Channel Avatar

S4 Events @UC5MdLu7ji_eyGiTfigk75lQ@youtube.com

8.2K subscribers - no pronouns :c

S4 is the world's largest and most advanced ICS Security / S


27:04
Strategies And Lessons Learned From Internal Network Security Monitoring At Scale
23:50
OnRamp: Dealing With Ransomware On IT
28:51
Non-Security Metrics To Identify & Quantify Security Related Risk
27:01
OnRamp: Cyber Informed Engineering
21:42
Cloud As A Governance Plane
26:19
What We Learned From ICS Pwn2Own
30:14
NIS2 As A Multi-Country Cyber Regulation Experiment
23:09
OnRamp: AI In OT & ICS Security
29:00
Operating With Adversary Supplied Components
02:42
What To Do 1st, 2nd, 3rd
49:09
Unsolicited Response with Maggie Morganti
31:06
It’s Not As Simple As “Use A Memory Safe Language"
29:14
Fireside Chat: Who Needs To Step Up?
23:14
S4x25 Feedback & Review
25:55
OnRamp: OT Supply Chain
30:44
Integrating Cybersecurity Accelerated Computing & AI Technologies Into OT
27:47
Burning Down Cities
23:55
Your Value As An OT Security Professional
19:49
What’s Happening In The TX1 Prime Room
11:08
What’s Happening In The SEL Prime Room
15:40
What’s Happening In The Cisco S4 Prime Room
15:13
What’s Happening In The Palo Alto Networks S4 Prime Room
14:36
What’s Happening in the OPSWAT S4 Prime Room
19:03
What’s Happening In The Nozomi S4 Prime Room
11:21
What’s Happening In The ServiceNow Prime Room
13:00
What’s Happening In The Fortinet Prime Room
07:12
Find Your Way Around The S4 Big Party
11:37
Tips For Using The S4x25 Mobile App
15:54
Tour of the S4x25 Venue
28:44
Hacking A Medical Device … Way Back In 2013 At S4
02:50
Unsolicited Response - Kerry Tomlinson's Annual S4 / OTSec Rap
04:59
Unsolicited Response - John Ballentine
36:19
S4 Classic: First Ever ICS On The Internet Session
03:05
S4x25 Training Course: Threat, Vulnerability, and Risk Assessments For ICS
25:24
Binary Code Analysis for IEC 62443-4-1 SVV-3
02:16
What's Your Cyber Narrative?
26:30
Productize Your ICS Security Program
20:00
Network Attack Simulations And You
30:12
Cyber Ethics: Where Do You Stand?
26:28
A RASP Journey To Level 1 Device Security
27:08
The Cyber Informed Safety System
27:41
Adapting Zones And Conduits – A Transformation Story
25:16
Is Cybersecurity Fundamentally A Physics-Based Problem?
26:38
What Horticulture IoT (and spite) Can Teach Us About Data Science
28:15
The hot new gameshow: My Favorite Metric!
27:03
Not a True Copy: An In Depth Look at a Common Backup Format
28:02
Building ICS/OT Security Communities
21:19
Quantifying Risk Reduction Achieved By OT Security Controls
18:18
Embracing Emerging Technologies to Protect from Past and Future Threats
30:49
Ted Gutierrez - What Investors & Analysts are getting wrong about the OT Market
31:38
Aspect Modeling for Process Variable Anomaly Detection
29:34
Reducing Reputation Risk In Cyber Incidents
29:23
Visibility Metrics
28:09
Spreading And Sharing The Risk
24:50
Exploiting Omron's NEX PLC Runtime And Protocol
36:12
A Hacker's Eye View On CISA's Secure By Design
22:17
Attack Surface Analysis On Satellites
20:37
Software Update Frameworks and the CI Supply Chain
27:34
Asset Owners As The Last Mile Of Cybersecurity
28:52
Govern The Ungovernable - NIST CSF Govern Function