Media Summary: Join Roger Hill, Founder of Hillstrong Group Security, and Mike Holcomb, Fellow of Introduction to ISA/IEC 62443 Series of Standards for Dino and Craig reunite to tackle the evolving landscape of industrial

Maximize Ot Cybersecurity With Cutting Edge Strategies And Solutions - Detailed Analysis & Overview

Join Roger Hill, Founder of Hillstrong Group Security, and Mike Holcomb, Fellow of Introduction to ISA/IEC 62443 Series of Standards for Dino and Craig reunite to tackle the evolving landscape of industrial I'm LIVE tomorrow (Tuesday, 10/21) at Noon EDT (New York) talking about the 5 B.A.S.I.C. controls of This video is extracted from a larger video session and is only focused on how one can prepare himself for This Session focuses on the changes that are occurring in the

In Part 4, we cover the first step in securing our ICS/ Welcome to the latest episode of Threat Vector! In this episode, host David Moulton, Director of Thought Leadership, Unit 42, sits ... Join CISA as we delve into the Foundations for Operational Technology (

Photo Gallery

OT Cybersecurity for Beginners: ICS, SCADA & PLC Security Explained (Complete 2026 Guide)
Securing More with Less: Smart OT Cyber Strategies in Lean Times
OT Cybersecurity Masterclass Become a 62443 PRO - 2 Days Certified Training - Day 1
Mastering OT/ICS Cybersecurity — Part 2: Building a ROCK SOLID 62443 Cybersecurity Management System
How to Build an OT Cybersecurity Roadmap? | Segmentation, Remote Access, And One-Way Data Flows
Your OT Cybersecurity Strategy Is Failing: Here's Why
Getting Started in ICS/OT Cyber Security - 20+ Hours - Part 2 (ICS/OT Cyber Security Overview)
What is OT Cyber security in 1 min: IT vs OT in layman terms
Webinar: Roadmap for OT Cybersecurity | 5 Critical Controls for a Successful Security Posture
OT Cyber Tuesday (Ep. 3) - What Are The 5 CRUCIAL Fundamentals of OT Cybersecurity?
OT Security Career Path | How to get ready for OT Cybersecurity
Master OT/ICS Cybersecurity Before It’s Too Late — Part 1: ISA/IEC 62443 Made Simple
Sponsored
Sponsored
View Detailed Profile
OT Cybersecurity for Beginners: ICS, SCADA & PLC Security Explained (Complete 2026 Guide)

OT Cybersecurity for Beginners: ICS, SCADA & PLC Security Explained (Complete 2026 Guide)

Complete crash course on

Securing More with Less: Smart OT Cyber Strategies in Lean Times

Securing More with Less: Smart OT Cyber Strategies in Lean Times

Join Roger Hill, Founder of Hillstrong Group Security, and Mike Holcomb, Fellow of

Sponsored
OT Cybersecurity Masterclass Become a 62443 PRO - 2 Days Certified Training - Day 1

OT Cybersecurity Masterclass Become a 62443 PRO - 2 Days Certified Training - Day 1

Introduction to ISA/IEC 62443 Series of Standards for

Mastering OT/ICS Cybersecurity — Part 2: Building a ROCK SOLID 62443 Cybersecurity Management System

Mastering OT/ICS Cybersecurity — Part 2: Building a ROCK SOLID 62443 Cybersecurity Management System

How do we build a ROCK SOLID 62443

How to Build an OT Cybersecurity Roadmap? | Segmentation, Remote Access, And One-Way Data Flows

How to Build an OT Cybersecurity Roadmap? | Segmentation, Remote Access, And One-Way Data Flows

Prioritizing an

Sponsored
Your OT Cybersecurity Strategy Is Failing: Here's Why

Your OT Cybersecurity Strategy Is Failing: Here's Why

Dino and Craig reunite to tackle the evolving landscape of industrial

Getting Started in ICS/OT Cyber Security - 20+ Hours - Part 2 (ICS/OT Cyber Security Overview)

Getting Started in ICS/OT Cyber Security - 20+ Hours - Part 2 (ICS/OT Cyber Security Overview)

In Part 2, we dive into what exactly is

What is OT Cyber security in 1 min: IT vs OT in layman terms

What is OT Cyber security in 1 min: IT vs OT in layman terms

What is Operational Technology (

Webinar: Roadmap for OT Cybersecurity | 5 Critical Controls for a Successful Security Posture

Webinar: Roadmap for OT Cybersecurity | 5 Critical Controls for a Successful Security Posture

Managing your organizational

OT Cyber Tuesday (Ep. 3) - What Are The 5 CRUCIAL Fundamentals of OT Cybersecurity?

OT Cyber Tuesday (Ep. 3) - What Are The 5 CRUCIAL Fundamentals of OT Cybersecurity?

I'm LIVE tomorrow (Tuesday, 10/21) at Noon EDT (New York) talking about the 5 B.A.S.I.C. controls of

OT Security Career Path | How to get ready for OT Cybersecurity

OT Security Career Path | How to get ready for OT Cybersecurity

This video is extracted from a larger video session and is only focused on how one can prepare himself for

Master OT/ICS Cybersecurity Before It’s Too Late — Part 1: ISA/IEC 62443 Made Simple

Master OT/ICS Cybersecurity Before It’s Too Late — Part 1: ISA/IEC 62443 Made Simple

Are you looking to master ICS/

Connecting the Dots - An Effective Cybersecurity Strategy

Connecting the Dots - An Effective Cybersecurity Strategy

Presenters: Dimitry Shvartsman, Head of

What is OT | What are OT Cyber Security Challenges | OT Security Solutions | What is  ICS and SCADA

What is OT | What are OT Cyber Security Challenges | OT Security Solutions | What is ICS and SCADA

This Session focuses on the changes that are occurring in the

Getting Started in ICS/OT Cyber Security - 20+ Hours - Part 4 (Secure Network Architecture)

Getting Started in ICS/OT Cyber Security - 20+ Hours - Part 4 (Secure Network Architecture)

In Part 4, we cover the first step in securing our ICS/

Balancing Security with Usability in Cybersecurity

Balancing Security with Usability in Cybersecurity

Welcome to the latest episode of Threat Vector! In this episode, host David Moulton, Director of Thought Leadership, Unit 42, sits ...

Smart OT Cybersecurity From C-Suite To Strategy | Operational Technology

Smart OT Cybersecurity From C-Suite To Strategy | Operational Technology

The

CISA’s OT Cybersecurity Webinar: Foundational Steps for Building an OT Asset Inventory

CISA’s OT Cybersecurity Webinar: Foundational Steps for Building an OT Asset Inventory

Join CISA as we delve into the Foundations for Operational Technology (