20 subscribers
Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


The Security Sandbox | Evolving Endpoint Security in OT
Manage episode 431702190 series 2792612
Traditionally, operational technology (OT) operators have shied away from active monitoring methods, driven largely by concerns over system disruption and OEM vendor validation expectations. However, the tide appears to be turning. Over the past few years, we’ve seen mindsets evolving from relying on a 100% passive approach to embracing more active monitoring methods to get deeper asset context, including configuration information, log files, user activity correlation, USB insertions, and even operational data from level 0 in a PLC.
During this session, we'll delve into the advancements in OT-safe proactive monitoring and how you could apply some of these latest developments towards securing your critical infrastructure while ensuring operational continuity and compliance.
Chapters
1. Recording Started (00:00:00)
49 episodes
Manage episode 431702190 series 2792612
Traditionally, operational technology (OT) operators have shied away from active monitoring methods, driven largely by concerns over system disruption and OEM vendor validation expectations. However, the tide appears to be turning. Over the past few years, we’ve seen mindsets evolving from relying on a 100% passive approach to embracing more active monitoring methods to get deeper asset context, including configuration information, log files, user activity correlation, USB insertions, and even operational data from level 0 in a PLC.
During this session, we'll delve into the advancements in OT-safe proactive monitoring and how you could apply some of these latest developments towards securing your critical infrastructure while ensuring operational continuity and compliance.
Chapters
1. Recording Started (00:00:00)
49 episodes
All episodes
×
1 The Security Sandbox | Hello 2025: How Al, Zero Trust & Proactive Defense Are Shaping Cybersecurity's Future 29:44

1 The Security Sandbox at the ICS Cybersecurity Conference 19:44

1 The Security Sandbox | Ensuring Operational Availability & Safety with Unified Cyber Threat Intelligence 32:31

1 The Security Sandbox | Modernizing Cyber Risk Management in OT 31:42

1 The Security Sandbox | Evolving Endpoint Security in OT 31:23

1 The Security Sandbox | AI to the Rescue: Protecting Critical Assets Using the Cloud 32:14

1 What is Incident Response? | Nozomi Networks 42:56

1 What is Threat Detection? | Nozomi Networks 37:26

1 What is Zero Trust Security? I Nozomi Networks 22:53

1 What is Cyber Risk Management? | Nozomi Networks 37:10


1 Cyber and Operational Resilience for Smart Factories 1:00:32

1 OT Network Security Challenges in Enterprise Environments 1:02:40

1 Monitoring & Protecting Assets in Critical Infrastructure 1:03:05

1 In a World of Unsecure IoT - Is Privacy Dead? 1:02:04
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.