Video On Demand
Inside the CrowdStrike/Claroty Joint Solution: A New Approach to ICS Visibility and Threat Detection
Grant Geyer
Nadav Erez
  • Multiple Speakers
  • Grant Geyer
  • Nadav Erez
Runtime: 20:39
Brought to you by:
Digital transformation has shifted the security posture of industrial enterprises and critical infrastructure organizations by connecting previously isolated, operational technology (OT) environments with their information technology (IT) counterparts. These conditions have led to converged IT/OT industrial control system (ICS) networks where threats now have pathways across the once-impenetrable IT/OT boundary. TRITON, NotPetya, and EKANS are among the many recent cyber attacks that underscore the resulting risks. Mitigating these risks and their potential impact on ICS networks is increasingly the responsibility of IT security teams. The challenge is, since the OT environments within such networks are incompatible with traditional IT security tools, they are largely invisible to these teams. The result is an incomplete inventory of IT/OT assets and inability to detect the threats and mitigate the risks they face. Join Claroty to learn more about how to overcome this years-old challenge, including how the Claroty and CrowdStrike joint solution can help you better protect your ICS networks.

Related Videos

Security Strategy, Architecture & Operations Frictionless Zero Trust
Multiple Speakers CrowdStrike 18:01
Security Strategy, Architecture & Operations Metrics That Matter: From SecOps to the Boardroom – Explaining the Risk & Impact on the Company so Everyone Understands
Multiple Speakers Consortium networks 13:14
Security Strategy, Architecture & Operations How Does OT Security Evolve from Bolted On to Built In? Bridging the Relationship Gap to Build a Business-aligned OT Security Program
Doug Clifton EY 30:25