
Video Library
Find insights to help you strengthen your security posture and stay informed about the latest risks and solutions.
Omny Security Video Library
Welcome to our video library, where we tackle the most common questions about IT and OT security. From understanding key cybersecurity concepts to exploring the challenges of protecting critical infrastructure, these short videos are here to provide clear, practical answers.
-
All
-
Threat Intelligence
-
OT Security
-
IT Security
-
Physical Security
-
IT / OT
-
Information Security
-
Risk Management

Using Public Sources for Threat Intelligence
Omny's Director, Advisory, Magnus Moe, answers the question: What are some of the most popular public threat intel sources?

Understanding Threat Actors
Omny's Director, Advisory, Magnus Moe, answers the question: What is a threat actor?

Spotting Trends in Threat Intelligenc
Omny's Director, Advisory, Magnus Moe, answers the question: What are the top trends in threat intelligence?

How to Invest in Threat Intelligence
Omny's Director, Advisory, Magnus Moe, answers the question: Why should companies invest in threat intelligence?

Information to Include in a Threat Intelligence Report
Omny's Director, Advisory, Magnus Moe, answers the question: What type of information is included in threat intelligence?

Putting Together a Threat Intelligence Report
Omny's Director, Advisory, Magnus Moe, answers the question: What is a threat intelligence report?

Learning about Threat Intelligence
Omny's Advisory Director, Magnus Moe, answers the question: What is threat intelligence?

Applying ISA IEC 62443 to Your Organization
Omny's Senior ICS Engineer, Srivathsan Desikan, answers the question: How can IEC 62443 be applied to a business?

Improving Security with Control Assessments
Omny's Senior ICS Engineer, Srivathsan Desikan, answers the question: What is a control assessment?

Implementing Zone & Conduits for Operational Technology
Omny's Senior ICS Engineer, Srivathsan Desikan, answers the question: What are Zones & Conduits?

How to Use an Asset Inventory
Omny's Senior ICS Engineer, Srivathsan Desikan, answers the question: What is an asset inventory?

How to Apply ISA or IEC 62443
Omny's Senior ICS Engineer, Srivathsan Desikan, answers the question: What is ISA or IEC 62443?

How to Improve Security Controls
Omny's Senior ICS Engineer, Srivathsan Desikan, answers the question: What are some actions businesses can take to improve their controls?

Introductions to OT Security
Omny's Senior ICS Engineer, Srivathsan Desikan, answers the question: What is OT Security?

Learning About Advanced Persistent Threats
Omny Security Specialist, Jens Dovland, answers the question: What are current APTs (advanced persistent threats)we should be aware of? How do we defend against them?

How to Mitigate Ransomeware Attacks
Omny's Security Specialist, Jens Dovland, answers the question: How can an organization best mitigate the risk of a ransomeware attack?

Forming Preventative Social Engineering Attack Strategies
Omny's Security Specialist, Jens Dovland, answers the question: What are some effective strategies for preventing social engineering attacks?

Becoming Aware of Top Cybersecurity Risks to Your Organization
Omny's Security Specialist, Jens Dovland, answers the question: What is the biggest cybersecurity risk to an organization?

Cybersecurity in Your Organization
Omny's Security Specialist, Jens Dovland, answers the question: What is the role of cybersecurity in an organization?

Differentiating Between Cybersecurity, IT Security, and Information Security
Omny's Security Specialist, Jens Dovland, answers the question: What is the difference between information security, IT security, cybersecurity?

Getting to Know IT Security
Omny's Security Specialist, Jens Dovland, answers the question: What is IT Security?

Relating OT and IT Security to Physical Security
Omny's Director of Advisory, Physical Security, Emerson Kastrati answers the question: How does physical security relate to cybersecurity and OT security?

How to Implement Robust Security Measures
Omny's Director of Advisory, Physical Security, Emerson Kastrati, answers the question: What are the benefits of an organization implementing robust physical security measures?

Placing Physical Security Measures in Your Organizations
Omny's Director of Advisory, Physical Security, Emerson Kastrati, answers the questions: What is physical security and what are physical security measures?

How to Prioritize Risk in Your Organization
Omny's CTO Haakon Mørk answers: How can organizations assess and prioritize risk within their own organization?

Recognizing Emerging Cyber Threats
Omny's CTO Haakon Mørk answers: What is the most current and emerging threat your business should be aware?

How to differentiate between OT and IT Security
Omny's CTO Haakon Mørk answers: How does IT security differ form OT security?

Using Intelligence to Stay on Top of Current Threats
Omny's CTO, Haakon Mørk answers: What intelligence feeds can we use to stay on top of current threats and vulnerabilities?

How to Bridge Communication Between IT and OT Security Teams
Omny's CTO, Haakon Mørk, answers: How can a company bridge the communication gap between IT security and OT teams?

How to Gain Visibility Across Domains
Omny's CTO, Haakon Mørk, answers: how can organizations gain visibility across organizational domains and what is the value in doing so?

Understanding Challenges in Securing OT Systems
Omny's CISO, Tommy Evensen, answers the question: What are the main challenges in security OT systems?

Spotting the Common Vulnerabilities to Your OT Assets
Omny CISO, Tommy Evensen, answers the question: What are the most common vulnerabilities in OT systems?

How to Identify and Protect OT Assets
Omny's CISO, Tommy Evensen, answers the question: How can an organization identify and protect OT assets?

Prepping for a Data Breach with Compliance
Omny's CISO, Tommy Evensen, answers the question: If organizations comply with current regulations, are they prepared to handle a data breach?

A CISO's Role in OT Security
Omny's CISO, Tommy Evensen, answers the question: What role do CISO's need to play in OT security?

Understanding Incident Response Plans
Omny's CISO, Tommy Evensen, answers the question: What is an incident response plan?

What to Know About Network Segmentation
Omny's CISO, Tommy Evensen, answers the question: What is network segmentation?

Network Segmentation Best Practices
Omny's CISO, Tommy Evensen, answers the question: What are best practices for OT network segmentation?

How to Communicate GRC Priorities
Omny's Director of GRC, Raymund Hoseña, answers the question: How do you communicate GRC priorities to leadership and employees?

The Frequency of Risk Assessments
Omny's Director of GRC, Raymund Hoseña, answers the question: How often should an organization perform a risk assessment?

The Frequency of Risk Assessments
Omny's Director of GRC, Raymund Hoseña, answers the question: How often should an organization perform a risk assessment?

How to Identify and Mitigate Against Emerging Risks
Omny's Director of GRC, Raymund Hoseña, answers the question: What is your approach in identifying and mitigating emerging risks?

Forming Practical Security Policies for an Organization
Omny's Director of GRC, Raymund Hoseña, answers the question: How do you develop policies that are both effective and practical for employees to follow?

How to Build a Risk-Aware Culture
Omny's Director of GRC, Raymund Hoseña, answers the question: How do you build a strong risk-aware culture in your organization?

How to Manage Risk in Your Organization
Omny's Director of GRC, Raymund Hoseña, answers the question: What is risk management for an organization?

Automating GRC to Scale Organizational Security Growth
Omny's Director of GRC, Raymund Hoseña, answers the question: How can organizations ensure GRC technology scales as the organization grows?