Navigating Exposures in Energy ICS Environments

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Cyber risks in critical energy sectors – including power, oil and gas, water, and renewables – have significantly increased in recent years due to the activity of nation-state actors and cybercriminal groups.
 
In particular, many of these sectors' Industrial Control System (ICS) devices are connected to the Internet and vulnerable to threats like unauthorized access, manipulation, and ransomware.

In this 30-minute webinar, a Censys expert will share new ICS exposure and trends as well as provide actionable defensive strategies such as continuous asset discovery and monitoring.

The session aims to give energy industry professionals the knowledge and tools they need to manage ICS risks in an increasingly connected world.

Join this webinar to learn:

  • The current trends in internet-facing ICS device exposures
  • How to gain visibility into different types of ICS exposures today
  • Strategies to mitigate cyber risks in these devices

Speakers

Photo of James Coker

James Coker

Deputy Editor, Infosecurity Magazine

Photo of Celestine Jahren

Celestine Jahren

Director of Strategic Alliances, Censys

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Censys here: https://censys.com/privacy-policy/. Please see Infosecurity Magazine’s privacy policy for more information.