Skip to content
platform-herobanner

Video Library

 Find insights to help you strengthen your security posture and stay informed about the latest risks and solutions.

Omny Security Video Library

Welcome to our video library, where we tackle the most common questions about IT and OT security. From understanding key cybersecurity concepts to exploring the challenges of protecting critical infrastructure, these short videos are here to provide clear, practical answers.

Magnus - Threat
Using Public Sources for Threat Intelligence
Omny's Director, Advisory, Magnus Moe, answers the question: What are some of the most popular public threat intel sources?
Magnus - Threat Actors
Understanding Threat Actors
Omny's Director, Advisory, Magnus Moe, answers the question: What is a threat actor?
 
Magnus - Spotting trends
Spotting Trends in Threat Intelligenc
Omny's Director, Advisory, Magnus Moe, answers the question: What are the top trends in threat intelligence?
Magnus - How to invest
How to Invest in Threat Intelligence
Omny's Director, Advisory, Magnus Moe, answers the question: Why should companies invest in threat intelligence?
Magnus - Info to include
Information to Include in a Threat Intelligence Report
Omny's Director, Advisory, Magnus Moe, answers the question: What type of information is included in threat intelligence?
Magnus - Putting together a report
Putting Together a Threat Intelligence Report
Omny's Director, Advisory, Magnus Moe, answers the question: What is a threat intelligence report?
Magnus - Learning about threat
Learning about Threat Intelligence
Omny's Advisory Director, Magnus Moe, answers the question: What is threat intelligence?
Srivathsan -ISA IEC 62443
Applying ISA IEC 62443 to Your Organization
Omny's Senior ICS Engineer, Srivathsan Desikan, answers the question: How can IEC 62443 be applied to a business?
Srivathsan -control assess
Improving Security with Control Assessments
Omny's Senior ICS Engineer, Srivathsan Desikan, answers the question: What is a control assessment?
Srivathsan -Zone & conduits
Implementing Zone & Conduits for Operational Technology
Omny's Senior ICS Engineer, Srivathsan Desikan, answers the question: What are Zones & Conduits?
Srivathsan -asset inventory
How to Use an Asset Inventory
Omny's Senior ICS Engineer, Srivathsan Desikan, answers the question: What is an asset inventory?
Srivathsan -ISA IEC 62443-1
How to Apply ISA or IEC 62443
Omny's Senior ICS Engineer, Srivathsan Desikan, answers the question: What is ISA or IEC 62443?
Srivathsan -improve controls-1
How to Improve Security Controls
Omny's Senior ICS Engineer, Srivathsan Desikan, answers the question: What are some actions businesses can take to improve their controls?
Srivathsan -ot security
Introductions to OT Security
Omny's Senior ICS Engineer, Srivathsan Desikan, answers the question: What is OT Security?
Jens -APTs
Learning About Advanced Persistent Threats
Omny Security Specialist, Jens Dovland, answers the question: What are current APTs (advanced persistent threats)we should be aware of? How do we defend against them?
Jens -Ransomeware
How to Mitigate Ransomeware Attacks
Omny's Security Specialist, Jens Dovland, answers the question: How can an organization best mitigate the risk of a ransomeware attack?
Jens - social engineering
Forming Preventative Social Engineering Attack Strategies
Omny's Security Specialist, Jens Dovland, answers the question: What are some effective strategies for preventing social engineering attacks?
Jens - biggest cyber risk
Becoming Aware of Top Cybersecurity Risks to Your Organization
Omny's Security Specialist, Jens Dovland, answers the question: What is the biggest cybersecurity risk to an organization?
Jens - role of cyber
Cybersecurity in Your Organization
Omny's Security Specialist, Jens Dovland, answers the question: What is the role of cybersecurity in an organization?
Jens - differences
Differentiating Between Cybersecurity, IT Security, and Information Security
Omny's Security Specialist, Jens Dovland, answers the question: What is the difference between information security, IT security, cybersecurity?
Jens - IT security
Getting to Know IT Security
Omny's Security Specialist, Jens Dovland, answers the question: What is IT Security?
Emerson - Relating OT and IT Security to Physical Security
Relating OT and IT Security to Physical Security
Omny's Director of Advisory, Physical Security, Emerson Kastrati answers the question: How does physical security relate to cybersecurity and OT security?
Emerson - How to Implement Robust Security Measures
How to Implement Robust Security Measures
Omny's Director of Advisory, Physical Security, Emerson Kastrati, answers the question: What are the benefits of an organization implementing robust physical security measures?
Emerson - Placing Physical Security
Placing Physical Security Measures in Your Organizations
Omny's Director of Advisory, Physical Security, Emerson Kastrati, answers the questions: What is physical security and what are physical security measures?

Haakon - prioritize risk
How to Prioritize Risk in Your Organization
Omny's CTO Haakon Mørk answers: How can organizations assess and prioritize risk within their own organization?
Haakon - emerging threat
Recognizing Emerging Cyber Threats
Omny's CTO Haakon Mørk answers: What is the most current and emerging threat your business should be aware?
Haakon - IT v OT differ
How to differentiate between OT and IT Security
Omny's CTO Haakon Mørk answers: How does IT security differ form OT security?
Haakon - intel feeds for current threats
Using Intelligence to Stay on Top of Current Threats
Omny's CTO, Haakon Mørk answers: What intelligence feeds can we use to stay on top of current threats and vulnerabilities?
Haakon - bridge comms gap
How to Bridge Communication Between IT and OT Security Teams
Omny's CTO, Haakon Mørk, answers: How can a company bridge the communication gap between IT security and OT teams?
Haakon - gain visibility
How to Gain Visibility Across Domains
Omny's CTO, Haakon Mørk, answers: how can organizations gain visibility across organizational domains and what is the value in doing so?
Tommy - securing OT systems
Understanding Challenges in Securing OT Systems
Omny's CISO, Tommy Evensen, answers the question: What are the main challenges in security OT systems?
Tommy - common vulnerabilities
Spotting the Common Vulnerabilities to Your OT Assets
Omny CISO, Tommy Evensen, answers the question: What are the most common vulnerabilities in OT systems?
Tommy - identify and protect assets
How to Identify and Protect OT Assets
Omny's CISO, Tommy Evensen, answers the question: How can an organization identify and protect OT assets?
Tommy - prepared for data breach
Prepping for a Data Breach with Compliance
Omny's CISO, Tommy Evensen, answers the question: If organizations comply with current regulations, are they prepared to handle a data breach?
Tommy - CISOs role
A CISO's Role in OT Security
Omny's CISO, Tommy Evensen, answers the question: What role do CISO's need to play in OT security?
Tommy - incident response
Understanding Incident Response Plans
Omny's CISO, Tommy Evensen, answers the question: What is an incident response plan?
Tommy - network segmentation
What to Know About Network Segmentation
Omny's CISO, Tommy Evensen, answers the question: What is network segmentation?
Tommy - best practices segmentation
Network Segmentation Best Practices
Omny's CISO, Tommy Evensen, answers the question: What are best practices for OT network segmentation?

 

Raymund -communicate GRC priorities
How to Communicate GRC Priorities
Omny's Director of GRC, Raymund Hoseña, answers the question: How do you communicate GRC priorities to leadership and employees?
Raymund -frequency of risk assess
The Frequency of Risk Assessments
Omny's Director of GRC, Raymund Hoseña, answers the question: How often should an organization perform a risk assessment?
Raymund -frequency of risk assess-1
The Frequency of Risk Assessments
Omny's Director of GRC, Raymund Hoseña, answers the question: How often should an organization perform a risk assessment?
Raymund -identifying risk
How to Identify and Mitigate Against Emerging Risks
Omny's Director of GRC, Raymund Hoseña, answers the question: What is your approach in identifying and mitigating emerging risks?
Raymund -developing policies
Forming Practical Security Policies for an Organization
Omny's Director of GRC, Raymund Hoseña, answers the question: How do you develop policies that are both effective and practical for employees to follow?
Raymund -risk aware culture
How to Build a Risk-Aware Culture
Omny's Director of GRC, Raymund Hoseña, answers the question: How do you build a strong risk-aware culture in your organization?
Raymund -How to Manage Risk in Your Organization
How to Manage Risk in Your Organization
Omny's Director of GRC, Raymund Hoseña, answers the question: What is risk management for an organization?
Raymund -GRC scaling
Automating GRC to Scale Organizational Security Growth
Omny's Director of GRC, Raymund Hoseña, answers the question: How can organizations ensure GRC technology scales as the organization grows?