Fine-Tuning ICS Threat Models to Prioritize Mitigations of the Most Vulnerable Devices

In order to watch this video, you have to log in or create an account, if you don't have one yet.
By continuing, you agree that the speakers of this event will have access to the video statistics.

When discussing the matters of industrial cybersecurity with IT experts, lamenting the historical divide between OT and IT seems to be a popular topic: you would often hear that the OT engineers are stubbornly ignoring the latest cyberthreats and do not see security as a priority in general.

Language: English • Duration: 56:34 • Resolution: 1280x720

Learn more about this webinar

Latest Related Videos

More Related Videos

Webcast

Analyst Chat #102: Impressions and Insights From the CSLS 2021

From November 9th to 11th, the Cybersecurity Leadership Summit 2021 took place in Berlin and virtually online. The Monday after, Martin Kuppinger and Matthias sat together to talk about some first impressions and insights from this event. The recordings and slide decks are available…

Webcast

Analyst Chat #96: How to Combine Security And Convenience (EIC 2021 Special)

While moderating and speaking at KuppingerCole's flagship EIC 2021 event in Munich, Matthias also took the opportunity to sit down one-on-one with his fellow analysts in the conference studio for some EIC special analyst chat episodes. In the third and final special episode, Martin…

Webcast

Analyst Chat #92: How the Cybersecurity Market Is Evolving

Cybersecurity is one of the areas where virtually every business will need to invest because of ever-growing cyber risks and ever-tightening regulations, and in the post-Covid era, the cybsersecurity market continues to evolve and grow, having gained even greater importance. Warwick Ashford…

Webcast

Analyst Chat #91: Vulnerability Management

Christopher Schütze provides the fundamentals for a pivotal topic in cybersecurity, namely how to create processes and systems for comprehensive and continuously improving vulnerability management. Together with Matthias, he provides an overview of elementary aspects that need to be…

Stay Connected

KuppingerCole on social media

Next Webinar

Webinar

Erfolgreiche IAM-Projekte: Von Best Practices Lernen

Häufig beginnt die Suche nach einer Identity-Lösung mit einem ganz konkreten Schmerzpunkt im Unternehmen. Ein nicht bestandener Compliance-Audit wegen überhöhter Zugriffsberechtigungen, technische Probleme, wegen komplexer Systeme frustrierte User und eine Überforderung des Helpdesk mit Berechtigungsanforderungen und Passwort-Resets sind nur einige der vielen möglichen Ursachen. Selbst nach einer erteilten Budgetfreigabe für die Anpassung der IAM-Landschaft sind die Hürden vielfältig.

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00