Upcoming Webinar: Navigating OT Remote Access – Technologies and Limitations, October 30
Days
Hours
Minutes
Seconds
Register Now

All

Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you [benefit or goal of the resources].

  • All
  • Blog
  • Books and eBooks
  • Case studies
  • Infographic
  • Podcast
  • Video

Cloud-Rendezvous-Style OT Remote Access: Residual Risk

Cloud-Rendezvous-Style OT Remote Access
Cloud-Rendezvous-Style OT Remote Access

Cloud-Rendezvous-Style OT Remote Access: Residual Risk

Security product vendors sometimes make outrageous claims - in this article we look at cloud-rendezvous style remote access…
Read more
Secure OT Remote Access Webinar

Webinar: Navigating OT Remote Access - Technologies, Limitations, and the Latest Recommendations

Join us for an insightful webinar where we delve into the rapidly evolving landscape of OT remote access.…
Read more
2024 OT security threat report inclusion criteria

The 2024 Threat Report: Prioritizing Cyber Security Spending

Tracking and filtering through the volume of incidents arriving at all hours can be fun but also all-consuming.…
Read more
OT Security blog post about how likely a security flaw might end up unaliving someone

How Likely Is That To Kill Anyone?

While ECC is misunderstood by many IT practitioners, ECC is misapplied by many engineers. Some patches – for…
Read more
Podcast: 131 about OT Security for Cars

Hitting Tens of Thousands of Vehicles At Once | Episode 131

Matt MacKinnon handles Global Strategic Alliances at Upstream Security. Matt is an accomplished manager with success in leading…
Read more
Singapore OT Cybersecurity Plan

The Singapore OT Cybersecurity Masterplan

In this article we focus on this fourth area of focus, Secure-by-Deployment, which is integral to materially strengthening…
Read more
OT Security podcast episode 130 - Andrew Ginter and Nate

AI Takes on Polymorphic Malware | Episode 130

Gary Southwell is a cybersecurity veteran who worked on deploying some of the first Checkpoint firewalls back in…
Read more
IT remote access vs OT remote access

IT Remote Access VS. OT Remote Access

For IT Remote Access: Uses commercial off-the-shelf (COTS) solutions like VPNs, remote desktop services, and cloud-based remote access…
Read more
Adapting IT Advice for OT podcast episode 129

New Resource: Adapting IT Advice for OT | Episode 129

Jack Bliss is a motivated cybersecurity consultant that enjoys working with others to achieve common goals. Experience with…
Read more

Cloud-Rendezvous-Style OT Remote Access: Residual Risk

Cloud-Rendezvous-Style OT Remote Access
Cloud-Rendezvous-Style OT Remote Access

Cloud-Rendezvous-Style OT Remote Access: Residual Risk

Security product vendors sometimes make outrageous claims - in this article we look at cloud-rendezvous style remote access…
Read more
2024 OT security threat report inclusion criteria

The 2024 Threat Report: Prioritizing Cyber Security Spending

Tracking and filtering through the volume of incidents arriving at all hours can be fun but also all-consuming.…
Read more
OT Security blog post about how likely a security flaw might end up unaliving someone

How Likely Is That To Kill Anyone?

While ECC is misunderstood by many IT practitioners, ECC is misapplied by many engineers. Some patches – for…
Read more
Singapore OT Cybersecurity Plan

The Singapore OT Cybersecurity Masterplan

In this article we focus on this fourth area of focus, Secure-by-Deployment, which is integral to materially strengthening…
Read more
IT remote access vs OT remote access

IT Remote Access VS. OT Remote Access

For IT Remote Access: Uses commercial off-the-shelf (COTS) solutions like VPNs, remote desktop services, and cloud-based remote access…
Read more
AI Generated OT Payloads - Jesus Molina Blog

The Art of AI-Generated OT Payloads: From Mischief to Existential Threat

Defenders have utilized AI for years, but the democratization of AI will complicate the defense against system misconfigurations…
Read more
Cybersecurity approaches unique to OT security

Cybersecurity Approaches Unique to OT Security

All these initiatives are long overdue. When I explain these opportunities, perspectives and opportunities to stakeholders from engineering…
Read more
Hardware enforced remote access for OT - UNDER THE HOOD

Hardware-Enforced Remote Access (HERA) - Under the Hood

Where does HERA fit within the broader spectrum of remote access solution security? In the illustration, HERA is…
Read more
HERA remote access banner

Remote Access Vulnerabilities and a Hardware-Enforced Solution

The common theme? These are all vulnerabilities that compromise software-based remote access systems. Hence the problem: many critical…
Read more

How Are OT Hackers Getting IN Today?

How OT hackers are getting IN today
How OT hackers are getting IN today

How Are OT Hackers Getting IN Today?

Read more

The 2023 Threat Report – At a Glance

The new 2023 OT Cyber Threats Report is available – a collaboration between Waterfall Security Solutions and ICSSTRIVE.…
Read more
NIS2 Directive and Impact on OT Cybersecurity

NIS2 and Its Impact on Operational Technology Cybersecurity

The Network and Information Systems Directive (NIS2) primarily focuses on information technology (IT) and addresses the protection of…
Read more
Segmentation 202 Unidirectional Architectures

Segmentation 202: Unidirectional Architectures

This is the second blog in the series, following Segmentation 201: Unidirectional Gateways vs. Firewalls. Unidirectional architectures are…
Read more
OT Risk Management Getting Started and Assigning Risk

OT Risk Management: Getting Started and Assigning Risk

OT SYSTEMS ARE INCREASINGLY JUST AS EXPOSED TO ATTACKS AS IT SYSTEMS The increase in digitalization, automation, cloud…
Read more

CISA ICSJWG Event - A Lot to Look Forward To

The first face-to-face CISA / JCDC ICSJWG event is running in Salt Lake City May 9-11. I am…
Read more
Air Gaps - I don't think it means what you think it means

Air Gaps – I do not think it means what you think it means

Air gaps are confusing – a significant minority of practitioners use the term “air gap” in a way…
Read more

Ransomware Attacks on Hospitals: The Good, the Bad, and the Ugly

The Hospital Clinic in Barcelona recently suffered a ransomware cyberattack. This ransomware affected the services of the 819-bed…
Read more

The OT Security Revolution

From IT security inspiration to OT security innovation, we are living in the OT security revolution. In recent…
Read more

Cloud-Rendezvous-Style OT Remote Access: Residual Risk

Cloud-Rendezvous-Style OT Remote Access
Cloud-Rendezvous-Style OT Remote Access

Cloud-Rendezvous-Style OT Remote Access: Residual Risk

Security product vendors sometimes make outrageous claims - in this article we look at cloud-rendezvous style remote access…
Read more
2024 OT security threat report inclusion criteria

The 2024 Threat Report: Prioritizing Cyber Security Spending

Tracking and filtering through the volume of incidents arriving at all hours can be fun but also all-consuming.…
Read more
OT Security blog post about how likely a security flaw might end up unaliving someone

How Likely Is That To Kill Anyone?

While ECC is misunderstood by many IT practitioners, ECC is misapplied by many engineers. Some patches – for…
Read more
Singapore OT Cybersecurity Plan

The Singapore OT Cybersecurity Masterplan

In this article we focus on this fourth area of focus, Secure-by-Deployment, which is integral to materially strengthening…
Read more
IT remote access vs OT remote access

IT Remote Access VS. OT Remote Access

For IT Remote Access: Uses commercial off-the-shelf (COTS) solutions like VPNs, remote desktop services, and cloud-based remote access…
Read more
AI Generated OT Payloads - Jesus Molina Blog

The Art of AI-Generated OT Payloads: From Mischief to Existential Threat

Defenders have utilized AI for years, but the democratization of AI will complicate the defense against system misconfigurations…
Read more
Cybersecurity approaches unique to OT security

Cybersecurity Approaches Unique to OT Security

All these initiatives are long overdue. When I explain these opportunities, perspectives and opportunities to stakeholders from engineering…
Read more
Hardware enforced remote access for OT - UNDER THE HOOD

Hardware-Enforced Remote Access (HERA) - Under the Hood

Where does HERA fit within the broader spectrum of remote access solution security? In the illustration, HERA is…
Read more
HERA remote access banner

Remote Access Vulnerabilities and a Hardware-Enforced Solution

The common theme? These are all vulnerabilities that compromise software-based remote access systems. Hence the problem: many critical…
Read more

2024 Threat Report – OT Cyberattacks with Physical Consequences

Threat Report Webinar
Threat Report Webinar

2024 Threat Report – OT Cyberattacks with Physical Consequences

Report on 68 cyberattacks that caused physical consequences to industrial control systems (ICS) and Operational Technology (OT) in…
Read more

eBook: Unidirectional Security Gateways for Government Networks

Download your copy today and learn how to fully secure government networks against all remote cyber threats including…
Read more

Engineering-grade OT Security - A Manager's Guide

Fill out the form and get your copy today.
Read more
2023 Threat Report - OT Cyberattacks With Physical Consequences

2023 Threat Report - OT Cyberattacks With Physical Consequences

Two cyberattacks that bankrupted the targeted organizationAn attack that resulted in a fire that damaged equipment and put…
Read more
Firewalls vs Unidirectional Gateways Ebook

Firewalls vs Unidirectional Gateways Ebook

Define what is a firewallReview firewall principlesIntroduce Unidirectional GatewaysCompare the effectiveness of these two network perimeter protection solutions…
Read more
BSEE Real-time Monitoring (RTM) Requirements For OCS Operators

BSEE Real-time Monitoring (RTM) Requirements For OCS Operators

Fill out the form and get your copy today.
Read more
OT Security Incidents In 2021

OT Security Incidents In 2021

2021 Data OT Outages​Ransomware Consequences​Future Recommendations​Conclusions​
Read more
Cybersecurity for AVEVA PI Servers

Cybersecurity for AVEVA PI Servers

The Problem with Firewalls & DMZ ConfigurationsSecurity for AVEVA PI & Data Hub InstallationsThe Unidirectional Alternative & ScenariosWaterfall…
Read more
ICS/OT Ransomware in the Supply Chain: Learnings from attacks in 2020 ebook

ICS/OT Ransomware in the Supply Chain: Learnings from attacks in 2020 ebook

Targeted ransomware was responsible for all OT/industrial shutdowns in 2020. Add to this the SolarWinds supply chain…
Read more

Cybersecurity for Government Networks

Government Network Cybersecurity
Government Network Cybersecurity

Cybersecurity for Government Networks

Securing a classified/high-security network with a Unidirectional Security Gateway, ensuring continuous and secure cross-domain data flow, while preventing…
Read more
UAE based oil and gas refinery

UAE Based Oil & Gas Refinery 

Click to enlarge
Read more
European TSO Case Study

Securing a European TSO

100% Security: With Unidirectional Security Gateways, the PI Production Server is now physically protected from any threats emanating…
Read more
Cybersecurity In Mining

Cybersecurity In Mining

Cyber Threats To The Mining Industry
Read more

Cybersecurity for Government Networks

Government Network Cybersecurity
Government Network Cybersecurity

Cybersecurity for Government Networks

Securing a classified/high-security network with a Unidirectional Security Gateway, ensuring continuous and secure cross-domain data flow, while preventing…
Read more
UAE based oil and gas refinery

UAE Based Oil & Gas Refinery 

Click to enlarge
Read more
European TSO Case Study

Securing a European TSO

100% Security: With Unidirectional Security Gateways, the PI Production Server is now physically protected from any threats emanating…
Read more
Cybersecurity In Mining

Cybersecurity In Mining

Cyber Threats To The Mining Industry
Read more

2024 Threat Report – OT Cyberattacks with Physical Consequences

Threat Report Webinar
Threat Report Webinar

2024 Threat Report – OT Cyberattacks with Physical Consequences

Report on 68 cyberattacks that caused physical consequences to industrial control systems (ICS) and Operational Technology (OT) in…
Read more

eBook: Unidirectional Security Gateways for Government Networks

Download your copy today and learn how to fully secure government networks against all remote cyber threats including…
Read more

Engineering-grade OT Security - A Manager's Guide

Fill out the form and get your copy today.
Read more
2023 Threat Report - OT Cyberattacks With Physical Consequences

2023 Threat Report - OT Cyberattacks With Physical Consequences

Two cyberattacks that bankrupted the targeted organizationAn attack that resulted in a fire that damaged equipment and put…
Read more
Firewalls vs Unidirectional Gateways Ebook

Firewalls vs Unidirectional Gateways Ebook

Define what is a firewallReview firewall principlesIntroduce Unidirectional GatewaysCompare the effectiveness of these two network perimeter protection solutions…
Read more
BSEE Real-time Monitoring (RTM) Requirements For OCS Operators

BSEE Real-time Monitoring (RTM) Requirements For OCS Operators

Fill out the form and get your copy today.
Read more
OT Security Incidents In 2021

OT Security Incidents In 2021

2021 Data OT Outages​Ransomware Consequences​Future Recommendations​Conclusions​
Read more
Cybersecurity for AVEVA PI Servers

Cybersecurity for AVEVA PI Servers

The Problem with Firewalls & DMZ ConfigurationsSecurity for AVEVA PI & Data Hub InstallationsThe Unidirectional Alternative & ScenariosWaterfall…
Read more
ICS/OT Ransomware in the Supply Chain: Learnings from attacks in 2020 ebook

ICS/OT Ransomware in the Supply Chain: Learnings from attacks in 2020 ebook

Targeted ransomware was responsible for all OT/industrial shutdowns in 2020. Add to this the SolarWinds supply chain…
Read more

Top 10 Cyberattacks of 2023

Top 10 Cyberattacks of 2023

2023 saw an uptick of cyberattacks across many industries. Our infographic focuses on cyberattacks in 2023 that impacted…
Read more

Get the Checklist | EPA Cybersecurity Guidelines for the Water Sector

As part of the Whitehouse’s broader efforts to protect American infrastructure from attacks by nation-states and other cyber…
Read more

Cyber Attacks On Critical Infrastructure

Cyber Attacks On Critical Infrastructure Infographic Looking to stay informed about the latest cyber attacks on critical infrastructure?…
Read more

How cyber attacks impact industrial operations? (Infographic)

Sophisticated, targeted ransomware attacks shutting down OT systems and critical infrastructure have gained considerable momentum in recent years.…
Read more

Cyber Attacks On Critical Infrastructure

Cyber Attacks On Critical Infrastructure

Read more

How cyber attacks impact industrial operations? (Infographic)

Sophisticated, targeted ransomware attacks shutting down OT systems and critical infrastructure have gained considerable momentum in recent years.…
Read more

Top 10 Cyberattacks of 2023

Top 10 Cyberattacks of 2023

2023 saw an uptick of cyberattacks across many industries. Our infographic focuses on cyberattacks in 2023 that impacted…
Read more

Hitting Tens of Thousands of Vehicles At Once | Episode 131

Podcast: 131 about OT Security for Cars
Podcast: 131 about OT Security for Cars

Hitting Tens of Thousands of Vehicles At Once | Episode 131

Compromise a cloud service and tens thousands of vehicles can be affected all at once. Matt MacKinnon of…
Read more
OT Security podcast episode 130 - Andrew Ginter and Nate

AI Takes on Polymorphic Malware | Episode 130

Gary Southwell is a cybersecurity veteran who worked on deploying some of the first Checkpoint firewalls back in…
Read more
Adapting IT Advice for OT podcast episode 129

New Resource: Adapting IT Advice for OT | Episode 129

Jack Bliss is a motivated cybersecurity consultant that enjoys working with others to achieve common goals. Experience with…
Read more
Airport Cybersecurity Podcast episode 128

Their Own Rail System, Water Treatment, and More | Episode 128

Eric Vautier completed his studies at the French Civil Aviation University in 1992 and joined Group ADP in…
Read more
Industrial Security Podcast Alex Yevtushenko Salvador Technologies

Rapid Recovery After an Attack | Episode 127

Alex Yevtushenko is the Co-Founder and CEO of Salvador Technologies. He previously worked at Acktar as a R&D…
Read more
Susan Farrell joins to discuss weaknesses vs vulnerabilities

CWE for Zero Days - not CVE | Episode 126

Susan has over 20 years of experience in the technology industry and is passionate about finding and delivering…
Read more
AI and Industrial Security in the Energy Transition

AI and Industrial Security in the Energy Transition | Episode 125

Leo Simonovich is VP and Global Head of Industrial Cyber and Digital Security at Siemens Energy. He is…
Read more
Robin Berthier of Network Perception on Podcast 124

Evaluating Network Segmentation Strength | Episode 124

Dr. Robin Berthier is the co-founder and CEO of Network Perception. He has over 15 years of experience…
Read more
Podcast Marcus Sachs Tractors to Table Tops

Tractors to Table Tops - Industrial Security in the Industry of Human Consumables | Episode 123

Marcus Sachs is an internationally recognized senior executive with over 40 years of professional leadership in national, homeland,…
Read more

Risk in Context: When to Patch, When to Let It Ride | Episode 109

Risk in Context: When to Patch, When to Let It Ride | Episode 109

Read more
Hacking the Canbus, with Dr Ken Tindell

Hacking the CANbus | Episode 108

In this episode, Dr. Ken Tindell, the CTO at Canis, joins us to talk about cybersecurity and cars. Modern cars…
Read more

Saving Money and Effort Automating Compliance | Episode 107

In this episode, Kathryn Wagner, the Vice President, Industry Solutions, Energy & Utilities at Assurx, joins us to explore the…
Read more

How Cyber Fits Into Big-Picture Risk | Episode 106

In this episode, Dr. Janaka Ruwanpura, Vice-Provost, University of Calgary joins us to look at where cyber risks…
Read more

Six Steps to Integrating IT & OT in Mining | Episode 105

In this episode, Rob Labbé from Mining and Metals ISAC explains how and why risk assessments are needed and…
Read more

Jesus Molina on the Biden National Cyber Strategy

The Biden-Harris administration recently released their National Cybersecurity Strategy. This week, Jesus Molina of Waterfall Security joined ICS…
Read more

Stakeholder-Specific Vulnerability Categorization (SSVC) | Episode #102

Stakeholder-specific vulnerability categorization (SSVC) is a new alternative to the common vulnerability scoring system (CVSS) used in the…
Read more

Bridging industrial Cybersecurity Workforce Gaps | Episode #101

Industrial cybersecurity workforce gaps are not all the same. Different kinds of organizations in different stages of their…
Read more

Engineering-Grade security in the US DOE Cyber Informed Engineering Strategy | Episode #100

Cyber Informed Engineering – the new US DOE Strategy includes unhackable safeties, manual operations, and other engineering-grade protections,…
Read more

Hitting Tens of Thousands of Vehicles At Once | Episode 131

Podcast: 131 about OT Security for Cars
Podcast: 131 about OT Security for Cars

Hitting Tens of Thousands of Vehicles At Once | Episode 131

Compromise a cloud service and tens thousands of vehicles can be affected all at once. Matt MacKinnon of…
Read more
OT Security podcast episode 130 - Andrew Ginter and Nate

AI Takes on Polymorphic Malware | Episode 130

Gary Southwell is a cybersecurity veteran who worked on deploying some of the first Checkpoint firewalls back in…
Read more
Adapting IT Advice for OT podcast episode 129

New Resource: Adapting IT Advice for OT | Episode 129

Jack Bliss is a motivated cybersecurity consultant that enjoys working with others to achieve common goals. Experience with…
Read more
Airport Cybersecurity Podcast episode 128

Their Own Rail System, Water Treatment, and More | Episode 128

Eric Vautier completed his studies at the French Civil Aviation University in 1992 and joined Group ADP in…
Read more
Industrial Security Podcast Alex Yevtushenko Salvador Technologies

Rapid Recovery After an Attack | Episode 127

Alex Yevtushenko is the Co-Founder and CEO of Salvador Technologies. He previously worked at Acktar as a R&D…
Read more
Susan Farrell joins to discuss weaknesses vs vulnerabilities

CWE for Zero Days - not CVE | Episode 126

Susan has over 20 years of experience in the technology industry and is passionate about finding and delivering…
Read more
AI and Industrial Security in the Energy Transition

AI and Industrial Security in the Energy Transition | Episode 125

Leo Simonovich is VP and Global Head of Industrial Cyber and Digital Security at Siemens Energy. He is…
Read more
Robin Berthier of Network Perception on Podcast 124

Evaluating Network Segmentation Strength | Episode 124

Dr. Robin Berthier is the co-founder and CEO of Network Perception. He has over 15 years of experience…
Read more
Podcast Marcus Sachs Tractors to Table Tops

Tractors to Table Tops - Industrial Security in the Industry of Human Consumables | Episode 123

Marcus Sachs is an internationally recognized senior executive with over 40 years of professional leadership in national, homeland,…
Read more

Webinar: HERA - Hardware-Enforced Remote Access

HERA Webinar Recording
HERA Webinar Recording

Webinar: HERA - Hardware-Enforced Remote Access

Recorded webinar as we took a look at solutions enforced by dedicated hardware, and what benefits such solutions…
Read more
Water Webinar Recording

Webinar Recording: Engineering Cybersecurity Mitigations for Municipal Water Systems

Large water utilities are looking to gain efficiencies by adopting new distributed edge devices and digital transformation initiatives…
Read more
Mining Webinar Recording

Webinar Recording: Cyber-securing Safety and Equipment Protection Systems in Mining

Safety is the top priority in almost all mines, and reliable, efficient physical operations are close seconds. Cybersecurity…
Read more
Threat Report Webinar

Webinar Recording: Cyber Attacks with Physical Consequences – 2024 Threat Report

The new Waterfall Security / ICSStrive Threat Report documents 68 cyber attacks with real-world physical consequences impacting 515…
Read more
Webinar Recording OT/IT with CIE

Recorded Webinar: Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations

Integrating OT with IT introduces new threats to the reliability of existing operations. Connected networks move more than…
Read more
NIS2 Recorded Webinar

Recorded Webinar: The NIS2 Directive: A Guide for OT Professionals

In this recorded webinar, we take an in-depth look at the European NIS2 Directive and help explain…
Read more
Top 10 Cyberattacks 2023 Webinar Recording

Recorded Webinar: The Top 10 OT/ICS Cyberattacks of 2023

In this webinar recording, we take an in-depth look at the most novel, notorious, and impactful cyber…
Read more
Andrew Ginter new book recorded webinar

Recorded Webinar: Engineering-Grade OT Security: A Manager’s Guide

Want to get your advanced copy of Andrew Ginter's new book? >>Click here to get your copy
Read more
Network Engineering Recorded Webinar

Network Engineering | Recorded Webinar

Engineering-grade solutions are deterministic and predictable. Cyber-Informed Engineering (CIE) is exploring safety engineering, protection engineering and other engineering…
Read more

Evolving OT Cyber Attacks - Theory to Reality | Recorded Webinar

Evolving OT Cyber Attacks - Theory to Reality | Recorded Webinar

Read more

Missing Links for Managing OT Cyber Risk | Recorded Webinar Securityweek

Managing OT cyber risk is more than cybersecurity - an IT-SEC only approach ignores powerful engineering tools for…
Read more

12 Months of Cyber Attacks—Lessons, Trends, and Predictions | Automation.com Recorded Webinar

Industrial cyber attacks leading to production downtime and other physical consequences more than doubled in 2021 over 2020.…
Read more

Watch: Naoufal Kerboute's Interview at GISEC 2022 for TECHx

Last March Waterfall Security Solutions participated in one of the important events at UAE - GISEC. Naoufal Kerboute,…
Read more

Watch: Andrew Ginter's Interview at GISEC 2022 for TECHx

Last March Waterfall Security Solutions participated in one of the important events at UAE - GISEC. Andrew Ginter,…
Read more

Redefining OT security with Unidirectional Security Gateways

Watch highlights from an interview by Ran Pedhazur, Chief Business Development Officer at Waterfall, and Nicolai Solling, Chief…
Read more
Bakotech Webinar Recording Firewalls vs. Unidirectional Security Gateways

Bakotech Webinar Recording: Firewalls vs. Unidirectional Security Gateways

https://www.youtube.com/watch?v=nGJaJnXPZdc eBook | Firewalls vs. Unidirectional Gateways
Read more

How to Protect Critical Infrastructure from Cyberattacks

https://www.youtube.com/watch?v=UkYCFBy_9Q0&ab_channel=WaterfallSecuritySolutions SUBSCRIBE NEXT EPS. PREVIOUS EPS. PREVIOUS EPS. SUBSCRIBE NEXT EPS. Free consultation with Unidirectional solutions architect CONTACT…
Read more

Rise of Ransomware 2022 | Industrial Security Institute

https://www.youtube.com/watch?v=i9oEDAYrI-o&t=17s&ab_channel=WaterfallSecuritySolutions THE INDUSTRIAL SECURITY INSTITUTE OT / industrial / ICS cybersecurity concepts from the perspective of the world’s…
Read more

Webinar Recording: Engineering Cybersecurity Mitigations for Municipal Water Systems

Water Webinar Recording
Water Webinar Recording

Webinar Recording: Engineering Cybersecurity Mitigations for Municipal Water Systems

Mariano Martín Tirado, from Acciona, and Rees Machtemes, from Waterfall, discuss the risks and threat environment that Water…
Read more
Mining Webinar Recording

Webinar Recording: Cyber-securing Safety and Equipment Protection Systems in Mining

Safety is the top priority in almost all mines, and reliable, efficient physical operations are close seconds. Cybersecurity…
Read more
Threat Report Webinar

Webinar Recording: Cyber Attacks with Physical Consequences – 2024 Threat Report

The new Waterfall Security / ICSStrive Threat Report documents 68 cyber attacks with real-world physical consequences impacting 515…
Read more
Webinar Recording OT/IT with CIE

Recorded Webinar: Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations

Integrating OT with IT introduces new threats to the reliability of existing operations. Connected networks move more than…
Read more
NIS2 Recorded Webinar

Recorded Webinar: The NIS2 Directive: A Guide for OT Professionals

In this recorded webinar, we take an in-depth look at the European NIS2 Directive and help explain…
Read more
Top 10 Cyberattacks 2023 Webinar Recording

Recorded Webinar: The Top 10 OT/ICS Cyberattacks of 2023

In this webinar recording, we take an in-depth look at the most novel, notorious, and impactful cyber…
Read more
Andrew Ginter new book recorded webinar

Recorded Webinar: Engineering-Grade OT Security: A Manager’s Guide

Want to get your advanced copy of Andrew Ginter's new book? >>Click here to get your copy
Read more
Network Engineering Recorded Webinar

Network Engineering | Recorded Webinar

Engineering-grade solutions are deterministic and predictable. Cyber-Informed Engineering (CIE) is exploring safety engineering, protection engineering and other engineering…
Read more
AVEVA | Webinar | Engineering Grade Security for Water Utilities

Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities

Our Webinar with Andrew Ginter of Waterfall Security Solutions and Bill McEvoy of AVEVA covered many facets of…
Read more

Webinar: Navigating OT Remote Access - Technologies, Limitations, and the Latest Recommendations

Secure OT Remote Access Webinar
Secure OT Remote Access Webinar

Webinar: Navigating OT Remote Access - Technologies, Limitations, and the Latest Recommendations

Join us for an insightful webinar as we delve into the rapidly evolving landscape of OT remote access.…
Read more
HERA Webinar Recording

Webinar: HERA - Hardware-Enforced Remote Access

Software-based remote access — VPNs, 2FA, firewalls, jump hosts, and more all have vulnerabilities and potential zero-days that…
Read more
Threat Report Webinar 2024

Cyber Attacks with Physical Consequences – 2024 Threat Report

Understanding threats is essential to designing effective defenses. We invite you to join Andrew Ginter, Rees Machtemes and…
Read more

Webinar: The NIS2 Directive: A Guide for OT Professionals

Register to join our upcoming webinar as Dr. Jesus Molina takes us through the ins-and-outs of the…
Read more

Webinar: The Top 10 OT/ICS Cyberattacks of 2023

Join our webinar for an in-depth look at the most novel, notorious and impactful cyber incidents of…
Read more

Webinar: Engineering-Grade OT Security: A manager's guide

Join our webinar to learn about engineering-grade OT security, a new model for cyber risk, and how…
Read more

Network Engineering Webinar

Join our next webinar on October 3, 11 am New York time/ 8 am Pacific Time Engineering-grade…
Read more

Webinar: Navigating OT Remote Access - Technologies, Limitations, and the Latest Recommendations

Secure OT Remote Access Webinar
Secure OT Remote Access Webinar

Webinar: Navigating OT Remote Access - Technologies, Limitations, and the Latest Recommendations

Join us for an insightful webinar as we delve into the rapidly evolving landscape of OT remote access.…
Read more
HERA Webinar Recording

Webinar: HERA - Hardware-Enforced Remote Access

Software-based remote access — VPNs, 2FA, firewalls, jump hosts, and more all have vulnerabilities and potential zero-days that…
Read more
Threat Report Webinar 2024

Cyber Attacks with Physical Consequences – 2024 Threat Report

Understanding threats is essential to designing effective defenses. We invite you to join Andrew Ginter, Rees Machtemes and…
Read more

Webinar: The NIS2 Directive: A Guide for OT Professionals

Register to join our upcoming webinar as Dr. Jesus Molina takes us through the ins-and-outs of the…
Read more

Webinar: The Top 10 OT/ICS Cyberattacks of 2023

Join our webinar for an in-depth look at the most novel, notorious and impactful cyber incidents of…
Read more

Webinar: Engineering-Grade OT Security: A manager's guide

Join our webinar to learn about engineering-grade OT security, a new model for cyber risk, and how…
Read more

Network Engineering Webinar

Join our next webinar on October 3, 11 am New York time/ 8 am Pacific Time Engineering-grade…
Read more

Stay up to date

Subscribe to our blog and receive insights straight to your inbox