Loading
Rockwell Automation logo

NIST CSF Webinar Series

Successfully secure your plant floor and gain organizational buy-in
Futuristic factory with robot arms and communication network concept. Factory automation. IIoT.

The IIoT has enabled today’s manufacturers to go where no other manufacturers have gone before. Production rates are increasing, capabilities are compounding, and businesses are profiting. With the successes, there are also increased risks. Cybercrime has increased 600% since the start of the pandemic

 reinforcing that a connected plant floor must be a secured plant floor.

The risks are real. A cyberattack that could potentially compromise your production and data is imminent. Come with us on this seven-part journey where veteran cybersecurity specialists will walk you through what you need to know to successfully implement the NIST Cybersecurity Framework on your plant floor and across your organization.

Part One: How to Proactively Protect Against Cyber Threats
Computer coding background with large orange triangle exclamation point alert sign signaling cyber attack
Webinar
Part One: How to Proactively Protect Against Cyber Threats

Using the NIST Cybersecurity Framework (CSF) as a risk-based cybersecurity approach is a way to protect against threats effectively and proactively. This approach gives manufacturers a way to develop cybersecurity risk profiles that represent where they are and then create a map forward to the desired end state for their cybersecurity programs. Join us for part one of our series as we share how you can determine your risk profile, implement effective risk controls, and balance the residual risk. Attendees of this webinar will be given exclusive access to a tool that will quickly identify how they measure up to each area of the NIST CSF. Additional webinars will be provided to discuss each area of the NIST CSF along with actionable steps to improvement in areas where assessment scores were low.

 

Speaker:

Brian Deken – Commercial Manager, Cybersecurity Services, Rockwell Automation

Watch on demand
 
Part Two: How to Identify OT Cybersecurity Risks
Two manufacturing employees wearing hard hats discuss operations while looking at multiple computer screens displaying production data.
Webinar
Part Two: How to Identify OT Cybersecurity Risks

The Identify function of the NIST Cybersecurity Framework is focused on laying the groundwork for an effective cybersecurity program. This function helps in developing an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities. Join us in this webinar to learn where security vulnerabilities exist and how to establish priorities for cybersecurity investments. We will also discuss what capabilities Rockwell Automation offers and how you can get started today.

 

Speaker:

Travis Tidwell – Cybersecurity Sales Executive, Rockwell Automation

watch on demand
 
Part Three: How to Protect Your Organization from Cyberattacks
Open laptop with two hands typing. A blue shield with a lock is displayed above keyboard to symbolize networking and cybersecurity.
Webinar
Part Three: How to Protect Your Organization from Cyberattacks

The Protect function of the NIST Cybersecurity Framework is essential because its purpose is to develop and implement appropriate safeguards to help ensure critical infrastructure services delivery; this function supports the ability to limit or contain the impact of a potential cybersecurity event. Join us in part three of our webinar series to learn what mitigation tactics you can implement to keep your operating systems up to date and secure. We will also discuss what capabilities Rockwell Automation offers to support this function and how to get started.

 

Speaker:

David Lefebvre – Sales Director, Network & Cybersecurity Services-EMEA, Rockwell Automation
Maupert Luigies - Cybersecurity Sales Executive, Rockwell Automation

watch on demand
 
Part Four: How to Detect Cyber Threats in Real Time
Blurred of man engineer works with the tablet in the production control room.Control room of a steam Turbine,Generators of the coal-fired power plant for monitor process, business and industry concept
Webinar
Part Four: How to Detect Cyber Threats in Real Time

The focus of the Detect function of the NIST Cybersecurity Framework is an organization’s ability to discover the full spectrum of cybersecurity threats in a timely manner, get instant alerts on common attacks, and continuously monitor the network for unusual activity. In this webinar we will discuss how Rockwell Automation real-time threat detection services can provide the necessary context to inform security decisions across an enterprise, how you can achieve a shorter time to resolution, and threat detection deployment best practices.

 

Speaker:

Fernando Goncalves – Connected Services Business Development Manager, Rockwell Automation

watch on demand
 
Part Five: How to Mitigate Losses from Cyberattacks
Two manufacturing project engineers in an industrial data center network threat detection and cyber mitigation.
Webinar
Part Five: How to Mitigate Losses from Cyberattacks

The Respond function of the NIST Cybersecurity Framework includes appropriate activities to act on regarding a detected cybersecurity incident; it supports the ability to contain the impact of a potential cybersecurity incident. Rockwell Automation is well positioned to help your organization quickly respond to a cyber incident when it happens, limiting damage, disruption, downtime, and financial losses. In this webinar, learn how to prepare today to make your manufacturing operations more resilient to cyberattacks tomorrow. In this webinar you will learn:

  • Where regulatory compliance requirements can help your cyber resilience efforts
  • How better IT/OT asset visibility will help you survive cyberattacks 
  • What tools and processes will help you stay operational during and after an attack.

 

Speaker:

Sabyasachi Goswami – Connected Services Commercial Leader-Asia Pacific, Rockwell Automation

watch on demand
 
Part Six: How to Restore Operations after a Cyber Incident
Pharmaceutical products. Medical vials standing on the production line of medical drugs against viruses.
Webinar
Part Six: How to Restore Operations after a Cyber Incident

The Recover function of the NIST Cybersecurity Framework refers to developing and implementing a plan to restore normal operations following a cybersecurity event. It also shapes the Identify, Detect, Protect, and Respond functions by looping back data and lessons learned to mitigate the likelihood and impact of future cyber events. In this webinar, we will provide you with a list of actions you can take to get back to your last known good state, so you can restore your operations quickly. We will discuss use cases such as:

  • Creating asset baselines and profiles for each device
  • Historically examining and analyzing device versions and vulnerabilities
  • Automating deployments and upgrades for OT security products

 

Speaker:

Kamil Karmali – Global Commercial Manager, Cybersecurity, Rockwell Automation

watch on demand
 
Part Seven: How to Sell Cybersecurity to Your C-Suite
High angle of content female entrepreneur in elegant clothes explaining business strategy to board of directors while standing near table during meeting
Webinar
Part Seven: How to Sell Cybersecurity to Your C-Suite

Achieving boardroom buy-in for cybersecurity investments is no easy task. Your executives will receive requests for any number of initiatives and projects each week. To make yourself stand out, you must make your presentation compelling and relevant and show your leaders that cybersecurity is a worthwhile investment by speaking their language. This webinar is designed to prepare you with the tools you need to prepare thoroughly; moving security from being a blocker of innovation to an enabler-helping your company move forward safely and securely, while educating your peers along the way.

 

Speaker:

Mark Cristiano – Global Commercial Director, Lifecycle Services, Rockwell Automation

watch on demand
Please update your cookie preferences to continue.
This feature requires cookies to enhance your experience. Please update your preferences to allow for these cookies:
  • Social Media Cookies
  • Functional Cookies
  • Performance Cookies
  • Marketing Cookies
  • All Cookies
You can update your preferences at any time. For more information please see our Privacy Policy
CloseClose