TOP 10 Anomalies in OT Networks | #00
Welcome to our video series on the 10 most common anomalies found in operational technology networks. In this opening video, we introduce the series and provide an overview of the top 10 anomalies we have encountered in our work with customers.
Rhebo Explained: How anomaly detection works
Rhebo's expert team takes us through the various steps involved in anomaly detection, from collecting data to analyzing it and identifying anomalies. They explain how their cutting-edge technology can identify even the smallest deviations from normal operation and provide insights into the underlying causes of the issue.
IEC 61850 Series: »What does the IEC 61850 standard define?«
IEC 61850 is an object-oriented standard for the automation of distributed energy resources including substations and renewable energy resources. In a nutshell, the standard describes how components in energy resources are described, are operated, what information is exchanged between these components, and how it is exchanged.
IEC 61850 Series: »Why is the IEC 61850 standard important?«
The IEC 61850 standard of the International Electrotechnical Commission defines the basis for interoperability of the industrial control systems used in energy production and supply. It is increasingly superseding or supplementing the IEC 60870-5-104 and DNP3 standards which have been in use for the last decades.
IIoT Backhaul: Cybersecurity and cost efficiency in IEC61850 substation monitoring use case
Rhebo participated together with the integration partner RAD at the IEC 61850 Week 2021. Klaus Mochalski, founder and CEO of Rhebo spoke about: »IIoT Backhaul: Cybersecurity and cost efficiency in IEC61850 substation monitoring use case«
What Means »Cybersecurity Made In Europe«
Cybersecurity systems must adhere to the data protection and data security policies just as strictly as any network component. In particular in the critical infrastructure sector it is paramount to be able to trust the systems and tools integrated in one's networks. The European Cyber Security Organisation has created the label »Cybersecurity Made In Europe« to provide independent proof of secure cybersecurity. Klaus Mochalski explains its implications and benefits. More about the label you can find in the press release.
Substation Level Monitoring - Cybersecurity in Remotely-Controlled Utilities
The growing energy grid becomes ever more complex. Distribution system operators and energy providers generally lack visibility into their substations. Klaus Mochalski explains why this is an underrated risk to the operation of energy utilities and what needs to be done.
Zero Day Attacks – How to Safeguard your OT Infrastructure?
The most destructive cyberattacks over the last years have used vulnerabilities that were either unknown or known, but still unpatched. Particularly in industrial environments where patch management is slow and difficult, the risk exposure remains – even years after zero day vulnerabilities became public. Klaus Mochalski explains how ICS monitoring with anomaly detection closes this prevailing security gap.
Firewalls and OT Monitoring – An Integrative Approach
Lots of companies still rely on firewalls to safeguard their industrial control system. Nevertheless, firewalls are insufficient for safeguarding an OT network from unknown threats, technical errors states and sabotage. Regarding the growing IT/OT-convergence in industrial networks, it is necessary to have a solution, that looks inside the black box of the network ecosystem. Klaus Mochalski, CEO Rhebo, explains in this Video Blog the integrative approach how to use an OT monitoring system complementary with a firewall and ultimately increase the cybersecurity of an ICS.
IT/OT Convergence and the New Risk Exposure
The IT/OT convergence has amazing advantages for data processing and process control. But new structures open up new vulnerabilities and risk. Rhebo CEO Klaus Mochalski explains where the gaps exist and why the integration of IT/OT cybersecurity is paramount for industrial continuity.
Ripple20: How to Secure IoT Devices Worldwide?
The discovery of the Ripple20 vulnerabilities once again demonstrates the blatant cybersecurity issues of IoT networks. Klaus Mochalski, CEO Rhebo, explains what makes those 19 vulnerabilities so dangerous. Furthermore, you can learn how even worldwide large-scale IoT-fleets can be protected from unknown threats and vulnerabilities.
How to protect global IoT-Devices against Cyberattacks
Klaus Mochalski, CEO Rhebo, explains Rhebo IoT Device Protection: A new way to secure connected IoT devices that are system relevant to plant availability and process stability. Rhebo's technical answer to the challenges of a globally connected industry is aimed primarily at manufacturers of critical IoT devices and operators of IoT networks. Learn more about the only independent solution that provides cybersecurity as well as stability for Industrial Control Systems and distributed IoT devices in industry and critical infrastructures.
Industrial Security by Anomaly Detection
What does an industrial network need today to be safe and stable?
Klaus Mochalski, CEO of Rhebo, describes Rhebo Industrial Protector as a holistic solution to protect your industrial network from all threats.
(German content)
Credits: University4Industry
How anomaly detection works
Anomaly detection is:
- a holistic method for monitoring and securing your industrial control network
- from internal and external threats,
- independent of they are known or unknown.
Klaus Mochalski, CEO of Rhebo, explains how this is implemented by the Rhebo Industrial Protector.>
(German content)
Credits: University4Industry
How to deploy an industrial anomaly detection
How to successfully implement an anomaly detection monitoring system into your control network?
Rhebo CEO, Klaus Mochalski, describes the simple steps to implement Rhebo Industrial Protector on a specific network.
(German content)
Credits: University4Industry
Webinar »How to protect critical infrastructures«
The new IT security law is binding for all operators of critical infrastructures. But also operators of other systems should be based on these standards.
Klaus Mochalski, CEO of Rhebo, explains the importance of the principle of detecting anomalies for the optimal implementation of the IT security law for critical infrastructures.
(German content)