Videos Cyber Security Rhebo

Videos

Advantages and application scenarios of anomaly detection

TOP 10 Anomalies in OT Networks | #00

Welcome to our video series on the 10 most common anomalies found in operational technology networks. In this opening video, we introduce the series and provide an overview of the top 10 anomalies we have encountered in our work with customers.

Zum Youtube-Video

Rhebo Explained: How anomaly detection works

Rhebo's expert team takes us through the various steps involved in anomaly detection, from collecting data to analyzing it and identifying anomalies. They explain how their cutting-edge technology can identify even the smallest deviations from normal operation and provide insights into the underlying causes of the issue.

Zum Youtube-Video

IEC 61850 Series: »What does the IEC 61850 standard define?«

IEC 61850 is an object-oriented standard for the automation of distributed energy resources including substations and renewable energy resources. In a nutshell, the standard describes how components in energy resources are described, are operated, what information is exchanged between these components, and how it is exchanged.

Zum Youtube-Video

IEC 61850 Series: »Why is the IEC 61850 standard important?«

The IEC 61850 standard of the International Electrotechnical Commission defines the basis for interoperability of the industrial control systems used in energy production and supply. It is increasingly superseding or supplementing the IEC 60870-5-104 and DNP3 standards which have been in use for the last decades.

Zum Youtube-Video

IIoT Backhaul: Cybersecurity and cost efficiency in IEC61850 substation monitoring use case

Rhebo participated together with the integration partner RAD at the IEC 61850 Week 2021. Klaus Mochalski, founder and CEO of Rhebo spoke about: »IIoT Backhaul: Cybersecurity and cost efficiency in IEC61850 substation monitoring use case«

Watch Youtube-Video

What Means »Cybersecurity Made In Europe«

Cybersecurity systems must adhere to the data protection and data security policies just as strictly as any network component. In particular in the critical infrastructure sector it is paramount to be able to trust the systems and tools integrated in one's networks. The European Cyber Security Organisation has created the label »Cybersecurity Made In Europe« to provide independent proof of secure cybersecurity. Klaus Mochalski explains its implications and benefits. More about the label you can find in the press release.

Watch Youtube-Video

Substation Level Monitoring - Cybersecurity in Remotely-Controlled Utilities

The growing energy grid becomes ever more complex. Distribution system operators and energy providers generally lack visibility into their substations. Klaus Mochalski explains why this is an underrated risk to the operation of energy utilities and what needs to be done.

Watch Youtube-Video

Zero Day Attacks – How to Safeguard your OT Infrastructure?

The most destructive cyberattacks over the last years have used vulnerabilities that were either unknown or known, but still unpatched. Particularly in industrial environments where patch management is slow and difficult, the risk exposure remains – even years after zero day vulnerabilities became public. Klaus Mochalski explains how ICS monitoring with anomaly detection closes this prevailing security gap.

Watch Youtube-Video

Firewalls and OT Monitoring – An Integrative Approach

Lots of companies still rely on firewalls to safeguard their industrial control system. Nevertheless, firewalls are insufficient for safeguarding an OT network from unknown threats, technical errors states and sabotage. Regarding the growing IT/OT-convergence in industrial networks, it is necessary to have a solution, that looks inside the black box of the network ecosystem. Klaus Mochalski, CEO Rhebo, explains in this Video Blog the integrative approach how to use an OT monitoring system complementary with a firewall and ultimately increase the cybersecurity of an ICS.

Watch Youtube-Video

IT/OT Convergence and the New Risk Exposure

The IT/OT convergence has amazing advantages for data processing and process control. But new structures open up new vulnerabilities and risk. Rhebo CEO Klaus Mochalski explains where the gaps exist and why the integration of IT/OT cybersecurity is paramount for industrial continuity.

Watch Youtube-Video

Ripple20: How to Secure IoT Devices Worldwide?

The discovery of the Ripple20 vulnerabilities once again demonstrates the blatant cybersecurity issues of IoT networks. Klaus Mochalski, CEO Rhebo, explains what makes those 19 vulnerabilities so dangerous. Furthermore, you can learn how even worldwide large-scale IoT-fleets can be protected from unknown threats and vulnerabilities. 

Watch Youtube-Video

How to protect global IoT-Devices against Cyberattacks

Klaus Mochalski, CEO Rhebo, explains Rhebo IoT Device Protection: A new way to secure connected IoT devices that are system relevant to plant availability and process stability. Rhebo's technical answer to the challenges of a globally connected industry is aimed primarily at manufacturers of critical IoT devices and operators of IoT networks. Learn more about the only independent solution that provides cybersecurity as well as stability for Industrial Control Systems and distributed IoT devices in industry and critical infrastructures.

Watch Youtube-Video

Industrial Security by Anomaly Detection

What does an industrial network need today to be safe and stable?

Klaus Mochalski, CEO of Rhebo, describes Rhebo Industrial Protector as a holistic solution to protect your industrial network from all threats.

Watch Youtube-Video

(German content)

Credits: University4Industry

How anomaly detection works

Anomaly detection is:

  • a holistic method for monitoring and securing your industrial control network
  • from internal and external threats,
  • independent of they are known or unknown.

Klaus Mochalski, CEO of Rhebo, explains how this is implemented by the Rhebo Industrial Protector.>

Watch Youtube-Video

(German content)

Credits: University4Industry

How to deploy an industrial anomaly detection

How to successfully implement an anomaly detection monitoring system into your control network?

Rhebo CEO, Klaus Mochalski, describes the simple steps to implement Rhebo Industrial Protector on a specific network.

Watch Youtube-Video

(German content)

Credits: University4Industry

Webinar »How to protect critical infrastructures«

The new IT security law is binding for all operators of critical infrastructures. But also operators of other systems should be based on these standards.

Klaus Mochalski, CEO of Rhebo, explains the importance of the principle of detecting anomalies for the optimal implementation of the IT security law for critical infrastructures.

Watch Youtube-Video

(German content)