All
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you [benefit or goal of the resources].
- All
- Blog
- Books and eBooks
- Case studies
- Infographic
- Podcast
- Video
496
Blog
Hardware-Enforced Remote Access (HERA) - Under the Hood
Andrew Ginter
![Hardware enforced remote access for OT - UNDER THE HOOD](https://waterfall-security.com/wp-content/uploads/2024/07/HERA-Under-the-Hood-blog-banner.jpg)
![Hardware enforced remote access for OT - UNDER THE HOOD](https://waterfall-security.com/wp-content/uploads/2024/07/HERA-Under-the-Hood-blog-banner.jpg)
Blog
Hardware-Enforced Remote Access (HERA) - Under the Hood
Waterfall's HERA is a true interactive OT remote access with unidirectional protection for OT. How does it work?
Read more
![HERA remote access banner](https://waterfall-security.com/wp-content/uploads/2024/07/HREA-Blog-remote-access-banner.jpg)
Blog
Remote Access Vulnerabilities and a Hardware-Enforced Solution
The common theme? These are all vulnerabilities that compromise software-based remote access systems. Hence the problem: many critical…
Read more
![](https://waterfall-security.com/wp-content/uploads/2024/06/HERA-Webinar-Banner.png)
Webinar
Webinar: HERA - Hardware-Enforced Remote Access
Software-based remote access — VPNs, 2FA, firewalls, jump hosts, and more all have vulnerabilities and potential zero-days that…
Read more
![Airport Cybersecurity Podcast episode 128](https://waterfall-security.com/wp-content/uploads/2024/07/airport-cybersecurity-podcast-epsidoe-128.png)
Podcast
Their Own Rail System, Water Treatment, and More | Episode 128
Eric Vautier completed his studies at the French Civil Aviation University in 1992 and joined Group ADP in…
Read more
![Oil and Gas protection against ransomware](https://waterfall-security.com/wp-content/uploads/2024/07/preventing-ransomware-cybersecurity-oil-gas.jpg)
Blog
Upstream / Midstream / Downstream Cyber Attacks – Dependency Analysis
The Waterfall / ICS Strive 2024 Threat Report lists a handful of serious cyber attacks impacting the performance…
Read more
![Cybersecurity for the manufacturing industry](https://waterfall-security.com/wp-content/uploads/2024/07/cybersecurity-manufacturing.jpg)
Blog
The 2024 Threat Report: Findings and Takeaways For Manufacturers
To help understand modern attacks, Waterfall’s annual report also breaks new ground this year because now all consequential…
Read more
![Water Webinar Recording](https://waterfall-security.com/wp-content/uploads/2024/06/Water-Webinar-Recording.png)
Video
Webinar Recording: Engineering Cybersecurity Mitigations for Municipal Water Systems
Large water utilities are looking to gain efficiencies by adopting new distributed edge devices and digital transformation initiatives…
Read more
![Water Industry Cyber Threat Landscape](https://waterfall-security.com/wp-content/uploads/2024/06/water-industry-cyber-threat-landscape-blog_optimized.png)
Blog
Water Industry Cyber Threat Landscape
One of the most basic precautions against cyberattacks is having the ability to run equipment manually. The ability…
Read more
![40 years of cyber targets](https://waterfall-security.com/wp-content/uploads/2024/06/40yearscybertargetsblog.png)
Blog
40 Years Deploying Cyber Targets
Another big problem with OT cyber risk is that while we were automating and increasing the sophistication of…
Read more
Blog
Hardware-Enforced Remote Access (HERA) - Under the Hood
Andrew Ginter
![Hardware enforced remote access for OT - UNDER THE HOOD](https://waterfall-security.com/wp-content/uploads/2024/07/HERA-Under-the-Hood-blog-banner.jpg)
![Hardware enforced remote access for OT - UNDER THE HOOD](https://waterfall-security.com/wp-content/uploads/2024/07/HERA-Under-the-Hood-blog-banner.jpg)
Blog
Hardware-Enforced Remote Access (HERA) - Under the Hood
Waterfall's HERA is a true interactive OT remote access with unidirectional protection for OT. How does it work?
Read more
![HERA remote access banner](https://waterfall-security.com/wp-content/uploads/2024/07/HREA-Blog-remote-access-banner.jpg)
Blog
Remote Access Vulnerabilities and a Hardware-Enforced Solution
The common theme? These are all vulnerabilities that compromise software-based remote access systems. Hence the problem: many critical…
Read more
![Oil and Gas protection against ransomware](https://waterfall-security.com/wp-content/uploads/2024/07/preventing-ransomware-cybersecurity-oil-gas.jpg)
Blog
Upstream / Midstream / Downstream Cyber Attacks – Dependency Analysis
The Waterfall / ICS Strive 2024 Threat Report lists a handful of serious cyber attacks impacting the performance…
Read more
![Cybersecurity for the manufacturing industry](https://waterfall-security.com/wp-content/uploads/2024/07/cybersecurity-manufacturing.jpg)
Blog
The 2024 Threat Report: Findings and Takeaways For Manufacturers
To help understand modern attacks, Waterfall’s annual report also breaks new ground this year because now all consequential…
Read more
![Water Industry Cyber Threat Landscape](https://waterfall-security.com/wp-content/uploads/2024/06/water-industry-cyber-threat-landscape-blog_optimized.png)
Blog
Water Industry Cyber Threat Landscape
One of the most basic precautions against cyberattacks is having the ability to run equipment manually. The ability…
Read more
![40 years of cyber targets](https://waterfall-security.com/wp-content/uploads/2024/06/40yearscybertargetsblog.png)
Blog
40 Years Deploying Cyber Targets
Another big problem with OT cyber risk is that while we were automating and increasing the sophistication of…
Read more
![Abstraction For Safe Closed-Loop Control by Cloud Systems in Mining](https://waterfall-security.com/wp-content/uploads/2024/05/secure-cloud-mining.png)
Blog
Abstraction for Safe Closed-Loop Control by Cloud Systems in Mining
This example highlights the network engineering discipline's focus on the difference between monitoring information, which leaves the site,…
Read more
![Cybersecurity for Water Utilities Mariano Martin Tirado](https://waterfall-security.com/wp-content/uploads/2024/05/protecting-water-utilities-mariano-martin-tirado.png)
Blog
Protecting Water Utilities and Wastewater Treatment Plants
The ever-evolving threat landscape requires a proactive approach to securing our water infrastructures. While the age of many…
Read more
![Why is Mining & Metals Considered Critical Infrastructure?](https://waterfall-security.com/wp-content/uploads/2024/05/why-mining-metals-considered-critical-infrastructure.png)
Blog
Why is Mining & Metals Considered Critical Infrastructure?
The reliable supply of strategic minerals and metals is important for national security and defense capabilities. Certain minerals,…
Read more
Blog
How Are OT Hackers Getting IN Today?
Waterfall team
![How OT hackers are getting IN today](https://waterfall-security.com/wp-content/uploads/2023/07/how-are-ot-hackers-GETTING-IN-today.png)
![How OT hackers are getting IN today](https://waterfall-security.com/wp-content/uploads/2023/07/how-are-ot-hackers-GETTING-IN-today.png)
![](https://waterfall-security.com/wp-content/uploads/2023/08/the-2023-threat-report-06_optimized.jpg)
Blog
The 2023 Threat Report – At a Glance
The new 2023 OT Cyber Threats Report is available – a collaboration between Waterfall Security Solutions and ICSSTRIVE.…
Read more
![NIS2 Directive and Impact on OT Cybersecurity](https://waterfall-security.com/wp-content/uploads/2023/04/NIS2-and-Its-Impact-on-Operational-Technology-Cybersecurity-.png)
Blog
NIS2 and Its Impact on Operational Technology Cybersecurity
The Network and Information Systems Directive (NIS2) primarily focuses on information technology (IT) and addresses the protection of…
Read more
![Segmentation 202 Unidirectional Architectures](https://waterfall-security.com/wp-content/uploads/2023/04/4.-Segmentation-202-Unidirectional-Architectures.png)
Blog
Segmentation 202: Unidirectional Architectures
This is the second blog in the series, following Segmentation 201: Unidirectional Gateways vs. Firewalls. Unidirectional architectures are…
Read more
![OT Risk Management Getting Started and Assigning Risk](https://waterfall-security.com/wp-content/uploads/2023/04/6.-OT-Risk-Management-Getting-Started-and-Assigning-Risk.png)
Blog
OT Risk Management: Getting Started and Assigning Risk
OT SYSTEMS ARE INCREASINGLY JUST AS EXPOSED TO ATTACKS AS IT SYSTEMS The increase in digitalization, automation, cloud…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/08/icsjwg.png)
Blog
CISA ICSJWG Event - A Lot to Look Forward To
The first face-to-face CISA / JCDC ICSJWG event is running in Salt Lake City May 9-11. I am…
Read more
![Air Gaps - I don't think it means what you think it means](https://waterfall-security.com/wp-content/uploads/2023/04/2.-Air-Gaps-–-I-do-not-think-it-means-what-you-think-it-means.png)
Blog
Air Gaps – I do not think it means what you think it means
Air gaps are confusing – a significant minority of practitioners use the term “air gap” in a way…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/08/1200-630-hospital-cyber-attack_optimized.jpg)
Blog
Ransomware Attacks on Hospitals: The Good, the Bad, and the Ugly
The Hospital Clinic in Barcelona recently suffered a ransomware cyberattack. This ransomware affected the services of the 819-bed…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/08/questions-banner-V2.jpg)
Blog
The OT Security Revolution
From IT security inspiration to OT security innovation, we are living in the OT security revolution. In recent…
Read more
Blog
Hardware-Enforced Remote Access (HERA) - Under the Hood
Andrew Ginter
![Hardware enforced remote access for OT - UNDER THE HOOD](https://waterfall-security.com/wp-content/uploads/2024/07/HERA-Under-the-Hood-blog-banner.jpg)
![Hardware enforced remote access for OT - UNDER THE HOOD](https://waterfall-security.com/wp-content/uploads/2024/07/HERA-Under-the-Hood-blog-banner.jpg)
Blog
Hardware-Enforced Remote Access (HERA) - Under the Hood
Waterfall's HERA is a true interactive OT remote access with unidirectional protection for OT. How does it work?
Read more
![HERA remote access banner](https://waterfall-security.com/wp-content/uploads/2024/07/HREA-Blog-remote-access-banner.jpg)
Blog
Remote Access Vulnerabilities and a Hardware-Enforced Solution
The common theme? These are all vulnerabilities that compromise software-based remote access systems. Hence the problem: many critical…
Read more
![Oil and Gas protection against ransomware](https://waterfall-security.com/wp-content/uploads/2024/07/preventing-ransomware-cybersecurity-oil-gas.jpg)
Blog
Upstream / Midstream / Downstream Cyber Attacks – Dependency Analysis
The Waterfall / ICS Strive 2024 Threat Report lists a handful of serious cyber attacks impacting the performance…
Read more
![Cybersecurity for the manufacturing industry](https://waterfall-security.com/wp-content/uploads/2024/07/cybersecurity-manufacturing.jpg)
Blog
The 2024 Threat Report: Findings and Takeaways For Manufacturers
To help understand modern attacks, Waterfall’s annual report also breaks new ground this year because now all consequential…
Read more
![Water Industry Cyber Threat Landscape](https://waterfall-security.com/wp-content/uploads/2024/06/water-industry-cyber-threat-landscape-blog_optimized.png)
Blog
Water Industry Cyber Threat Landscape
One of the most basic precautions against cyberattacks is having the ability to run equipment manually. The ability…
Read more
![40 years of cyber targets](https://waterfall-security.com/wp-content/uploads/2024/06/40yearscybertargetsblog.png)
Blog
40 Years Deploying Cyber Targets
Another big problem with OT cyber risk is that while we were automating and increasing the sophistication of…
Read more
![Abstraction For Safe Closed-Loop Control by Cloud Systems in Mining](https://waterfall-security.com/wp-content/uploads/2024/05/secure-cloud-mining.png)
Blog
Abstraction for Safe Closed-Loop Control by Cloud Systems in Mining
This example highlights the network engineering discipline's focus on the difference between monitoring information, which leaves the site,…
Read more
![Cybersecurity for Water Utilities Mariano Martin Tirado](https://waterfall-security.com/wp-content/uploads/2024/05/protecting-water-utilities-mariano-martin-tirado.png)
Blog
Protecting Water Utilities and Wastewater Treatment Plants
The ever-evolving threat landscape requires a proactive approach to securing our water infrastructures. While the age of many…
Read more
![Why is Mining & Metals Considered Critical Infrastructure?](https://waterfall-security.com/wp-content/uploads/2024/05/why-mining-metals-considered-critical-infrastructure.png)
Blog
Why is Mining & Metals Considered Critical Infrastructure?
The reliable supply of strategic minerals and metals is important for national security and defense capabilities. Certain minerals,…
Read more
Books and eBooks
2024 Threat Report – OT Cyberattacks with Physical Consequences
Waterfall team
![Threat Report Webinar](https://waterfall-security.com/wp-content/uploads/2024/03/eBook-template-1920-1080-1.png)
![Threat Report Webinar](https://waterfall-security.com/wp-content/uploads/2024/03/eBook-template-1920-1080-1.png)
Books and eBooks
2024 Threat Report – OT Cyberattacks with Physical Consequences
Report on 68 cyberattacks that caused physical consequences to industrial control systems (ICS) and Operational Technology (OT) in…
Read more
![](https://waterfall-security.com/wp-content/uploads/2024/02/eBook-UGW-for-Government-banner-1.jpg)
Books and eBooks
eBook: Unidirectional Security Gateways for Government Networks
Download your copy today and learn how to fully secure government networks against all remote cyber threats including…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/09/news-cover-book-andrew-1920-x-1080-1.jpg)
Books and eBooks
Engineering-grade OT Security - A Manager's Guide
Our VP Industrial Security, Andrew Ginter, is releasing his 3rd book on industrial cybersecurity, entitled Engineering-Grade OT Security…
Read more
![2023 Threat Report - OT Cyberattacks With Physical Consequences](https://waterfall-security.com/wp-content/uploads/2023/08/ebooks-template_optimized.-all-ebooks-33.jpg)
Books and eBooks
2023 Threat Report - OT Cyberattacks With Physical Consequences
Two cyberattacks that bankrupted the targeted organizationAn attack that resulted in a fire that damaged equipment and put…
Read more
![Firewalls vs Unidirectional Gateways Ebook](https://waterfall-security.com/wp-content/uploads/2023/08/ebooks-template_optimized.-all-ebooks-26.jpg)
Books and eBooks
Firewalls vs Unidirectional Gateways Ebook
Define what is a firewallReview firewall principlesIntroduce Unidirectional GatewaysCompare the effectiveness of these two network perimeter protection solutions…
Read more
![BSEE Real-time Monitoring (RTM) Requirements For OCS Operators](https://waterfall-security.com/wp-content/uploads/2023/08/ebooks-template_optimized.-all-ebooks-04.jpg)
Books and eBooks
BSEE Real-time Monitoring (RTM) Requirements For OCS Operators
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididuntLorem ipsum dolor sit amet, consectetur…
Read more
![OT Security Incidents In 2021](https://waterfall-security.com/wp-content/uploads/2023/08/ebooks-template_optimized.-all-ebooks-29.jpg)
Books and eBooks
OT Security Incidents In 2021
2021 Data OT OutagesRansomware ConsequencesFuture RecommendationsConclusions
Read more
![Cybersecurity for AVEVA PI Servers](https://waterfall-security.com/wp-content/uploads/2023/08/ebooks-template_optimized.-all-ebooks-31.jpg)
Books and eBooks
Cybersecurity for AVEVA PI Servers
The Problem with Firewalls & DMZ ConfigurationsSecurity for AVEVA PI & Data Hub InstallationsThe Unidirectional Alternative & ScenariosWaterfall…
Read more
![ICS/OT Ransomware in the Supply Chain: Learnings from attacks in 2020 ebook](https://waterfall-security.com/wp-content/uploads/2023/08/ebooks-template_optimized.-all-ebooks-22.jpg)
Books and eBooks
ICS/OT Ransomware in the Supply Chain: Learnings from attacks in 2020 ebook
Targeted ransomware was responsible for all OT/industrial shutdowns in 2020. Add to this the SolarWinds supply chain…
Read more
Case studies
Cybersecurity for Government Networks
Waterfall team
![Government Network Cybersecurity](https://waterfall-security.com/wp-content/uploads/2024/02/government-network-cybersecurity.png)
![Government Network Cybersecurity](https://waterfall-security.com/wp-content/uploads/2024/02/government-network-cybersecurity.png)
Case studies
Cybersecurity for Government Networks
Securing a classified/high-security network with a Unidirectional Security Gateway, ensuring continuous and secure cross-domain data flow, while preventing…
Read more
![European TSO Case Study](https://waterfall-security.com/wp-content/uploads/2023/12/case-study-european-tso.png)
Case studies
Securing a European TSO
100% Security: With Unidirectional Security Gateways, the PI Production Server is now physically protected from any threats emanating…
Read more
Case studies
Cybersecurity for Government Networks
Waterfall team
![Government Network Cybersecurity](https://waterfall-security.com/wp-content/uploads/2024/02/government-network-cybersecurity.png)
![Government Network Cybersecurity](https://waterfall-security.com/wp-content/uploads/2024/02/government-network-cybersecurity.png)
Case studies
Cybersecurity for Government Networks
Securing a classified/high-security network with a Unidirectional Security Gateway, ensuring continuous and secure cross-domain data flow, while preventing…
Read more
![European TSO Case Study](https://waterfall-security.com/wp-content/uploads/2023/12/case-study-european-tso.png)
Case studies
Securing a European TSO
100% Security: With Unidirectional Security Gateways, the PI Production Server is now physically protected from any threats emanating…
Read more
Books and eBooks
2024 Threat Report – OT Cyberattacks with Physical Consequences
Waterfall team
![Threat Report Webinar](https://waterfall-security.com/wp-content/uploads/2024/03/eBook-template-1920-1080-1.png)
![Threat Report Webinar](https://waterfall-security.com/wp-content/uploads/2024/03/eBook-template-1920-1080-1.png)
Books and eBooks
2024 Threat Report – OT Cyberattacks with Physical Consequences
Report on 68 cyberattacks that caused physical consequences to industrial control systems (ICS) and Operational Technology (OT) in…
Read more
![](https://waterfall-security.com/wp-content/uploads/2024/02/eBook-UGW-for-Government-banner-1.jpg)
Books and eBooks
eBook: Unidirectional Security Gateways for Government Networks
Download your copy today and learn how to fully secure government networks against all remote cyber threats including…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/09/news-cover-book-andrew-1920-x-1080-1.jpg)
Books and eBooks
Engineering-grade OT Security - A Manager's Guide
Our VP Industrial Security, Andrew Ginter, is releasing his 3rd book on industrial cybersecurity, entitled Engineering-Grade OT Security…
Read more
![2023 Threat Report - OT Cyberattacks With Physical Consequences](https://waterfall-security.com/wp-content/uploads/2023/08/ebooks-template_optimized.-all-ebooks-33.jpg)
Books and eBooks
2023 Threat Report - OT Cyberattacks With Physical Consequences
Two cyberattacks that bankrupted the targeted organizationAn attack that resulted in a fire that damaged equipment and put…
Read more
![Firewalls vs Unidirectional Gateways Ebook](https://waterfall-security.com/wp-content/uploads/2023/08/ebooks-template_optimized.-all-ebooks-26.jpg)
Books and eBooks
Firewalls vs Unidirectional Gateways Ebook
Define what is a firewallReview firewall principlesIntroduce Unidirectional GatewaysCompare the effectiveness of these two network perimeter protection solutions…
Read more
![BSEE Real-time Monitoring (RTM) Requirements For OCS Operators](https://waterfall-security.com/wp-content/uploads/2023/08/ebooks-template_optimized.-all-ebooks-04.jpg)
Books and eBooks
BSEE Real-time Monitoring (RTM) Requirements For OCS Operators
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididuntLorem ipsum dolor sit amet, consectetur…
Read more
![OT Security Incidents In 2021](https://waterfall-security.com/wp-content/uploads/2023/08/ebooks-template_optimized.-all-ebooks-29.jpg)
Books and eBooks
OT Security Incidents In 2021
2021 Data OT OutagesRansomware ConsequencesFuture RecommendationsConclusions
Read more
![Cybersecurity for AVEVA PI Servers](https://waterfall-security.com/wp-content/uploads/2023/08/ebooks-template_optimized.-all-ebooks-31.jpg)
Books and eBooks
Cybersecurity for AVEVA PI Servers
The Problem with Firewalls & DMZ ConfigurationsSecurity for AVEVA PI & Data Hub InstallationsThe Unidirectional Alternative & ScenariosWaterfall…
Read more
![ICS/OT Ransomware in the Supply Chain: Learnings from attacks in 2020 ebook](https://waterfall-security.com/wp-content/uploads/2023/08/ebooks-template_optimized.-all-ebooks-22.jpg)
Books and eBooks
ICS/OT Ransomware in the Supply Chain: Learnings from attacks in 2020 ebook
Targeted ransomware was responsible for all OT/industrial shutdowns in 2020. Add to this the SolarWinds supply chain…
Read more
Infographic
Top 10 Cyberattacks of 2023
Waterfall team
![](https://waterfall-security.com/wp-content/uploads/2023/12/top-10-attack-2023-banner-01_optimized-scaled.jpg)
![](https://waterfall-security.com/wp-content/uploads/2023/12/top-10-attack-2023-banner-01_optimized-scaled.jpg)
Infographic
Top 10 Cyberattacks of 2023
2023 saw an uptick of cyberattacks across many industries. Our infographic focuses on cyberattacks in 2023 that impacted…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/02/copy-of-infographic-web-template-1920-x-1080-2_optimized.png)
Infographic
Get the Checklist | EPA Cybersecurity Guidelines for the Water Sector
As part of the Whitehouse’s broader efforts to protect American infrastructure from attacks by nation-states and other cyber…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/08/top-10-attacks-with-physical-consequences-since-2020-infographic-v4-stripes-01_optimized-1.jpg)
Infographic
Cyber Attacks On Critical Infrastructure
Cyber Attacks On Critical Infrastructure Infographic Looking to stay informed about the latest cyber attacks on critical infrastructure?…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/08/CYBER-ATTACKS-IMPACTING-INDUSTRIAL-OPERATIONS-1200-630.jpg)
Infographic
How cyber attacks impact industrial operations? (Infographic)
Sophisticated, targeted ransomware attacks shutting down OT systems and critical infrastructure have gained considerable momentum in recent years.…
Read more
Infographic
Cyber Attacks On Critical Infrastructure
Waterfall team
![](https://waterfall-security.com/wp-content/uploads/2023/08/top-10-attacks-with-physical-consequences-since-2020-infographic-v4-stripes-01_optimized-1.jpg)
![](https://waterfall-security.com/wp-content/uploads/2023/08/top-10-attacks-with-physical-consequences-since-2020-infographic-v4-stripes-01_optimized-1.jpg)
![](https://waterfall-security.com/wp-content/uploads/2023/08/CYBER-ATTACKS-IMPACTING-INDUSTRIAL-OPERATIONS-1200-630.jpg)
Infographic
How cyber attacks impact industrial operations? (Infographic)
Sophisticated, targeted ransomware attacks shutting down OT systems and critical infrastructure have gained considerable momentum in recent years.…
Read more
Infographic
Top 10 Cyberattacks of 2023
Waterfall team
![](https://waterfall-security.com/wp-content/uploads/2023/12/top-10-attack-2023-banner-01_optimized-scaled.jpg)
![](https://waterfall-security.com/wp-content/uploads/2023/12/top-10-attack-2023-banner-01_optimized-scaled.jpg)
Infographic
Top 10 Cyberattacks of 2023
2023 saw an uptick of cyberattacks across many industries. Our infographic focuses on cyberattacks in 2023 that impacted…
Read more
Podcast
Their Own Rail System, Water Treatment, and More | Episode 128
Waterfall team
![Airport Cybersecurity Podcast episode 128](https://waterfall-security.com/wp-content/uploads/2024/07/airport-cybersecurity-podcast-epsidoe-128.png)
![Airport Cybersecurity Podcast episode 128](https://waterfall-security.com/wp-content/uploads/2024/07/airport-cybersecurity-podcast-epsidoe-128.png)
Podcast
Their Own Rail System, Water Treatment, and More | Episode 128
Airports are like small cities. Eric Vautier, CISO of all 3 Paris airports looks at WHAT is an…
Read more
![Industrial Security Podcast Alex Yevtushenko Salvador Technologies](https://waterfall-security.com/wp-content/uploads/2024/06/industrial-security-podcast-alex-yevtushenko-salvador-technologies-episode-127.png)
Podcast
Rapid Recovery After an Attack | Episode 127
Alex Yevtushenko is the Co-Founder and CEO of Salvador Technologies. He previously worked at Acktar as a R&D…
Read more
![Susan Farrell joins to discuss weaknesses vs vulnerabilities](https://waterfall-security.com/wp-content/uploads/2024/05/industrial-security-podcast-126-susan-farell-CWE-vs-CVE.png)
Podcast
CWE for Zero Days - not CVE | Episode 126
Susan has over 20 years of experience in the technology industry and is passionate about finding and delivering…
Read more
![AI and Industrial Security in the Energy Transition](https://waterfall-security.com/wp-content/uploads/2024/04/podcast-125.png)
Podcast
AI and Industrial Security in the Energy Transition | Episode 125
Leo Simonovich is VP and Global Head of Industrial Cyber and Digital Security at Siemens Energy. He is…
Read more
![Robin Berthier of Network Perception on Podcast 124](https://waterfall-security.com/wp-content/uploads/2024/03/Podcast-124-1.png)
Podcast
Evaluating Network Segmentation Strength | Episode 124
Dr. Robin Berthier is the co-founder and CEO of Network Perception. He has over 15 years of experience…
Read more
![Podcast Marcus Sachs Tractors to Table Tops](https://waterfall-security.com/wp-content/uploads/2024/03/podcast-123-marcus-sachs.png)
Podcast
Tractors to Table Tops - Industrial Security in the Industry of Human Consumables | Episode 123
Marcus Sachs is an internationally recognized senior executive with over 40 years of professional leadership in national, homeland,…
Read more
![Industrial Security Podcast Episode 122 Jake Hawkes](https://waterfall-security.com/wp-content/uploads/2024/02/podcast-122-jake-hawkes_optimized.png)
Podcast
Cybersecurity in the AVEVA Enterprise SCADA Product – Going Deep | Episode 122
Jake Hawkes is a Senior Product Manager at AVEVA with over 20 years of SCADA experience. Jake has…
Read more
![episode 121 Jorgen Hartig CEO of SecuriOT](https://waterfall-security.com/wp-content/uploads/2024/02/industrial-security-podcast-jorgen-hartig-CEO-SecuriOT-episode-121.png)
Podcast
What’s Next? A Decision Support Tool for Industrial Security | Episode 121
Jørgen Hartig is the managing director and strategic advisor at Denmark-based SecuriOT. Before starting at SecuriOT, Jørgen was providing security…
Read more
![ISP Chris Gorog episode 119](https://waterfall-security.com/wp-content/uploads/2024/01/industrial-security-podcast-chris-gorog-blockframe-epsidoe-119-managing-trust.png)
Podcast
Managing Trust in Massive IIoT Systems | Episode 119
Transcript of this podcast episode #119: Managing trust in massive IIoT SystemsPlease note: This transcript was auto-generated and then edited…
Read more
Podcast
Risk in Context: When to Patch, When to Let It Ride | Episode 109
Waterfall team
![](https://waterfall-security.com/wp-content/uploads/2023/08/rick-kaun-industrial-security-podcast-episode-109_optimized.png)
![](https://waterfall-security.com/wp-content/uploads/2023/08/rick-kaun-industrial-security-podcast-episode-109_optimized.png)
![Hacking the Canbus, with Dr Ken Tindell](https://waterfall-security.com/wp-content/uploads/2023/06/hacking-the-canbus-podcast.png)
Podcast
Hacking the CANbus | Episode 108
In this episode, Dr. Ken Tindell, the CTO at Canis, joins us to talk about cybersecurity and cars. Modern cars…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/08/industrial-security-podcast-episode-107-kathryn-wagner_optimized.jpg)
Podcast
Saving Money and Effort Automating Compliance | Episode 107
In this episode, Kathryn Wagner, the Vice President, Industry Solutions, Energy & Utilities at Assurx, joins us to explore the…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/08/podcast-106-cybersecurity-in-big-picture-risk_optimized.jpg)
Podcast
How Cyber Fits Into Big-Picture Risk | Episode 106
In this episode, Dr. Janaka Ruwanpura, Vice-Provost, University of Calgary joins us to look at where cyber risks…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/08/podcast-6-steps-securing-ot-mining-darker.jpg)
Podcast
Six Steps to Integrating IT & OT in Mining | Episode 105
In this episode, Rob Labbé from Mining and Metals ISAC explains how and why risk assessments are needed and…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/08/1200-630-BLOG-POST-jesus.jpg)
Podcast
Jesus Molina on the Biden National Cyber Strategy
The Biden-Harris administration recently released their National Cybersecurity Strategy. This week, Jesus Molina of Waterfall Security joined ICS…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/08/2022-Podcasts-1200x-630-4.jpg)
Podcast
Stakeholder-Specific Vulnerability Categorization (SSVC) | Episode #102
Stakeholder-specific vulnerability categorization (SSVC) is a new alternative to the common vulnerability scoring system (CVSS) used in the…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/08/2022-Podcasts-1200x-630-16.png)
Podcast
Bridging industrial Cybersecurity Workforce Gaps | Episode #101
Industrial cybersecurity workforce gaps are not all the same. Different kinds of organizations in different stages of their…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/08/100th-Podcast-1200-×-630-px-1.png)
Podcast
Engineering-Grade security in the US DOE Cyber Informed Engineering Strategy | Episode #100
Cyber Informed Engineering – the new US DOE Strategy includes unhackable safeties, manual operations, and other engineering-grade protections,…
Read more
Podcast
Their Own Rail System, Water Treatment, and More | Episode 128
Waterfall team
![Airport Cybersecurity Podcast episode 128](https://waterfall-security.com/wp-content/uploads/2024/07/airport-cybersecurity-podcast-epsidoe-128.png)
![Airport Cybersecurity Podcast episode 128](https://waterfall-security.com/wp-content/uploads/2024/07/airport-cybersecurity-podcast-epsidoe-128.png)
Podcast
Their Own Rail System, Water Treatment, and More | Episode 128
Airports are like small cities. Eric Vautier, CISO of all 3 Paris airports looks at WHAT is an…
Read more
![Industrial Security Podcast Alex Yevtushenko Salvador Technologies](https://waterfall-security.com/wp-content/uploads/2024/06/industrial-security-podcast-alex-yevtushenko-salvador-technologies-episode-127.png)
Podcast
Rapid Recovery After an Attack | Episode 127
Alex Yevtushenko is the Co-Founder and CEO of Salvador Technologies. He previously worked at Acktar as a R&D…
Read more
![Susan Farrell joins to discuss weaknesses vs vulnerabilities](https://waterfall-security.com/wp-content/uploads/2024/05/industrial-security-podcast-126-susan-farell-CWE-vs-CVE.png)
Podcast
CWE for Zero Days - not CVE | Episode 126
Susan has over 20 years of experience in the technology industry and is passionate about finding and delivering…
Read more
![AI and Industrial Security in the Energy Transition](https://waterfall-security.com/wp-content/uploads/2024/04/podcast-125.png)
Podcast
AI and Industrial Security in the Energy Transition | Episode 125
Leo Simonovich is VP and Global Head of Industrial Cyber and Digital Security at Siemens Energy. He is…
Read more
![Robin Berthier of Network Perception on Podcast 124](https://waterfall-security.com/wp-content/uploads/2024/03/Podcast-124-1.png)
Podcast
Evaluating Network Segmentation Strength | Episode 124
Dr. Robin Berthier is the co-founder and CEO of Network Perception. He has over 15 years of experience…
Read more
![Podcast Marcus Sachs Tractors to Table Tops](https://waterfall-security.com/wp-content/uploads/2024/03/podcast-123-marcus-sachs.png)
Podcast
Tractors to Table Tops - Industrial Security in the Industry of Human Consumables | Episode 123
Marcus Sachs is an internationally recognized senior executive with over 40 years of professional leadership in national, homeland,…
Read more
![Industrial Security Podcast Episode 122 Jake Hawkes](https://waterfall-security.com/wp-content/uploads/2024/02/podcast-122-jake-hawkes_optimized.png)
Podcast
Cybersecurity in the AVEVA Enterprise SCADA Product – Going Deep | Episode 122
Jake Hawkes is a Senior Product Manager at AVEVA with over 20 years of SCADA experience. Jake has…
Read more
![episode 121 Jorgen Hartig CEO of SecuriOT](https://waterfall-security.com/wp-content/uploads/2024/02/industrial-security-podcast-jorgen-hartig-CEO-SecuriOT-episode-121.png)
Podcast
What’s Next? A Decision Support Tool for Industrial Security | Episode 121
Jørgen Hartig is the managing director and strategic advisor at Denmark-based SecuriOT. Before starting at SecuriOT, Jørgen was providing security…
Read more
![ISP Chris Gorog episode 119](https://waterfall-security.com/wp-content/uploads/2024/01/industrial-security-podcast-chris-gorog-blockframe-epsidoe-119-managing-trust.png)
Podcast
Managing Trust in Massive IIoT Systems | Episode 119
Transcript of this podcast episode #119: Managing trust in massive IIoT SystemsPlease note: This transcript was auto-generated and then edited…
Read more
Video
Webinar Recording: Engineering Cybersecurity Mitigations for Municipal Water Systems
Waterfall team
![Water Webinar Recording](https://waterfall-security.com/wp-content/uploads/2024/06/Water-Webinar-Recording.png)
![Water Webinar Recording](https://waterfall-security.com/wp-content/uploads/2024/06/Water-Webinar-Recording.png)
Video
Webinar Recording: Engineering Cybersecurity Mitigations for Municipal Water Systems
Mariano Martín Tirado, from Acciona, and Rees Machtemes, from Waterfall, discuss the risks and threat environment that Water…
Read more
![Mining Webinar Recording](https://waterfall-security.com/wp-content/uploads/2024/05/mining-webinar-recording-1_optimized.png)
Video
Webinar Recording: Cyber-securing Safety and Equipment Protection Systems in Mining
Safety is the top priority in almost all mines, and reliable, efficient physical operations are close seconds. Cybersecurity…
Read more
![Threat Report Webinar](https://waterfall-security.com/wp-content/uploads/2024/04/power-webinar-recording_optimized.png)
Video
Webinar Recording: Cyber Attacks with Physical Consequences – 2024 Threat Report
The new Waterfall Security / ICSStrive Threat Report documents 68 cyber attacks with real-world physical consequences impacting 515…
Read more
![Webinar Recording OT/IT with CIE](https://waterfall-security.com/wp-content/uploads/2024/03/CIE-OT-IT-webinar-recording.png)
Video
Recorded Webinar: Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations
Integrating OT with IT introduces new threats to the reliability of existing operations. Connected networks move more than…
Read more
![NIS2 Recorded Webinar](https://waterfall-security.com/wp-content/uploads/2024/01/nis2-recorded-webinar-2024.png)
Video
Recorded Webinar: The NIS2 Directive: A Guide for OT Professionals
In this recorded webinar, we take an in-depth look at the European NIS2 Directive and help explain…
Read more
![Top 10 Cyberattacks 2023 Webinar Recording](https://waterfall-security.com/wp-content/uploads/2023/12/webinar-recording-top10-cyberattacks-of-2023_optimized.jpg)
Video
Recorded Webinar: The Top 10 OT/ICS Cyberattacks of 2023
In this webinar recording, we take an in-depth look at the most novel, notorious, and impactful cyber…
Read more
![Andrew Ginter new book recorded webinar](https://waterfall-security.com/wp-content/uploads/2023/10/1920-1080-andrew-book-webinar-recording_optimized.png)
Video
Recorded Webinar: Engineering-Grade OT Security: A Manager’s Guide
Want to get your advanced copy of Andrew Ginter's new book? >>Click here to get your copy
Read more
![Network Engineering Recorded Webinar](https://waterfall-security.com/wp-content/uploads/2023/10/network-engeinnering-webinar_optimized.png)
Video
Network Engineering | Recorded Webinar
Engineering-grade solutions are deterministic and predictable. Cyber-Informed Engineering (CIE) is exploring safety engineering, protection engineering and other engineering…
Read more
![AVEVA | Webinar | Engineering Grade Security for Water Utilities](https://waterfall-security.com/wp-content/uploads/2023/09/aveva-engineering-grade-security-water-utilities-webinar_optimized.png)
Video
Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities
Our Webinar with Andrew Ginter of Waterfall Security Solutions and Bill McEvoy of AVEVA covered many facets of…
Read more
Video
Evolving OT Cyber Attacks - Theory to Reality | Recorded Webinar
Waterfall team
![](https://waterfall-security.com/wp-content/uploads/2023/08/1200-630-BLOG-POST-TEMPLATE-2.jpg)
![](https://waterfall-security.com/wp-content/uploads/2023/08/1200-630-BLOG-POST-TEMPLATE-2.jpg)
![](https://waterfall-security.com/wp-content/uploads/2023/08/missing-link.png)
Video
Missing Links for Managing OT Cyber Risk | Recorded Webinar Securityweek
Managing OT cyber risk is more than cybersecurity - an IT-SEC only approach ignores powerful engineering tools for…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/08/12-Month-Automation.com-YT-Thumnail-1200-×-630-px.png)
Video
12 Months of Cyber Attacks—Lessons, Trends, and Predictions | Automation.com Recorded Webinar
Industrial cyber attacks leading to production downtime and other physical consequences more than doubled in 2021 over 2020.…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/08/Naoufal-Kerboute-video.jpg)
Video
Watch: Naoufal Kerboute's Interview at GISEC 2022 for TECHx
Last March Waterfall Security Solutions participated in one of the important events at UAE - GISEC. Naoufal Kerboute,…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/08/andrew-ginter-for-techx-video.png)
Video
Watch: Andrew Ginter's Interview at GISEC 2022 for TECHx
Last March Waterfall Security Solutions participated in one of the important events at UAE - GISEC. Andrew Ginter,…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/08/Help-AG-and-Waterfall-Partnership-1200-x-630.png)
Video
Redefining OT security with Unidirectional Security Gateways
Watch highlights from an interview by Ran Pedhazur, Chief Business Development Officer at Waterfall, and Nicolai Solling, Chief…
Read more
![Bakotech Webinar Recording Firewalls vs. Unidirectional Security Gateways](https://waterfall-security.com/wp-content/uploads/2022/02/Bakotech-Webinar-Recording-Firewalls-vs.-Unidirectional-Security-Gateways.png)
Video
Bakotech Webinar Recording: Firewalls vs. Unidirectional Security Gateways
https://www.youtube.com/watch?v=nGJaJnXPZdc eBook | Firewalls vs. Unidirectional Gateways
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/08/Securing-Critical-Infrastructure-1200x630-1.jpg)
Video
How to Protect Critical Infrastructure from Cyberattacks
https://www.youtube.com/watch?v=UkYCFBy_9Q0&ab_channel=WaterfallSecuritySolutions SUBSCRIBE NEXT EPS. PREVIOUS EPS. PREVIOUS EPS. SUBSCRIBE NEXT EPS. Free consultation with Unidirectional solutions architect CONTACT…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/08/Rise-of-Ransomware-Blog-1200-x-630.png)
Video
Rise of Ransomware 2022 | Industrial Security Institute
https://www.youtube.com/watch?v=i9oEDAYrI-o&t=17s&ab_channel=WaterfallSecuritySolutions THE INDUSTRIAL SECURITY INSTITUTE OT / industrial / ICS cybersecurity concepts from the perspective of the world’s…
Read more
Video
Webinar Recording: Engineering Cybersecurity Mitigations for Municipal Water Systems
Waterfall team
![Water Webinar Recording](https://waterfall-security.com/wp-content/uploads/2024/06/Water-Webinar-Recording.png)
![Water Webinar Recording](https://waterfall-security.com/wp-content/uploads/2024/06/Water-Webinar-Recording.png)
Video
Webinar Recording: Engineering Cybersecurity Mitigations for Municipal Water Systems
Mariano Martín Tirado, from Acciona, and Rees Machtemes, from Waterfall, discuss the risks and threat environment that Water…
Read more
![Mining Webinar Recording](https://waterfall-security.com/wp-content/uploads/2024/05/mining-webinar-recording-1_optimized.png)
Video
Webinar Recording: Cyber-securing Safety and Equipment Protection Systems in Mining
Safety is the top priority in almost all mines, and reliable, efficient physical operations are close seconds. Cybersecurity…
Read more
![Threat Report Webinar](https://waterfall-security.com/wp-content/uploads/2024/04/power-webinar-recording_optimized.png)
Video
Webinar Recording: Cyber Attacks with Physical Consequences – 2024 Threat Report
The new Waterfall Security / ICSStrive Threat Report documents 68 cyber attacks with real-world physical consequences impacting 515…
Read more
![Webinar Recording OT/IT with CIE](https://waterfall-security.com/wp-content/uploads/2024/03/CIE-OT-IT-webinar-recording.png)
Video
Recorded Webinar: Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations
Integrating OT with IT introduces new threats to the reliability of existing operations. Connected networks move more than…
Read more
![NIS2 Recorded Webinar](https://waterfall-security.com/wp-content/uploads/2024/01/nis2-recorded-webinar-2024.png)
Video
Recorded Webinar: The NIS2 Directive: A Guide for OT Professionals
In this recorded webinar, we take an in-depth look at the European NIS2 Directive and help explain…
Read more
![Top 10 Cyberattacks 2023 Webinar Recording](https://waterfall-security.com/wp-content/uploads/2023/12/webinar-recording-top10-cyberattacks-of-2023_optimized.jpg)
Video
Recorded Webinar: The Top 10 OT/ICS Cyberattacks of 2023
In this webinar recording, we take an in-depth look at the most novel, notorious, and impactful cyber…
Read more
![Andrew Ginter new book recorded webinar](https://waterfall-security.com/wp-content/uploads/2023/10/1920-1080-andrew-book-webinar-recording_optimized.png)
Video
Recorded Webinar: Engineering-Grade OT Security: A Manager’s Guide
Want to get your advanced copy of Andrew Ginter's new book? >>Click here to get your copy
Read more
![Network Engineering Recorded Webinar](https://waterfall-security.com/wp-content/uploads/2023/10/network-engeinnering-webinar_optimized.png)
Video
Network Engineering | Recorded Webinar
Engineering-grade solutions are deterministic and predictable. Cyber-Informed Engineering (CIE) is exploring safety engineering, protection engineering and other engineering…
Read more
![AVEVA | Webinar | Engineering Grade Security for Water Utilities](https://waterfall-security.com/wp-content/uploads/2023/09/aveva-engineering-grade-security-water-utilities-webinar_optimized.png)
Video
Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities
Our Webinar with Andrew Ginter of Waterfall Security Solutions and Bill McEvoy of AVEVA covered many facets of…
Read more
Webinar
Webinar: HERA - Hardware-Enforced Remote Access
Waterfall team
![](https://waterfall-security.com/wp-content/uploads/2024/06/HERA-Webinar-Banner.png)
![](https://waterfall-security.com/wp-content/uploads/2024/06/HERA-Webinar-Banner.png)
Webinar
Webinar: HERA - Hardware-Enforced Remote Access
Join our webinar on July 31, 2024 at 11:00 AM New York Time as we look at solutions…
Read more
![Threat Report Webinar 2024](https://waterfall-security.com/wp-content/uploads/2024/03/Threat-Report-Webinar.png)
Webinar
Cyber Attacks with Physical Consequences – 2024 Threat Report
Understanding threats is essential to designing effective defenses. We invite you to join Andrew Ginter, Rees Machtemes and…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/12/large-2_optimized.png)
Webinar
Webinar: The NIS2 Directive: A Guide for OT Professionals
Register to join our upcoming webinar as Dr. Jesus Molina takes us through the ins-and-outs of the…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/11/webinar-banner-top10-cyberattacks-of-2023_optimized.jpg)
Webinar
Webinar: The Top 10 OT/ICS Cyberattacks of 2023
Join our webinar for an in-depth look at the most novel, notorious and impactful cyber incidents of…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/10/1920-1080-andrew-book-webinar-banner1_optimized.png)
Webinar
Webinar: Engineering-Grade OT Security: A manager's guide
Join our webinar to learn about engineering-grade OT security, a new model for cyber risk, and how…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/09/1920-1080-Network-Engineering-webinar-1.jpg)
Webinar
Network Engineering Webinar
Join our next webinar on October 3, 11 am New York time/ 8 am Pacific Time Engineering-grade…
Read more
Webinar
Webinar: HERA - Hardware-Enforced Remote Access
Waterfall team
![](https://waterfall-security.com/wp-content/uploads/2024/06/HERA-Webinar-Banner.png)
![](https://waterfall-security.com/wp-content/uploads/2024/06/HERA-Webinar-Banner.png)
Webinar
Webinar: HERA - Hardware-Enforced Remote Access
Join our webinar on July 31, 2024 at 11:00 AM New York Time as we look at solutions…
Read more
![Threat Report Webinar 2024](https://waterfall-security.com/wp-content/uploads/2024/03/Threat-Report-Webinar.png)
Webinar
Cyber Attacks with Physical Consequences – 2024 Threat Report
Understanding threats is essential to designing effective defenses. We invite you to join Andrew Ginter, Rees Machtemes and…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/12/large-2_optimized.png)
Webinar
Webinar: The NIS2 Directive: A Guide for OT Professionals
Register to join our upcoming webinar as Dr. Jesus Molina takes us through the ins-and-outs of the…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/11/webinar-banner-top10-cyberattacks-of-2023_optimized.jpg)
Webinar
Webinar: The Top 10 OT/ICS Cyberattacks of 2023
Join our webinar for an in-depth look at the most novel, notorious and impactful cyber incidents of…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/10/1920-1080-andrew-book-webinar-banner1_optimized.png)
Webinar
Webinar: Engineering-Grade OT Security: A manager's guide
Join our webinar to learn about engineering-grade OT security, a new model for cyber risk, and how…
Read more
![](https://waterfall-security.com/wp-content/uploads/2023/09/1920-1080-Network-Engineering-webinar-1.jpg)
Webinar
Network Engineering Webinar
Join our next webinar on October 3, 11 am New York time/ 8 am Pacific Time Engineering-grade…
Read more
Trending posts
Hardware-Enforced Remote Access (HERA) – Under the Hood
July 17, 2024
Webinar: HERA – Hardware-Enforced Remote Access
July 16, 2024
Stay up to date
Subscribe to our blog and receive insights straight to your inbox