ON DEMAND WEBINARS
As early as the Qin Dynasty's initial work on the Great Wall and continuing right up to present-day network firewalls, humans have built walls and defined perimeters to make themselves feel safe. Each new form of defensive perimeter over the centuries has seen initial success, but was eventually rendered obsolete by advances in tactics and technology. In this webinar, Jon Stitzel of Ameren will describe modern cybersecurity perimeters, incorporating identity and access management as the critical element. Join us for a better understanding of how your organization can strengthen its cybersecurity defenses through identity perimeters.
Bob Lockhart - Utilities Technology Council
Rick Peters - Fortinet
Ivan Aguilar - Arizona Public Service
As connectivity to the last mile expands through connected devices, vehicles, and DER, utilities face a wave of new vulnerabilities. Where is risk heightened, and how can utilities establish safeguards to support edge devices on both sides of the meter?
ON DEMAND PODCASTS
Securing the Supply Chain
Holistic Cybersecurity: Defining, Understanding & Implementing
Partners