The Machine Monitoring Mandate

In order to watch this video, you have to log in or create an account, if you don't have one yet.
By continuing, you agree that the speakers of this event will have access to the video statistics.

Governments world-wide are increasingly worried about the social unrest that could result from a cybersecurity compromise of critical infrastructure. This has highlighted the fact that the underlying operational technology (OT) is often inadequately protected, and that this must change.

Join experts from KuppingerCole Analysts and cybersecurity firm Claroty for a discussion about the cyber threats to OT, the need to address the issue of industrial cybersecurity, the benefits of OT security, and how to approach compliance with legislation aimed at controlling critical infrastructure.

Graham Williamson, Senior Analyst at KuppingerCole introduces the topic of OT and the trend towards government intervention. He also explains the importance of developing a program to monitor OT systems, detect possible intrusion, and react appropriately.

Max Rahner at Claroty gives an overview of the Claroty solutions that enable device discovery, asset monitoring, secure remote access, and device management.

Language: English • Duration: 56:45 • Resolution: 1920x1080

Learn more about this webinar

Latest Related Videos

More Related Videos

Webcast

Sicherheit in den operativen Systemen der Industrie 4.0

Unter dem Begriff Operational Technology werden die Technologien zusammengefasst, die die Transformation von Waren und Dienstleistungen betreffen, etwa in produzierenden Unternehmen oder bei Energieversorgern (ICS: Industrial Control Systems & SCADA: Supervisory Control and Data…

Webcast

Yariv Lenchner - Securing Privileged Identities in OT (Operational Technology) and Industrial Control Systems

In the last years we see that privileged accounts in Operational Technology (OT) environments (e.g. critical infrastructure) have an even higher importance and criticality than in the traditional IT. OT networks and the Internet of Things (IoT) implementations are taking shape and are being…

Webcast

Jackson Shaw - The Convergence of IT, Operational Technology and the Internet of Things

Did you know that today, there are over 30 billion connected IoT devices? And that in 2020, that number will double? Do you know how these devices connect to the internet? To each other? To their manufacturer? How many IoT devices are used within your company? If you’re a security…

Webcast

Industrial Control System Security: Getting a Grip on OT Cyber Security

Are your operational technology (OT) networks hosting Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems, well secured? For many organizations, the answer is still “no”. Information security generally focuses on Information Technology (IT) networks…

Stay Connected

KuppingerCole on social media

Next Webinar

Webinar

Effective Identity Access Governance in Hybrid SAP Environments

Increased cyber threats and regulatory requirements for privacy and security make staying on top of user roles and access rights in hybrid IT environments more important and challenging than ever, which means it’s important to understand the real risks and how to mitigate them effectively with modern GRC capabilities.

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00