Category: Webinars

  • IT, Meet OT: Building Integrated Security and Compliance Programs Across Digital and Physical Environment

    IT, Meet OT: Building Integrated Security and Compliance Programs Across Digital and Physical Environment

    IT, Meet OT: Building Integrated Security and Compliance Programs Across Digital and Physical Environment

    Cyber threats are changing-and fast.
    Cyberattacks have hit rail systems in the U.S., exposed weak spots in energy and manufacturing systems, and triggered urgent warnings from government agencies. These aren’t just computer problems anymore-they’re affecting the real-world systems that keep business and communities running.

    For organizations, this means:

    • Downtime now affects more than just IT – It can stop production, delay shipments, or impact public safety.
    • IT security tools aren’t enough – OT often includes older systems that can’t be easily updated.
    • Bridging the IT-OT gap is critical – without a unified approach, organizations risk falling short on both security and compliance.

    Experts Erik Holmes and Enrique Fernando Azuara Sánchez from Cybolt will explain how to protect both your IT systems and you industrial operations-without slowing down your business.
    Discover

    • What OT (Operational Technology) is and why it’s now a big target
    • How to find and fix weak spots in your systems
    • Simple ways to secure remote access and detect threats early
    • How to bring IT and OT teams together under one security plan

    Submit the form to Watch Webinar Video

    • Who Guards the Guardians? Identity for AI

      Who Guards the Guardians? Identity for AI

      𝗪𝗵𝗼 𝗚𝘂𝗮𝗿𝗱𝘀 𝘁𝗵𝗲 𝗚𝘂𝗮𝗿𝗱𝗶𝗮𝗻𝘀? 𝗜𝗱𝗲𝗻𝘁𝗶𝘁𝘆 𝗳𝗼𝗿 𝗔𝗜

      Who Guards the Guardians? Identify for AI

      Thales, Cybolt and IBM have come together for the webinar Who Guards the Guardians? Identity for AI

      The security of AI is often overlooked. 86% of organizations experienced an AI-related security incident in the past year, highlighting the urgency of addressing these issues.

      While AI enhances security, the question remains: who is securing AI? Who is guarding the guardian? Ensuring AI security is crucial as it integrates into critical systems. This webinar highlights the role of Identity and Access Management (IAM) in protecting AI from unauthorized access and threats.

      Securing AI involves many steps and layers, making it seem like a daunting task, organizations can begin with the first line of defense: Identity and Access Management (IAM). Implementing IAM helps protect AI systems from unauthorized access and potential threats, laying a strong foundation for comprehensive AI security.

      Hear from our expert panelists:
      Marco Venuti, IAM Business Acceleration Director at Thales
      Vinita Bhushan, Vice President, IAM at Cybolt
      Sridhar Muppidi, IBM Fellow, VP & CTO IBM Security

      Topics Covered:
      • Importance of IAM in AI security.
      • Best practices and frameworks for securing AI environments.
      • Real-world case studies of successful strategies.

      Submit the form to Watch Webinar Video

      • Demystify Machine Identities

        Demystify Machine Identities

        Demystify Machine Identities

        Thales, Pontis Research Inc. (a Cybolt Company) and IBM are hosting a must-attend webinar to Demystify Machine Identities.

        Machine IDs outnumber human identities and have unique requirements. Despite their importance, they often receive less attention, leading to security risks like unauthorized access and data breaches.

        Hear from the Expert Panelists:

        • Marco Venuti, IAM Business Acceleration Director at Thales
        • Vinita Bhushan, President at Pontis Research Inc. (a Cybolt Company)
        • Sridhar Muppidi, IBM Fellow, VP & CTO IBM Security

        Topics Covered:

        • Challenges of managing machine IDs
        • Strategies for machine ID governance
        • Enhancing security by mitigating machine ID risks
        • Real-world use cases

        Submit the form to Watch Webinar Video