Webinars

A Six-Part Security Series: Audit & Compliance and Risk Mitigation

A Team-Based Approach to CyberSecurity: C-Level Executives, General Counsel, and Decision Makers - Security Challenges

Part 1:
A Team-Based Approach to CyberSecurity

C-Level Executives, General Counsel, and Decision Makers – Security Challenges

Security for Electric Utilities and ICS / SCADA Systems

Part 2:
Stop, Drop, and Roll

CyberSecurity Discussion of the NIST Approach / Framework and its Correlation to CIS (CI Security)

Security for Electric Utilities and ICS / SCADA Systems

Part 3:
You Can't Secure What You Can't See

How ITAM Interrelates to NIST/CIS and is the Foundation for Security

Security for Electric Utilities and ICS / SCADA Systems

Part 4:
Stay Ahead of the Curve

Secure Hardware and Software Configuration and Vulnerability Assessments

Security for Electric Utilities and ICS / SCADA Systems

Part 5:
WHO's (logged) ON FIRST?

Administrative Privileges and Audit Logs

Security for Electric Utilities and ICS / SCADA Systems

Part 6:
Detect, Mitigate, Protect - Recover

Tying it All Together