ON DEMAND WEBINARS

Bob Lockhart Jon Stitzel Dominick Birolin
Description

As early as the Qin Dynasty's initial work on the Great Wall and continuing right up to present-day network firewalls, humans have built walls and defined perimeters to make themselves feel safe. Each new form of defensive perimeter over the centuries has seen initial success, but was eventually rendered obsolete by advances in tactics and technology. In this webinar, Jon Stitzel of Ameren will describe modern cybersecurity perimeters, incorporating identity and access management as the critical element. Join us for a better understanding of how your organization can strengthen its cybersecurity defenses through identity perimeters.

Nelson Hastings Bob Lockhart Rick Peters Ivan Aguilar
Description

As connectivity to the last mile expands through connected devices, vehicles, and DER, utilities face a wave of new vulnerabilities. Where is risk heightened, and how can utilities establish safeguards to support edge devices on both sides of the meter?

ON DEMAND PODCASTS

Partners