
BSI Perspective On: Cyberattack Risks for Manufacturing Industries, Operational Technology, Industry 4.0 & Recommended Countermeasures
Nov 10, 2021
Event Recording
Marko Vogel - Cyber Security as Part of Industry 4.0
Dec 18, 2018

 - More aggressive, complex and well organized: Cyber threat landscape on the rise

- Cyber Security – added value for industry 4.0?

- Industry 4.0 needs company-specific security strategies