Webinars

Join our educational webinars
Our webinars vary from discussions about industry trends to product information and network training. Register today, or watch our past webinars below.
NIST 8228 Key factors for cybersecurity and privacy in the Internet of Things

Information Technology (IT) and Operational Technology (OT) are different in a lot of ways, from their design to their maintenance workflows and more. When IT and OT merge, these differences create all new challenges for cybersecurity. 

IT has standards for protecting device security, data security, and people’s privacy, but these standards do not make sense for many connected OT devices. In IT, for example, cybersecurity vulnerabilities are the absolute top priority. In OT, operations are the top priority, while network security is a close second. Ensuring the building is still functioning as expected is critical to maintain physical safety and security, before addressing a network vulnerability. 

Last year, the National Institute for Science and Technology (NIST) released the report “Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks,” exploring these exact differences and cybersecurity threats. The report is an in-depth analysis of current threats and how IoT devices can or cannot meet those threats head-on. 

This is a huge opportunity to pull in your IT counterpart and collaborate on cybersecurity standards that make sense for your connected OT devices.

Join us for a one-hour webinar digging into the report, where we’ll summarize what IT and OT teams on the ground should know about their systems and security. We’ll dig into top risks identified in the report, challenges for securing the Internet of Things, and NIST’s recommendations.

Register now!

Date: February 25th, 2020
Time: 11:30 a.m. PDT / 2:30 p.m. EDT

DETAILS

Flickering lights. Erratic heating. Slow or missing data. One tiny little strand of wire can cause big problems on your MS/TP networks.
Join Ryan Hughson, Optigo Networks’ Manager of Building Solutions, and Monica McMahen, Marketing Manager, as they detail the ins and outs of duplicate BBMDs.

Join Ryan Hughson and Monica McMahen as they discuss circular networks. How does a circular network happen, and how can you recognize it? How do you fix it, and how is it identified in Visual BACnet? All of this in less than 10 minutes!

On September 10, 2016, Optigo Networks launched Visual BACnet, the advanced visualization tool for Building Automation System (BAS) service providers. One year later, how has Visual BACnet evolved?
How do duplicate networks happen? What can you do to spot duplicate networks in Visual BACnet, and how can you prevent them in the future?
Getting regular captures of your building network is crucial to understanding its behaviour. Without daily or weekly insights into your network health, you can’t possibly begin to improve it.
Power over Ethernet (PoE) is the rising star of the building automation and security industry. Cameras, access control, lighting and HVAC devices can be powered and communicate on the network with just a single Ethernet connection.

When Australian energy analytics company BUENO Systems used to start working with a new building, they would have no idea what was happening on the building’s network.

Operational technology (OT) — including HVAC, lighting, and security — is regularly managed by IT departments alongside computers and phones.