It may be inevitable that sooner or later we will all be the victim of a Cyber-attack. However, that does not mean that we should make it easy for the attackers and do nothing. In this Series of 7 Webinars presented by Rob Sharrock (European Business Development Manager for Cyber Security) and Ben White (UK & Ireland Business Development Manager for Cyber Security), we examine some of the myths and truths around Cybersecurity in the Operational Technology environment and how you can build and apply robust defensive strategies into your Industrial Automation and Control Systems using People, Processes and Products to ensure that Asset Owners stay in control of their plant.
Each of the presentation’s will be approximately 40 minutes followed by Q&A.
We encourage you to attend all 7 Webinars in the series but please feel free to pick and choose the topics of most interest, as a single registration will get you access to all Webinars.
-
Available On Demand to view – Access following registration.
Fit for purpose – The Cyber Security Industrial Automation and Control Systems annual inspection.
This Webinar will discuss why it is essential to carry out a regular inspection on the potential risk to identify vulnerabilities, remediate protection gaps and secure your Industrial Automation Control System from cybersecurity risks.
Topics covered: -
-
Are Cyber threats myth or fact?
-
Who are the threats, inside and outside the organisation?
-
What type of target am I? Am I a more attractive target than other organisations?
-
Now I understand the risk, how does this effect the Industrial Automation Control System? How to assess the security level of existing countermeasures both organisational and technically?
-
Available On Demand to view – Access following registration.
If you're not on the list, you’re not coming in – The Whitelist.
This Webinar will discuss vulnerabilities identified through industry trends where Whitelisting can help to combat as part of a defence-in-depth model.
Topics covered: -
-
Is a whitelist the silver bullet to identify cyber threats?
-
How does whitelisting support a defence-in-depth strategy?
-
Why combine white and blacklisting?
-
How do you implement, manage, and maintain a whitelist on your Industrial Automation Control System?
-
Available On Demand to view – Access following registration.
Dealing with and recovering from a Cyber Attack
This Webinar will examine what follows a cyber-attack and how a Cyber Incident Response Plan, backup and training improve your chances of recovery and loss limitation.
Topics covered: -
-
How do we know what secure looks like?
-
Who do we need – defining roles and responsibilities?
-
Prepare a plan, act and review when circumstances change.
-
Importance of performing a drill and why practice, practice, and more practice.
-
How to prepare for the next threat?
-
Use the plan, know your support and investigate the issue.
-
Available On Demand to view – Access following registration.
To Patch or not to Patch that is the Question.
This Webinar will inform the benefits of a patch management strategy, why they are released, frequency of releases and the reasons for good patch hygiene.
Topics covered: -
-
Myth Busters – Patching explained.
-
Let’s talk about procedure – Is patching really a risk if we know what we’re doing?
-
What is the recommended frequency to apply Patches?
-
Zero Day – Whose updated?
-
The Unpatched vulnerability - how to keep calm and carry on?
-
Available On Demand to view – Access following registration.
One layer at a time … Network Architecture.
This Webinar will discuss network segmentation highlighting the Operational Technology (OT) and Information Technology (IT) layers and the protection needed for interconnecting systems between these layers.
Topics covered: -
-
Social Distancing – Physical separation and securing key Industrial Automation Control Systems Assets.
-
Logical Distancing – Logical separation of Industrial Automation Control System assets into Zones and Conduits.
-
How do you deep clean your network and prepare it for the future?
-
Layering it up – Why do I need a DMZ (demilitarized zone)?
-
Asset Inventory – Do you know your own network?
-
Available On Demand to view – Access following registration.
Living off the LAN … Threat Intelligence.
This Webinar will discuss how proactive use of threat intelligence is becoming more critical to a modern Industrial Automation Control Systems Cyber defence.
Topics covered: -
-
Early response to Cyber threats through proactive monitoring.
-
Evolving threat intelligence at your site.
-
Security Information and Event Monitoring, it’s just a matter of numbers?
-
Network Security Monitoring – who is on the network and what are they doing?
-
Tune, tune, tune.
-
Available On Demand to view – Access following registration.
Planning for Battle – Implementing a Cyber Security Management System
This Webinar will discuss how consultation and assistance with evaluation, testing and implementation support provides the framework to determine the best overall deployment of cybersecurity solutions.
Topics covered: -
-
Do you acknowledge Cyber threats are real?
-
Create an action plan – Objective, Involvement, Resources and Funding.
-
Getting started. What are you first steps to execute a cyber security management system?
-
When is it finished?
Speakers
-
Rob Sharrock
Cybersecurity Manager
Emerson Automation Solutions
-
Ben White
Cybersecurity Manager
Emerson Automation Solutions
-
Darren Greener (Host)
Marketing Manager
Emerson Automation Solutions
Other panel members will join specific topics and available during the Q&A at the end of each Webinar.