Do. Learn. Teach.
Agilicus Webinars
Agilicus provides an ongoing series of Webinars, drawn from the experience of our customers and our team as we evolve our knowledge of Zero Trust and Critical Infrastructure, Industrial Control Systems.
Upcoming Agilicus Webinars
No posts were found.
Previous Agilicus Webinars
-

The False Choice of NERC CIP-003-9: Keep Remote Access and Stay Compliant
NERC CIP-003-9 forced many operators to shut down remote access to achieve compliance. This is a false choice. Learn how to restore vendor connectivity, maintain operational workflows, and satisfy auditors simultaneously using Zero Trust architecture.
-

The Vendor Vulnerability: 5 Lessons from the Major Breaches of 2025
Still trusting vendors with shared VPN keys? That’s how you get breached. Join us to learn how to replace porous network access with bulletproof Zero Trust, Single Sign-On, and Multi-factor Authentication.
-

NERC CIP-003-9: Why Your VPN is a Compliance Dumpster Fire
April 1 brings the enforcement of NERC CIP-003-9 Section 6. Discover why VPNs fail the new Low-Impact BES requirements for vendor remote access and how to implement time-of-need, pre-authorised access with granular audit trails.
-

The Rising Tide of Regulation: Zero Trust for Water Utilities
State mandates for water utility cybersecurity are increasing. Learn how to navigate regulations like CA AB 749 and IN SEA 472 by moving from unsafe VPNs to a Zero Trust Architecture.
-

Why VPNs Are Not a Viable Solution for Multi-Site Manufacturing
As manufacturing networks expand, traditional VPNs create dangerous security gaps like lateral movement and unrestricted access. Join us to discover a safer alternative for multi-site connectivity. Learn how to implement secure, granular remote access that streamlines maintenance, enforces MFA, and protects your critical industrial systems—without the clunky VPN.
-

Improve Mean Time To Repair with a Zero Trust Architecture for Remote Maintenance
When a system suffers an outage or other operational issues, requiring internal or third-party users to be on-site can cost valuable time and money. Allowing your users to remotely access systems allows you to resolve issues faster.
-

How AI Threatens the Industrial Control Systems in Small and Mid-Size Manufacturing
As we move towards 2026 and AI tools become more capable, hackers are turning to them more and more, creating new threats across the board. Explore how you can protect your organization by adopting Zero Trust
-

Cyber Breaches Can Shut Down Your Production Floor
The manufacturing industry is going through a revolution, industry 4.0, impacting the industrial control systems on your manufacturing floor. Protect your organization from evolving threats.
-

Protecting Local Governments from Evolving Cyber Threats
With a recent rise of threat actors conducting large scale cyber attacks you need to ensure that remote access is properly implemented and systems aren’t reachable to threat actors.
-

Upcoming Remote Access Regulation: How Zero Trust Prepares Your Water Infrastructure
Maryland is mandating water facilities and critical infrastructure adopt strict cybersecurity policies for their remote access and network operations. States like New York, California, Texas, and others are quickly following suit. Stay Ahead with Zero Trust
-

Zero Trust: The Cyber Security Mandate for Insuring Your Municipality.
Learn how a Zero Trust framework helps municipalities meet evolving cyber insurance requirements, comply with state mandates, and secure remote access.
-

Municipal Remote Access: Protecting Against Cyber Threats While Streamlining How Users Access Shared Resources
Cyber threats against municipalities are increasing and becoming smarter. With AI backed threat actors and new network vulnerabilities being taken advantage of, the threat to municipalities is larger today than ever. This webinar offers a look into protecting your municipality resources while streamlining remote access.
-

The New Standard for Industrial Water Systems: Industry 4.0 and Hybrid Workforces
Water/wastewater facilities are going through a revolution with technology becoming engrained in critical infrastructure operations. Learn how to safely allow remote access to your critical infrastructure.
-

Cyber Criminals are Adopting AI: Keep your Critical Infrastructure Protected
As threat actors increasingly adopt the use of AI they’ve become able to execute cyber attack attempts at a more personal level, faster. Learn how you can protect your critical infrastructure in a new cyber threat landscape.
-

Protecting Water Systems from Cyber Threats
Don’t choose between security and accessibility. Learn how to secure your water systems while empowering your team to remotely access the resources they need.
-

Remote Operations: Support Client Systems Without VPNs
Your clients rely on your team to keep their industrial control systems up and running smoothly through routine maintenance and ongoing remote support. Learn how you can deploy efficient and effective remote operations while exceeding client security policies
-

Improving Wastewater Remote Connectivity with Zero Trust
Learn how you can enable remote connectivity to industrial water systems on wastewater treatment facility networks.
-

How Securicore Utilizes Zero Trust for Remote Access
Join Agilicus and Securicore to learn how you can enable Zero Trust remote access to the systems/resources on your network
-

Eliminate Shared Passwords for Vendor Access
Learn how you can – without sacrificing security or creating a large spend in time, effort, and resources – enable remote access to industrial control systems on your floor
-

How to Implement Zero Trust for Local Government
Local governments are making the switch to a Zero Trust security model to protect their systems against modern threats. Join us to learn how.
-

Securely Connect to Client Resources, Streamline Operations
Your clients rely on your team to help keep their industrial control systems up and running (HMI, PLC, SCADA) smoothly through routine maintenance and ongoing remote support. Providing remote support can become a headache when firewall/VPN configurations are unique for each client, requiring multiple logins, settings, and platforms for each support ticket.
-

HMI, PLC, and SCADA Water Systems with Multi-Factor Authentication
Multi-factor authentication and single sign-on are two quick and effective ways to improve your security posture without causing a major disruption in your users’ workflow
-

VNC & RDP for Water: Access Dashboards Remotely
Learn how to get the most out of your Virtual Network Computing (VNC) and Remote Desktop Protocol (RDP) for HMI and other usage
-

Add Remote Operations: Support Clients Faster & Reduce Costs
Learn how implementing remote operations to your organization can unlock new efficiencies in the way you troubleshoot and service client systems.
-

Master Vendor and Contractor Access Management
Learn to establish and leverage a robust vendor access management program that reduces third-party cyber risk without complicated workarounds
-

Add Wastewater Remote Operations, Streamline Service
Join us to learn how implementing remote operations to your organization can unlock new efficiencies in the way you troubleshoot and service public water systems.
-

VPN Alternatives for Water and Critical Infrastructure
Learn how we can connect the people who need it. Single Sign On for all, regardless of partner or employee. Multi-factor where needed, even on legacy applications. WITHOUT granting full VPN access.
-

Legacy Life-Extend: More Users, More Secure, No Changes
Legacy municipal support systems are difficult to make widely available without compromising security. Learn how to solve.
-

Cyber Alerts, Best Practices: Put Advice To Action
Government agencies are publishing cyber advice. Each notice is individually full of good facts and advice, but collectively, they are creating indecision: what do I do first? when? how? With what budget? Today we will talk about how to interpret, how to implement, economically, without disruption.
-
-

A VPN Alternative for Local Governments
The VPN, a powerful tool, is not appropriate for all users. Learn how we can connect the digitally disenfranchised. Single Sign-on for all, multi-factor on everything.
-

A VPN Alternative for Manufacturing
The VPN, a powerful tool, is not appropriate for all manufacturing users. Learn how we can connect the people who need it.
-

Cybersecurity on a Budget, Secure and Simple
Whether it’s remote operations and support, on site staff, or routine maintenance – ensuring your industrial water systems have proper access controls without causing a strain on your budget is crucial.
-

Add Remote Support, Leverage Your Specialists
Learn how to enhance efficiency and reduce costs by enabling remote support for your specialist teams. This webinar explores how Agilicus AnyX allows you to meet customer security requirements, incorporate remote access into your service offerings, and lower mean time to repair. Discover how to empower your automation and support specialists to manage multiple client needs simultaneously without the need for costly site visits, VPNs, or hardware installations.
-

Simplify Remote Access, Secure Industrial Equipment
No VPN, No Shadow IT Like TeamViewer. Simplify and Secure remote manufacturing industrial access for multiple divisions, contract manufacturers, vendors
-

Nation State Attacks on Critical Infrastructure – Assess, Understand, Protect
This webinar addresses the increasing threat of nation-state attacks on critical infrastructure, particularly water systems. Learn how easily threat actors can identify vulnerabilities using open-source intelligence (OSINT) and tools like Shodan.io. We’ll discuss recent incidents and demonstrate how to protect your SCADA, PLCs, and HMIs with Agilicus AnyX, implementing essential security controls like multi-factor authentication, single sign-on, and privileged access management to eliminate risks associated with remote access.
-

Nation State Attacks on Water – Assess, Understand, Protect
See how an attacker gains access to information of public water systems. We will use tools like Shodan and nmap to detect and assess common vulnerabilities within industrial water systems.
-

VPN Alternative: Decrease Risk, Increase Simplicity
Local Governments have many different systems to safeguard and manage. Learn how a VPN Alternative can help you safeguard systems without restricting access
-

Remote Operations: VPN Alternatives to Improve Simplicity and Security
The VPN, a powerful tool, is not appropriate for all users. Learn how Agilicus can connect the people who need it.
-

VPN Alternatives for Manufacturing
Learn how Agilicus connects the people who need it with a VPN Alternative for manufacturing. Single Sign On for all, regardless of partner or employee. Multi-factor where needed, even on legacy applications.
-

VPN Alternatives for Water and Critical Infrastructure
VPN Alternatives for Water: Emergency directives regarding VPNs serve as a wake up call for a rethink.
-

VPN Alternative for Local Governments
3 recent emergency directives on VPNs? A VPN is a security risk in local government networks. Examine Zero Trust VPN Alternative for Local Governments
-

Securing Wastewater Remote Connectivity with Segmentation and Zero Trust
The modern wastewater plant is now a blend of data centers and pipes. Learn about the complex challenges of allowing remote connectivity to systems in a wastewater treatment facility
-

Solve Vendor Multi-Factor and Single Sign-On for Industrial Support
Learn how you can securely enable vendor remote access to industrial control systems with multi-factor authentication, least privilege access, and single sign-on.
-

Add Wastewater Remote Operations, Expand Revenue
Learn how wastewater remote operations is unlocking new, more profitable and predictable revenue streams by adding pre-defined remote operations services to their portfolio.
-

Fortifying Manufacturing Systems: A Foolproof Framework for Secure Remote Access
Fortifying Manufacturing Systems. Enable secure remote access for any user (with any company) who requires access to systems on the manufacturing floor.
-

Secure Remote Access for Water: Sharing Multiple Dashboards Over VNC
Learn how to get the most out of your VNC apps and workflows with Agilicus AnyX. Discover how to streamline access while limiting it to the right people at the right time.
-

Municipal Cybersecurity Success Stories from Across Canada
Two Canadian Municipalities share their experience deploying Zero Trust with Agilicus AnyX to increase their Cyber Security.
-

Streamlining User Management: Master Vendor Access with Zero Trust
Tune in to this webinar to learn how to streamline vendor access with Zero Trust without a VPN or hardware install.
-

Secure Access for Water: Unlock Application-Only Remote Desktop Access Anytime, Anywhere
Learn how to secure Remote Desktop Protocol (RDP) access for water organizations with Agilicus AnyX. This webinar demonstrates how to provide application-only RDP access, preventing users from accessing the entire desktop environment when only specific applications are needed. Discover how to implement crucial security controls like multi-factor authentication, single sign-on, and least privilege access, while streamlining workflows and enabling secure remote application access from any device.
-

Rockwell Studio 5000™ for Industrial Control Systems: How to Properly Secure & Grant Access
Remotely view tags, program PLC with Rockwell Studio 5000, with no VPN.
-

A Modern Air Gap for Operational Technology
Learn how creating a modern air gap increases your security posture drastically compared to legacy solutions like the VPN and TeamViewer.
-

VPN Alternative for Local Governments: Why and How
A VPN is a security risk in local government networks. Examine Zero Trust alternatives.
-

A Modern Air Gap for Operational Technology
Learn how creating a modern air gap increases your security posture drastically compared to legacy solutions like the VPN.
-

Strengthening the Security Structure of a Water Treatment Facility
Join us online on February 9 and learn how a modern security structure can be strengthened in a water treatment facility.
-

How to Connect to an HMI without a VPN
Connect to an HMI without a VPN. Extend secure access to employees and vendors.
-

The City of Kenosha’s Zero Trust Cybersecurity Transformation
Discover how the City of Kenosha seamlessly pivoted towards a resilient, Zero Trust environment. Embrace a non-VPN paradigm to safeguard your local government.
-

Securing Access to Industrial Control Systems with Zero Trust
Learn how to modernize the manufacturing floor with secure, remote access to Industrial Control System without a VPN or new hardware.
-

Keeping Manufacturing Lines Safe and Efficient: The Power of Least Privilege Access
Keeping Manufacturing Lines Safe and Efficient: The Power of Least Privilege Access. Discover how the principle of least privilege access can ensure your manufacturing systems are safe and running smoothly.
-

Simple, Seamless, Secure: A New Era of Vendor Access for Manufacturing
Join us to learn how organizations are mastering vendor access management to reduce cyber risk without complicated workarounds or disruptive implementations.
-

Guarding the Gate: Embracing Cybersecurity in Public Water Systems
Explore the evolving cybersecurity landscape for public water systems, especially in light of new EPA requirements. Embracing Cybersecurity in Public Water Systems
-
Protecting Industrial Networks with Vendor Access Management
Learn how proper Vendor Access Management reduces cyber risk in a manufacturing setting by reducing your attack surface while enabling secure, auditable access for authorized non-employees.
-

Protecting Critical Infrastructure – Zero Trust and NIST 800-53 CyberSecurity Framework
Learn how Zero Trust strengthens the security of Critical Infrastructure systems with role-based access controls, multi-factor authentication, and detailed audit trails.
-
Securing Access to Industrial Control Systems with Zero Trust
Modern, Simple, Secure Securing Access to Industrial Control Systems with Zero Trust Learn how to modernise your Industrial Control System applications and resources through implementing secure, remote access without a VPN or new hardware. You’ll learn how to enable remote maintenance and troubleshooting while keeping systems off the public internet. During this session we’ll demonstrate how modernising your Industrial Control Systems can improve your cyber posture while also saving time and money. Read MORE Securing Access to Industrial Control Systems…
-

VPN Alternative Access to SCADA Systems
VPN Alternative Access to SCADA Systems. Learn how to enable secure remote access to public sector critical infrastructure and SCADA applications without a VPN.
-

Aligning Critical Infrastructure Security with National Priorities through Zero Trust
Learn how zero trust can help critical infrastructure enhance security and reduce cyber risk without disrupting workflows and operations.
-

Web Application Security – Protecting Against the Top 10 OWASP Threats with Zero Trust
Join us and learn how your organisation can improve web application security and protect against the OWASP Top 10 threats with Zero Trust.
-

How to Connect to SCADA Systems without a VPN
Enable secure connectivity for municipal SCADA systems without a VPN through a Zero Trust Network Architecture.
-

Municipal Cyber Insurance: Improve Security and Meet Minimum Hygiene Requirements
Learn how municipalities can leverage Zero Trust to improve security and meet minimum hygiene requirements for cyber insurance.
-

Eliminating the Business Risk of Shared Credentials
Join us and learn how to eliminate the business risk of shared credentials without burdening your employees or compromising on security.
-

How to Connect to Operational Technology and Critical Systems without a VPN
How to connect to critical systems and operational technology without the need for a VPN. That means authorised users can get the remote access they need without exposing business-critical systems and infrastructure to the public internet.
-

Multi-Factor Authentication for Municipal Cyber Insurance
Join us on December 7 at 1:00pm ET, for an online event where we’ll be diving into Multi-Factor Authentication for Cyber Insurance and what you need to know