Safeguarding OT/ICS Assets: Insights from the U.S. Department of Energy

Gaining comprehensive visibility of all OT/ICS assets linked to critical infrastructure environments, encompassing both physical and virtual connections, is crucial for safeguarding systems from advanced cyber threats.

Watch an insightful discussion on asset identification, attack surface enumeration, and configuration management of OT/ICS devices through the lens of a new, groundbreaking research report from the National Renewable Energy Lab’s (NREL) Clean Energy Cybersecurity Accelerator™ (CECA) program.

We explore:

  • CECA’s role in revolutionizing cybersecurity research to protect OT/ICS assets.

  • Notable challenges for securing critical infrastructure environments.

  • The evolution of OT/ICS security, where it stands now, and where it needs to go.

  • CECA’s evaluation criteria and key results for testing the runZero platform.

Meet Our Speakers

HD Moore

Founder & CEO, runZero

Rob King

Director of Applied Research, runZero

Nik Urlaub

Senior Researcher - Cyber Security & Resilience

Nick Blair

Energy and Resilience Researcher

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Webcasts
runZero Hour, Ep. 25: The Holiday Hackstravaganza!
Tod Beardsley, Rob King, (and special guests!) look back at 2025’s wildest vulnerabilities, standout research, and make bold predictions for 2026.
Webcasts
Attack Surface Management: Continuous discovery, external attack paths
Your attack surface no longer ends at the firewall. With SaaS apps, cloud instances, IoT, and shadow IT multiplying, organizations are exposed in...
Webcasts
runZero Hour, Ep. 24: Attack graphs with runZero and BloodHound!
In this episode, runZero's Tod Beardsley, Rob King, HD Moore and Jared Atkinson, CTO of SpecterOps, dive into the tangled world of modern attack...
Webcasts
Fixing a broken system: why legacy vuln management tools can’t keep up
Watch the on-demand webcast on the future of exposure management, featuring attacker-driven strategies, continuous visibility, and rapid remediation.

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.