talk-data.com talk-data.com

Filter by Source

Select conferences and events

Showing 5 results

Activities & events

Title & Speakers Event

Amidst the escalating ransomware and cyber threats, this talk presents a field-tested and proven three-step process developed by Jonathan Pollet and Red Tiger Security to empower senior leadership with clarity regarding OT gaps and connect gaps to an actionable remediation strategy. The process yields a Strategic Roadmap and a multi-year plan for deploying missing technology solutions, updating processes and procedures, and elevating workforce knowledge to mature the OT cybersecurity program, including a budgetary cost estimate with traceability to help secure funding.

ot cybersecurity regulatory compliance strategic roadmapping budgeting industrial control systems
(CS)²AI - Putting Asset Owners in the Driver's Seat: Making the Right Decisions

An OT cybersecurity talk presenting a field-tested three-step process to empower senior leadership to identify OT security gaps and connect them to an actionable remediation strategy. The process yields a Strategic Roadmap with a multi-year plan for deploying missing technology, updating processes, and elevating workforce knowledge, along with a budgeting estimate to help secure funding.

ot cybersecurity industrial control systems security cyber risk management strategic planning budgeting
(CS)²AI - Putting Asset Owners in the Driver's Seat: Making the Right Decisions

Jonathan Pollet and Red Tiger Security present a field-tested three-step process to empower senior leadership to identify gaps in OT security and connect the gaps to an actionable remediation plan. The process yields a Strategic Roadmap with a multi-year plan for deploying missing technology solutions, updating processes, and elevating workforce cybersecurity maturity, along with a budget estimate to secure funding for necessary investments. Drawing on years of hands-on experience across critical infrastructure environments, the talk shares practical techniques and stories from implementing this methodology.

ot cybersecurity industrial control systems cyber risk management
(CS)²AI - Putting Asset Owners in the Driver's Seat: Making the Right Decisions

CLICK HERE to REGISTER for the EVENT

(CS)²AI Online Putting Asset Owners in the Drivers Seat: Making the Right Decisions for your OT Cybersecurity Program

Amidst the escalating ransomware and cyber threats, coupled with the mounting pressure to adhere to evolving regulatory and security standards, executive leaders within organizations reliant on Operational Technology (OT) systems are compelled to articulate their strategic approach to safeguarding their OT systems from increasingly complex threats.

While securing industrial OT systems used to be decentralized and the responsibility of each plant manager, over the past 5 to 10 years, we have seen a noticeable shift in the industry to move the responsibility and ownership of cyber security to the CIO and those in leadership of the business IT cyber security systems. However, due to the inherent differences in technology, personnel, and processes between the business IT environment and industrialized OT systems, a successful leader cannot simply impose their IT cyber security strategy and solutions upon the OT side of the organization without first understanding the unique operating constraints, current technology portfolio, processes in place, and cyber risks prevalent on the OT side.

Jonathan Pollet and his team at Red Tiger Security have developed a field-tested and proven three-step process that empowers senior leadership with clarity regarding the current gaps on the OT side of their organizations and connects the dots to an actionable remediation strategy. This process generates a Strategic Roadmap that not only addresses current security gaps but also delivers a comprehensive multi-year plan for deploying missing technology solutions, updating processes and procedures, and elevating the knowledge of your workforce to enhance the maturity of your OT cyber security program. Going through this process also delivers a budgetary cost estimate with traceability built into the process, which significantly enhances your effectiveness at obtaining the funding needed to make the necessary security investments.

As with many of Pollet’s talks, this one is loaded with plenty of useful meat on the bone from years of experience in the trenches. These practical techniques and tips are also peppered with interesting stories from implementing this methodology in various critical infrastructure industrial environments around the world.

REGISTER HERE NOW

----------------------------------------------------------------------------------------- Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)

All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [https://www.cs2ai.org/](https://www.cs2ai.org/)

Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)

*Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support.

(CS)²AI - Putting Asset Owners in the Driver's Seat: Making the Right Decisions

CLICK HERE to REGISTER for the EVENT

(CS)²AI Online Putting Asset Owners in the Drivers Seat: Making the Right Decisions for your OT Cybersecurity Program

Amidst the escalating ransomware and cyber threats, coupled with the mounting pressure to adhere to evolving regulatory and security standards, executive leaders within organizations reliant on Operational Technology (OT) systems are compelled to articulate their strategic approach to safeguarding their OT systems from increasingly complex threats.

While securing industrial OT systems used to be decentralized and the responsibility of each plant manager, over the past 5 to 10 years, we have seen a noticeable shift in the industry to move the responsibility and ownership of cyber security to the CIO and those in leadership of the business IT cyber security systems. However, due to the inherent differences in technology, personnel, and processes between the business IT environment and industrialized OT systems, a successful leader cannot simply impose their IT cyber security strategy and solutions upon the OT side of the organization without first understanding the unique operating constraints, current technology portfolio, processes in place, and cyber risks prevalent on the OT side.

Jonathan Pollet and his team at Red Tiger Security have developed a field-tested and proven three-step process that empowers senior leadership with clarity regarding the current gaps on the OT side of their organizations and connects the dots to an actionable remediation strategy. This process generates a Strategic Roadmap that not only addresses current security gaps but also delivers a comprehensive multi-year plan for deploying missing technology solutions, updating processes and procedures, and elevating the knowledge of your workforce to enhance the maturity of your OT cyber security program. Going through this process also delivers a budgetary cost estimate with traceability built into the process, which significantly enhances your effectiveness at obtaining the funding needed to make the necessary security investments.

As with many of Pollet’s talks, this one is loaded with plenty of useful meat on the bone from years of experience in the trenches. These practical techniques and tips are also peppered with interesting stories from implementing this methodology in various critical infrastructure industrial environments around the world.

REGISTER HERE NOW

----------------------------------------------------------------------------------------- Becoming a paid member is quick and easy (and helps us keep offering these educational opportunities!). Please join now! [https://www.cs2ai.org/plans-pricing](https://www.cs2ai.org/plans-pricing)

All past seminars and symposiums are available to paid CS2AI.ORG members. Check out the Resources area of our website in the Members Portal [https://www.cs2ai.org/](https://www.cs2ai.org/)

Certificates for Professional Development/Continuing Education Units (PDUs/CEUs) are available for all registered individuals who attend at least one hour of the event.https://www.cs2ai.org/get-involved](https://www.cs2ai.org/get-involved)

*Please note that (CS)²AI Online™ events are provided free of charge as educational career development content through the support of our paid members and the generous contributions of our corporate Strategic Alliance Partners. Contact information used in registering for our directly supported seminars may be shared with sponsors funding those specific events. Unless noted on our Zoom Event registration page, all events are open for direct funding support.

(CS)²AI - Putting Asset Owners in the Driver's Seat: Making the Right Decisions
Showing 5 results