Loading
Rockwell Automation Logo

Industrial Cybersecurity Webinar Series

Learn how to assess your risk and secure your organization.
Reserve Your Series Seat Today
Industrial cybersecurity and network connectivity concept
Cybersecurity
      • Overview
      • Overview
      • Zero Trust
      • Identity & Access Management
      • IT / OT Convergence
      • CIP Security
      • Technology & Certification
    • Overview
    • Overview
    • Zero Trust
    • Identity & Access Management
    • IT / OT Convergence
    • CIP Security
    • Technology & Certification
      • Security & LifecycleIQ
      • Secure Digital Transformation
    • Security & LifecycleIQ
    • Secure Digital Transformation
      • Overview
      • Overview
      • Managed Services
      • Threat Detection
      • Incident Response
      • SOC as a Service
      • IT Cybersecurity Services
    • Overview
    • Overview
    • Managed Services
    • Threat Detection
    • Incident Response
    • SOC as a Service
    • IT Cybersecurity Services
      • Overview
      • Overview
      • Critical Infrastructure
      • Life Sciences
      • Automotive
      • Manufacturing
      • Food & Beverage
    • Overview
    • Overview
    • Critical Infrastructure
    • Life Sciences
    • Automotive
    • Manufacturing
    • Food & Beverage
      • Mining
    • Mining
      • Overview
      • Overview
      • Advisories & Support
      • Design & Planning
      • Network Security
      • Penetration Testing
      • Respond & Recover
    • Overview
    • Overview
    • Advisories & Support
    • Design & Planning
    • Network Security
    • Penetration Testing
    • Respond & Recover
      • Risk Assessment
      • Vulnerability Assessment
    • Risk Assessment
    • Vulnerability Assessment
  • World Class Partners
      • Blogs
      • Press Releases
      • Webinars
      • Whitepapers
    • Blogs
    • Press Releases
    • Webinars
    • Whitepapers

An ever-evolving threat landscape and more advanced adversaries highlight the immediate need for a comprehensive, balanced security team that can showcase both offensive and defensive efforts. In partnership with our technology partner Dragos, we have designed a webinar series that will enable today’s executives to understand the tactics needed within their strategies to build a world class cybersecurity program.

Register now for this upcoming three-part webinar series featuring industry-leaders in cybersecurity covering everything from threat intelligence, incident response, and threat hunting.

Manage ICS Cybersecurity Risk
Hands at keyboard with smart phone showing locked login Secure access to user's personal information, secure Internet access, cybersecurity.A person’s hands on laptop keyboard, with a lock symbol superimposed over image, to show information security and encryption
September 1, 2022 1:00 PM CST
Manage ICS Cybersecurity Risk

No manufacturer is fully exempt from a cyberattack. A plant-wide ICS security program is essential to help secure your networks and prevent data breaches.

Join Rockwell Automation and Dragos for the first installment of our cybersecurity webinar series where we will walk through the top five controls all organizations should employ:

  • Develop an ICS/OT Specific Incident Response Plan  
  • Build a defensible architecture
  • Bolster OT monitoring capabilities
  • Prioritize OT vulnerability management 
  • Strengthen remote access authentication

Speakers:

  • Ben Miller – Vice President of Professional Services, Dragos
  • Mark Cristiano - Director of Global Services, Rockwell Automation
Register for Webinar
 
Navigate the OT Cyber Threat Landscape
Group of businesspeople using digital tablet together discussing cybersecurity solutions in front of office building windows
September 29, 2022 1:00 PM CST
Navigate the OT Cyber Threat Landscape

The cyber threat environment is the most volatile it’s ever been. Sift through the noise with the threat intelligence experts at Dragos, and Product Security owners at Rockwell Automation to review the state of the threat landscape for industrial operators in 2022. From ransomware to OT/ICS Specific malware packages like PIPEDREAM, and new product vulnerability releases, understand where security teams should prioritize their efforts, and how to message internally.

Join this webinar and learn:

  • How to increase security awareness throughout the organization
  • Where you should prioritize efforts and investments in protecting your OT
  • How to use threat intelligence and threat hunting to identify risk and advert disaster

Speakers:

  • Sergio Caltagirone – Vice President, Threat Intel, Dragos
  • Tony Baker – CPSO, Rockwell Automation
REGISTER FOR WEBINAR
 
How to Accelerate Digital Transformation Securely
Female POC and man smiling and having a discussion at a table in a conference room
October 6, 2022 1:00 PM CST
How to Accelerate Digital Transformation Securely

Digital transformation is necessary to keep up with the ever-increasing demands placed on the manufacturing industry. However, when embracing a digital plant floor, you also open your infrastructure up to increased cybersecurity risks.

In the third installment of our cybersecurity webinar series, we will cover these five security controls for a World-Class OT Cybersecurity Program:

  1. A Defensible Architecture
  2. Industrial Control Systems (ICS) Network Monitoring
  3. Remote Access Authentication
  4. Key Vuln Management 
  5. ICS/OT IR Plan

Speakers:

  • Robert M. Lee – CEO & Founder, Dragos
  • Blake Moret – CEO, Rockwell Automation
Register for Webinar

To register for all three webinars, please fill out the form below.

You might also be interested in:

Loading
Incident Response
Incident Response
Capabilities
Capabilities
Incident Response
Our incident response team develops action plans that contain breaches & minimize damage. Bolster your security operations here.
Incident Response Retainer Program
Incident Response Retainer Program
Blog
Blog
Incident Response Retainer Program
Rockwell Automation and Dragos partnered to offer a joint incident response program that helps our customers take a proactive approach to cybersecurity.
CISO Conversations Provide Cybersecurity Insights
CISO Conversations Provide Cybersecurity Insights
Capabilities
Capabilities
CISO Conversations Provide Cybersecurity Insights
This executive series provides guidance and insights to help your company with its OT cybersecurity journey. Listen on demand, at your convenience.
Please update your cookie preferences to continue.
This feature requires cookies to enhance your experience. Please update your preferences to allow for these cookies:
  • Social Media Cookies
  • Functional Cookies
  • Performance Cookies
  • Marketing Cookies
  • All Cookies
You can update your preferences at any time. For more information please see our Privacy Policy
CloseClose