Discover Security Events in Iot Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
3 days from now
Evolving drone capabilities are creating new risks for critical infrastructure, airports, and national security, prompting a shift in how homeland defense is approached. Recent drone incursions highlight gaps in domain awareness, response speed, and existing assumptions about safety in increasingly complex environments.
The discussion explores layered counter-UAS strategies, including the role of RF-cyber technologies alongside radar, optics, jamming, and kinetic measures. It also examines how integrated approaches can improve detection and response across different threat scenarios. Attendees will gain insight into the importance of coordination among government, military, and infrastructure stakeholders to build a more unified and effective defense strategy.
1 week from now
As industrial environments become more connected, managing risk across OT and IoT systems requires greater visibility and coordination. Organizations must address the full lifecycle of risk, from identification and assessment to mitigation and continuous monitoring, while dealing with complex and evolving threat landscapes. The discussion focuses on building a more predictable and intelligence-driven approach to risk management. It outlines how to combine real-time and historical data to generate dynamic risk metrics, improve communication with stakeholders, and apply consistent scoring across assets and environments. Attendees will gain practical insight into strengthening resilience and enabling more informed decision-making across connected operational systems.
4 days ago
Operational technology and IoT environments are facing increasingly complex and targeted cyber threats, particularly across critical infrastructure sectors. This webinar explores key findings from recent threat intelligence, including the rise of adversary in the middle attacks, exploitation of default credentials, and growing IoT botnet activity. The session focuses on how these threats are impacting sectors such as transportation and manufacturing.
Attendees will learn how to translate threat intelligence into actionable security improvements, including enhancing visibility, detecting threats, and strengthening resilience. The discussion also covers how to improve compliance readiness and reporting in line with evolving regulatory expectations. The webinar provides practical guidance on protecting OT and IoT environments against dynamic and persistent cyber threats.
5 days ago
Industrial organizations increasingly rely on remote access to support vendors and operational systems, but governance and visibility often fall short. This webinar explores findings from a benchmark study of 400 leaders across OT, IT, compliance, and operations, highlighting gaps between perceived control and actual oversight. The session focuses on challenges such as fragmented access tools, limited visibility into vendor activity, and insufficient session auditability.
Attendees will gain insight into how remote access governance is evolving as vendor ecosystems expand and regulatory expectations increase. The discussion examines where control breaks down and what organizations are doing to improve visibility, accountability, and security. The webinar provides practical perspective on strengthening remote access strategies in industrial and critical infrastructure environments.
5 days ago
The enforcement of the NIS2 Directive marks a turning point for manufacturers balancing regulatory compliance with increasing connectivity demands. As Industry 5.0 accelerates digital transformation, organizations must address the challenge of maintaining security while enabling operational growth and resilience.
A practical approach to IT and OT security is explored through modernization strategies and integrated frameworks. Topics include replacing siloed systems, adopting cloud-based architectures aligned with compliance requirements, and securing factory-floor assets as a foundational step. The discussion also covers improving visibility across environments and using unified data insights to support risk reduction, auditing, and informed decision-making in line with evolving regulatory expectations.
5 days ago
Cyberattacks on critical infrastructure are shifting from highly targeted operations to opportunistic, large-scale compromises of internet-facing assets. Recent research highlights the rise of “drive-by” attacks, where threat actors exploit exposed systems using simple, widely available tools to disrupt sectors such as manufacturing, water, and energy.
Findings from over 200 real-world incidents reveal how attackers identify vulnerable devices, leverage insecure protocols, and target high-risk systems like HMI and SCADA environments. The analysis also connects these activities to geopolitical patterns and evolving threat strategies. Practical guidance is provided to help organizations reduce exposure, including improving credential security, strengthening network segmentation, and addressing commonly exploited weaknesses in industrial environments.
1 week ago
Cyber-physical systems are critical to industrial operations, yet security budgets often lag behind the risks they face. This webinar explores how organizations can align cybersecurity investments with business outcomes to secure funding more effectively. The session focuses on bridging the gap between security needs and financial justification by tying cyber risk to measurable operational and business impacts.
Attendees will learn strategic approaches to justify security investments, including leveraging safety risks, audit findings, cyber insurance requirements, and regulatory pressures. The discussion also highlights how improved asset visibility can uncover cost savings while strengthening security posture. The webinar provides practical guidance on aligning cybersecurity strategy with financial decision making to support resilient CPS environments.
2 weeks ago
Geopolitical tensions in the Middle East are intensifying cyber threats against critical infrastructure, particularly in energy and industrial sectors. This webinar explores how evolving conflicts are influencing threat actor activity and increasing risks to operational technology environments. The session focuses on understanding the latest threat landscape and how attacks are targeting essential services.
Attendees will learn how to identify active threat actors, analyze their tactics, and apply threat led strategies to strengthen defenses. The discussion also covers how to test and validate security controls and prioritize threat hunting efforts in dynamic environments. The webinar provides practical guidance on improving OT resilience and protecting critical infrastructure against rapidly evolving cyber threats.
2 weeks ago
Operational technology and IoT environments across Germany are facing evolving threats, including credential abuse, data manipulation, wireless vulnerabilities, and increasing botnet activity. These trends are impacting sectors such as manufacturing, energy, and transportation, where connected industrial systems are critical to daily operations. This webinar examines recent developments in Germany’s OT and IoT threat landscape and what they mean for organizations responsible for critical infrastructure.
The session explores how improved visibility and threat detection can help organizations strengthen resilience across industrial environments. Speakers will discuss practical approaches for identifying risks, improving asset intelligence, and responding to emerging threats affecting OT and IoT networks. Attendees will also gain insight into preparing for regulatory requirements and reporting obligations under frameworks such as NIS2, the Cyber Resilience Act, and KRITIS.
1 month ago
Application security in the age of AI driven coding takes center stage in this discussion on protecting modern software supply chains. As development accelerates and dependency chains expand, the session examines why traditional point tools and siloed dashboards are no longer enough to manage growing vulnerability volume and alert fatigue. The conversation highlights the market shift toward continuous, risk based Application Security Management that brings visibility, prioritization and remediation together across the development life cycle.
Featuring insights from IDC and Armis experts, the webinar explores what modern AppSec programs must deliver, including broader supply chain coverage, runtime aware context and developer aligned remediation. Attendees will hear practical guidance on reducing tool sprawl, prioritizing by real business impact and operationalizing unified security across Git, CI CD pipelines and production environments.
1 month ago
Engineering repeatable risk reduction for cyber physical systems requires more than isolated tools and informal processes. This session focuses on the growing security challenges facing industrial, healthcare and public sector environments as CPS adoption expands. It examines why fragmented teams and tool centric approaches often fail to deliver meaningful risk reduction, compliance readiness or operational resilience.
The discussion introduces a structured CPS Protection Program that aligns people, processes and technology into a coordinated model for managing risk. Attendees will explore how to define clear ownership between asset owners and security leaders, establish governance frameworks and RACIs, prioritize CPS risks and demonstrate measurable value to the business. The webinar is designed for organizations seeking a more systematic and sustainable approach to securing cyber physical environments.
1 month ago
Engineering secure remote access in operational technology environments takes center stage in this live, demo driven session focused on reducing risk without disrupting operations. The discussion examines why traditional remote access methods introduce unnecessary exposure and complexity, then shows how least privilege access can be implemented without sharing credentials or directly exposing industrial networks.
Real world OT access scenarios will be demonstrated, including secure connections for engineers and third party vendors, controlled file transfers and access to isolated or overlapping network environments. The presenters will also explain how full audit logging supports compliance and incident investigations while maintaining operational accountability. The session concludes with a live Q and A for deeper technical discussion.