TXOne Networks

Webinars

Expert-led sessions on OT security trends, best practices, and solutions

Webinars

[On-Demand Webinar] Leave Malware at the Door: Inspect Portable Storage Devices Before Touching Your OT Network

[On-Demand Webinar] Leave Malware at the Door: Inspect Portable Storage Devices Before Touching Your OT Network

Tuesday, October 14 | 10:00am PT/1:00pm ET Do contractors or vendors bring USBs or removable devices into your OT environment? Do you have a policy that enforces malware inspection before those devices are used? Are you concerned about malware slipping in through file transfers from these removable devices? If you’re nodding yes, you’re not alone.… Read more

10/1/2025
[On-Demand Webinar] Pass Your Next OT Audit Without Taking Systems Offline

[On-Demand Webinar] Pass Your Next OT Audit Without Taking Systems Offline

Do you have an OT audit coming up? Can you collect the right device information without taking systems offline? Are legacy systems, air-gapped devices, or contractor laptops making compliance harder than it should be? If that sounds familiar, this 30-minute webinar is for you. Operations and security teams face a growing list of OT cybersecurity… Read more

10/1/2025
[On-Demand Webinar] Stop Threats Before They Reach Your OT Assets: Virtual Patching & Segmentation with TXOne Edge Series

[On-Demand Webinar] Stop Threats Before They Reach Your OT Assets: Virtual Patching & Segmentation with TXOne Edge Series

Legacy equipment, limited maintenance windows, and complex environments make traditional patching nearly impossible in OT environments, leaving critical assets exposed. Outdated tools or incomplete strategies only widen the security gap. Join us to learn how TXOne Edge series delivers OT specific virtual patching and network segmentation that protects assets without disrupting operations. We’ll explore real-world… Read more

7/29/2025
Navigating the Regulatory Maze: Endpoint & Network Mapping for Cyber-Resilient OT Environments

Navigating the Regulatory Maze: Endpoint & Network Mapping for Cyber-Resilient OT Environments

Sep 17, 2025 | 10:00 am BST This webinar, hosted by TXOne Networks on BrightTALK, brings together experts from Defensify, Nozomi Networks, and TXOne Networks to explore how integrated endpoint and network mapping strategies can help meet compliance requirements like NIS2 and CRA while enhancing cyber resilience.

7/17/2025
[On-Demand Webinar] Stop Applying IT Fixes to OT Problems: The OT Security Wake-up Call

[On-Demand Webinar] Stop Applying IT Fixes to OT Problems: The OT Security Wake-up Call

OT environments are not like data centers & trying to secure them with IT tools is like trying to play a vinyl record on a CD player (same goal, ineffective tech). From visibility & vulnerability management to risk response, OT demands specialized strategies that prioritize continuity & control. Join us as we explore how traditional… Read more

7/15/2025
Solving ICS/OT Patching and Vulnerability Management Conundrum

Solving ICS/OT Patching and Vulnerability Management Conundrum

ICS/OT vendors regularly issue patches for vulnerabilities in their software and firmware, but that doesn’t mean industrial organizations that run those products can necessarily apply those security fixes. How do these enterprises keep their OT networks secure from attack if they can’t always patch? What are strategies for vulnerability management and assessing the risk of… Read more

7/11/2025
[On-Demand Webinar] The Legacy OT Dilemma: Secure Your Critical Infrastructure Against Cyber Threats

[On-Demand Webinar] The Legacy OT Dilemma: Secure Your Critical Infrastructure Against Cyber Threats

Legacy OT (Operational Technology) systems continue to underpin Europe’s industrial operations, yet their reliance on outdated platforms like Windows XP, 7, and soon-to-be unsupported Windows 10 makes them prime targets for cyber threats. In a major study commissioned by TXOne Networks, 550 senior decision-makers across Europe shared their insights on the state of legacy OT… Read more

6/6/2025
Revealing operational technology security risks in manufacturing and critical industries

Revealing operational technology security risks in manufacturing and critical industries

May 22, 2025 | 1:00 pm BST Join us to explore the direct link between OT security and profitability with the Heads of Information Security, Operations, Manufacturing, Technology at your business. An exclusive webinar discussion with Mats Karlsson Landré (VP Critical Infrastructure, Sectra), Kenneth Titlestad (CCO, Omny Security), and Sam Taylor (vCISO, enfinium).

5/19/2025
Mitigating cyber physical vulnerabilities in manufacturing and critical industries

Mitigating cyber physical vulnerabilities in manufacturing and critical industries

On demand Join us and learn how to achieve robust OT security without sacrificing operational uptime or efficiency. Gain practical insights and learn how to implement non-disruptive security measures that will keep your critical systems running smoothly. An exclusive webinar discussion with Mikael Brolin, Cyber & OT Security Specialist, Seco Tools and Scott Keenon, Director… Read more

5/19/2025
[On-Demand Webinar] Protecting Legacy Devices in Food and Beverage Manufacturing

[On-Demand Webinar] Protecting Legacy Devices in Food and Beverage Manufacturing

Operational technology (OT) devices with legacy operating systems (OS) play a critical role in food and beverage manufacturing processes such as automated bottling, precision filling machines, and quality assurance equipment. These legacy systems often lack modern security features and updates, making them vulnerable to cyber threats. Tailored OT security solutions are essential to address vulnerabilities… Read more

4/30/2025
[On-Demand Webinar] Protecting Industrial Operations: Secure Legacy & Modern Windows Systems with TXOne Stellar

[On-Demand Webinar] Protecting Industrial Operations: Secure Legacy & Modern Windows Systems with TXOne Stellar

Protecting Operational Technology (OT) assets, both legacy and modern, requires a fundamentally different approach from traditional IT endpoint security. Legacy Windows systems, like XP/2000 and 7/2008, remain critical in industrial environments despite their end-of-life status. Devices running these operating systems, which power essential operations, face security challenges due to outdated protections, lack of vendor support,… Read more

4/30/2025
[On-demand Webinar] On the Right Track: Cybersecurity in Transportation

[On-demand Webinar] On the Right Track: Cybersecurity in Transportation

Join us for an insightful webinar where we explore the complexities of securing the transportation sector. On demand recording With advancements in technology and increasing threats, understanding how to protect critical infrastructures is essential. Our experts from TXOne Networks will guide you through the layers of challenges and solutions unique to rail, air, maritime,… Read more

4/18/2025
[On-demand Webinar] Today’s Modern is Tomorrow’s Legacy: Overcoming the Challenges of Protecting Legacy OT Systems in a Modern World

[On-demand Webinar] Today’s Modern is Tomorrow’s Legacy: Overcoming the Challenges of Protecting Legacy OT Systems in a Modern World

In today’s rapidly evolving digital landscape, many organisations in critical industries are tasked with the challenge of securing their operational technology (OT), particularly legacy assets that are often excluded from modern cybersecurity strategies. This webinar delvea into the intricate challenges associated with protecting these vital legacy systems and highlighta the common industry practice of mandating… Read more

3/17/2025
[On-Demand Webinar] How to Simplify the Challenges of OT Network Segmentation

[On-Demand Webinar] How to Simplify the Challenges of OT Network Segmentation

In today’s industrial environments, network segmentation serves as a cornerstone of operational security, compliance, and resilience. While standards like IEC 62443, NIST, and NERC CIP emphasize segmentation as a foundational practice, many organizations struggle to implement it effectively. Common challenges include concerns about operational downtime, complex network configurations, and limited visibility into existing infrastructure. However,… Read more

3/5/2025
[On-Demand Webinar] Today’s Modern is Tomorrow’s Legacy: 3 Cost-Effective Approaches to Secure OT Assets

[On-Demand Webinar] Today’s Modern is Tomorrow’s Legacy: 3 Cost-Effective Approaches to Secure OT Assets

Is modernizing your legacy ICS and OT devices a reliable protection strategy? Today’s modern is tomorrow’s legacy, just as we’re seeing with Microsoft ending support for Windows 10 later this year. Learn how to maintain operational resiliency, adhere to security compliance and avoid equipment replacement costs with TXOne solutions designed to support both legacy and… Read more

2/25/2025
[On-Demand Webinar] Navigating your OT Cybersecurity Journey: From Assessment to Implementation

[On-Demand Webinar] Navigating your OT Cybersecurity Journey: From Assessment to Implementation

As industrial environments increasingly become targets for sophisticated attacks, it’s essential to prioritize and understand your OT cybersecurity posture. How confident are you in your OT cybersecurity strategy? Do you know how to identify risks within your environment and how to implement solutions unique to your needs? Join SecurityWeek and TXOne Networks as Debbie Lay,… Read more

12/17/2024
[On-Demand Webinar] Mastering OT Security: Transformative Tactics for the Food and Beverage Sector

[On-Demand Webinar] Mastering OT Security: Transformative Tactics for the Food and Beverage Sector

In this insightful session you will discover: Proven strategies for prioritizing OT security initiatives Effective solutions for overcoming OT security challenges, powered by TXOne Networks’ cutting-edge technology Expert insights on navigating and aligning with the NIS2 directive Take advantage of this opportunity to enhance your operational security and ensure compliance with industry standards. Register and… Read more

12/17/2024
[On-Demand Webinar] Securing Legacy Systems in the Industrial Setting

[On-Demand Webinar] Securing Legacy Systems in the Industrial Setting

This webinar has already been live. You can view it as on-demand by filling in the form. IIoT World Cybersecurity Day, Debbie Lay, Principal Sales Engineer at TXOne Networks, participated in an esteemed panel discussion. Many industrial environments are still dependent on legacy systems that weren’t designed with current security threats in mind. Debbie, TXOne’s… Read more

10/29/2024
[On-Demand Webinar] Securing Semiconductor: Implementing SEMI E187 and E188

[On-Demand Webinar] Securing Semiconductor: Implementing SEMI E187 and E188

This webinar has already been live. You can view it as on-demand by filling in the form. Pressure has been mounting on semiconductor manufacturing to better secure its operational technology (OT) infrastructure. This is due to several factors, including the critical importance of the industry’s output, its unusually high degree of automation, and its complex,… Read more

8/19/2024