Safeguarding OT/ICS Assets: Insights from the U.S. Department of Energy

Gaining comprehensive visibility of all OT/ICS assets linked to critical infrastructure environments, encompassing both physical and virtual connections, is crucial for safeguarding systems from advanced cyber threats.

Watch an insightful discussion on asset identification, attack surface enumeration, and configuration management of OT/ICS devices through the lens of a new, groundbreaking research report from the National Renewable Energy Lab’s (NREL) Clean Energy Cybersecurity Accelerator™ (CECA) program.

We explore:

  • CECA’s role in revolutionizing cybersecurity research to protect OT/ICS assets.

  • Notable challenges for securing critical infrastructure environments.

  • The evolution of OT/ICS security, where it stands now, and where it needs to go.

  • CECA’s evaluation criteria and key results for testing the runZero platform.

Meet Our Speakers

HD Moore

Founder & CEO

Rob King

Director of Security Research

Nik Urlaub

Senior Researcher - Cyber Security & Resilience

Nick Blair

Energy and Resilience Researcher

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Webcasts
runZero Hour, Ep. 19: Mission: Contextualize – LLMs, MCP, and the Future of Vulnerability Intelligence
Jerry Gamblin joins us for a deep dive into today’s vulnerability landscape — from CVE trends and statistics to the launch of his new MCP (Model...
Webcasts
Unknown Assets: A Lurking Threat to Network Security
In this EcoCast, presented by Tod Beardsley VP of Security Research, discusses proactive strategies for defending against zero-day exploits and...
Webcasts
Vulnerability management is broken: what's the fix?
HD Moore and Omdia analyst Rik Turner discuss why traditional vulnerability management is struggling in modern IT infrastructures, why CVEs don’t...
Webcasts
From Exposed to Empowered: Fixing Fatal Flaws in Vulnerability Management
In this on-demand session, HD Moore joins Secon Cyber to expose the limitations of legacy vulnerability management and show why many of today’s...

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.