All
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you [benefit or goal of the resources].
- All
- Blog
- Books and eBooks
- Case studies
- Infographic
- Podcast
- Webinar
- Video
496
Blog
IT/OT Cyber Theory: Espionage vs. Sabotage
Andrew Ginter


Blog
IT/OT Cyber Theory: Espionage vs. Sabotage
The second-generation of OT security advice started to emerge in 2012-2016.
Read more

Blog
Ships Re-Routed, Ships Run Aground
When we make decisions about other people's safety, we have ethical and often legal obligations to make reasonable…
Read more

Blog
New CISA, CCCS et al Alert | Advice on Pro-Russian Hacktivists Targeting
The most recent CISA, CCCS et al alert / advice on pro-Russian hacktivists targeting critical infrastructures is a…
Read more

Webinar
Bringing Engineering on Board and Resetting IT Expectations
In many organizations the relationship between IT/enterprise security and OT/engineering teams is dysfunctional. These teams work in the…
Read more

Podcast
We can't - and shouldn't - fix everything - Episode 147
"We have new intel. The threat has changed, the probability has changed, the impact has changed, whatever it…
Read more

Podcast
Medical Device Cybersecurity Is Tricky - Episode 146
"I would estimate that somewhere between 30 and 50% of medical devices that are submitted to FDA today…
Read more

Podcast
Hardware Hacking - Essential OT Attack Knowledge - Episode 145
Hardware Hacking - Essential OT Attack Knowledge | Episode 145Please note: This transcript was auto-generated and then edited…
Read more

Webinar
Top 10 OT Cyber Attacks of 2025
Watch the webinar for a comprehensive review of the cyber incidents that shaped the industrial landscape in 2025.…
Read more

Blog
Cyber Threats to the Manufacturing Industry: Risks, Impact, and Protection Strategies
The manufacturing sector stands at a critical inflection point as digital transformation reshapes production environments worldwide. While smart…
Read more
Blog
IT/OT Cyber Theory: Espionage vs. Sabotage
Andrew Ginter


Blog
IT/OT Cyber Theory: Espionage vs. Sabotage
The second-generation of OT security advice started to emerge in 2012-2016.
Read more

Blog
Ships Re-Routed, Ships Run Aground
When we make decisions about other people's safety, we have ethical and often legal obligations to make reasonable…
Read more

Blog
New CISA, CCCS et al Alert | Advice on Pro-Russian Hacktivists Targeting
The most recent CISA, CCCS et al alert / advice on pro-Russian hacktivists targeting critical infrastructures is a…
Read more

Blog
Cyber Threats to the Manufacturing Industry: Risks, Impact, and Protection Strategies
The manufacturing sector stands at a critical inflection point as digital transformation reshapes production environments worldwide. While smart…
Read more

Blog
Top Oil and Gas Security Challenges and Best Practices for Protection
The oil and gas industry faces a complex maze of cybersecurity challenges as digital transformation continues to reshape…
Read more

Blog
Data Diode vs Firewall: Understanding the Key Differences in OT Security
When you're protecting operational technology infrastructure, the security solution you pick could mean the difference between weathering a…
Read more

Blog
Doing the Math – Remote Access at Wind Farms
By Andrew Ginter, VP Industrial Security, Waterfall Security Stuff wears out. Friction is the enemy of moving parts…
Read more

Blog
Secure Industrial Remote Access Solutions
Securing industrial remote access is no longer optional—it's essential for protecting operations, maintaining uptime, and safeguarding critical infrastructure.…
Read more

Blog
SCADA Security Fundamentals
Securing SCADA systems is no longer optional—it's a critical requirement for protecting industrial operations, critical infrastructure, and public…
Read more
Blog
Cyber Threats to the Manufacturing Industry: Risks, Impact, and Protection Strategies
Waterfall team



Blog
Top Oil and Gas Security Challenges and Best Practices for Protection
The oil and gas industry faces a complex maze of cybersecurity challenges as digital transformation continues to reshape…
Read more

Blog
Data Diode vs Firewall: Understanding the Key Differences in OT Security
When you're protecting operational technology infrastructure, the security solution you pick could mean the difference between weathering a…
Read more

Blog
Doing the Math – Remote Access at Wind Farms
By Andrew Ginter, VP Industrial Security, Waterfall Security Stuff wears out. Friction is the enemy of moving parts…
Read more

Blog
How Are OT Hackers Getting IN Today?
Operational Technology (OT) refers to the hardware and software systems that control and monitor physical devices and processes…
Read more

Blog
The 2023 Threat Report – At a Glance
The new 2023 OT Cyber Threats Report is available – a collaboration between Waterfall Security Solutions and ICSSTRIVE.…
Read more

Blog
NIS2 and Its Impact on Operational Technology Cybersecurity
The Network and Information Systems Directive (NIS2) primarily focuses on information technology (IT) and addresses the protection of…
Read more

Blog
Segmentation 202: Unidirectional Architectures
This is the second blog in the series, following Segmentation 201: Unidirectional Gateways vs. Firewalls. Unidirectional architectures are…
Read more

Blog
OT Risk Management: Getting Started and Assigning Risk
OT SYSTEMS ARE INCREASINGLY JUST AS EXPOSED TO ATTACKS AS IT SYSTEMS The increase in digitalization, automation, cloud…
Read more
Blog
IT/OT Cyber Theory: Espionage vs. Sabotage
Andrew Ginter


Blog
IT/OT Cyber Theory: Espionage vs. Sabotage
The second-generation of OT security advice started to emerge in 2012-2016.
Read more

Blog
Ships Re-Routed, Ships Run Aground
When we make decisions about other people's safety, we have ethical and often legal obligations to make reasonable…
Read more

Blog
New CISA, CCCS et al Alert | Advice on Pro-Russian Hacktivists Targeting
The most recent CISA, CCCS et al alert / advice on pro-Russian hacktivists targeting critical infrastructures is a…
Read more

Blog
Secure Industrial Remote Access Solutions
Securing industrial remote access is no longer optional—it's essential for protecting operations, maintaining uptime, and safeguarding critical infrastructure.…
Read more

Blog
SCADA Security Fundamentals
Securing SCADA systems is no longer optional—it's a critical requirement for protecting industrial operations, critical infrastructure, and public…
Read more

Blog
What is OT Network Monitoring?
Ready to strengthen your industrial network’s defense without compromising operational integrity? Waterfall Security Solutions offers proven, non-intrusive security…
Read more

Blog
What Is ICS (Industrial Control System) Security?
In today’s interconnected industrial landscape, the security of ICS and SCADA systems is more critical than ever. From…
Read more

Blog
Unidirectional vs Bidirectional: Complete Integration Guide
Before making a decision, assess your organization’s:Risk toleranceOperational requirementsRegulatory obligationsLong-term scalability goalsIn some cases, a hybrid architecture may…
Read more

Blog without auto template
What Is Industrial Control System Software?
The industrial landscape is changing rapidly. Companies that choose flexible, scalable, and secure ICS solutions today will lead…
Read more
Books and eBooks
IT & OT Relationship Management
Andrew Ginter


Books and eBooks
IT & OT Relationship Management
In many organizations the relationship between IT/enterprise security and OT/engineering teams is dysfunctional. Much has been written about…
Read more

Books and eBooks
Rethinking Secure Remote Access for Industrial and OT Networks
Remote access is essential—but traditional solutions like VPNs and jump hosts are increasingly under fire from both attackers…
Read more

Books and eBooks
13 Ways to Break a Firewall
Firewalls are almost always the second technical step taken to secure industrial / OT automation systems. But how…
Read more

Books and eBooks
Cross-Domain Solutions: What They Are, How They Work, and Where You Use Them
This comprehensive guide cuts through the complexity to deliver practical insights on the full spectrum of cross-domain solutions.…
Read more

Books and eBooks
Data Diodes vs. Unidirectional Gateways
Attackers often target industrial systems through bi-directional communication channels. That's why understanding how to effectively implement one-way data…
Read more

Books and eBooks
The 2025 OT Cyber Threat Report
Sharp Rise in Affected Sites: While the overall increase in attacks slowed, their reach expanded dramatically – by…
Read more

Books and eBooks
2024 Threat Report – OT Cyberattacks with Physical Consequences
Appendix A, at the end of the Threat Report, also includes the entire dataset used for the report…
Read more

Books and eBooks
eBook: Unidirectional Security Gateways for Government Networks
Download your copy today and learn how to fully secure government networks against all remote cyber threats including…
Read more

Books and eBooks
Engineering-grade OT Security - A Manager's Guide
Fill out the form and get your copy today.
Read more
Case studies
Cybersecurity for Government Networks
Waterfall team


Case studies
Cybersecurity for Government Networks
Securing a classified/high-security network with a Unidirectional Security Gateway, ensuring continuous and secure cross-domain data flow, while preventing…
Read more

Case studies
Securing a European TSO
100% Security: With Unidirectional Security Gateways, the PI Production Server is now physically protected from any threats emanating…
Read more
Case studies
Cybersecurity for Government Networks
Waterfall team


Case studies
Cybersecurity for Government Networks
Securing a classified/high-security network with a Unidirectional Security Gateway, ensuring continuous and secure cross-domain data flow, while preventing…
Read more

Case studies
Securing a European TSO
100% Security: With Unidirectional Security Gateways, the PI Production Server is now physically protected from any threats emanating…
Read more
Books and eBooks
IT & OT Relationship Management
Andrew Ginter


Books and eBooks
IT & OT Relationship Management
In many organizations the relationship between IT/enterprise security and OT/engineering teams is dysfunctional. Much has been written about…
Read more

Books and eBooks
Rethinking Secure Remote Access for Industrial and OT Networks
Remote access is essential—but traditional solutions like VPNs and jump hosts are increasingly under fire from both attackers…
Read more

Books and eBooks
13 Ways to Break a Firewall
Firewalls are almost always the second technical step taken to secure industrial / OT automation systems. But how…
Read more

Books and eBooks
Cross-Domain Solutions: What They Are, How They Work, and Where You Use Them
This comprehensive guide cuts through the complexity to deliver practical insights on the full spectrum of cross-domain solutions.…
Read more

Books and eBooks
Data Diodes vs. Unidirectional Gateways
Attackers often target industrial systems through bi-directional communication channels. That's why understanding how to effectively implement one-way data…
Read more

Books and eBooks
The 2025 OT Cyber Threat Report
Sharp Rise in Affected Sites: While the overall increase in attacks slowed, their reach expanded dramatically – by…
Read more

Books and eBooks
2024 Threat Report – OT Cyberattacks with Physical Consequences
Appendix A, at the end of the Threat Report, also includes the entire dataset used for the report…
Read more

Books and eBooks
eBook: Unidirectional Security Gateways for Government Networks
Download your copy today and learn how to fully secure government networks against all remote cyber threats including…
Read more

Books and eBooks
Engineering-grade OT Security - A Manager's Guide
Fill out the form and get your copy today.
Read more
Infographic
Infographic: 80 Years of Cyber
Rees Machtemes, P.Eng.


Infographic
Infographic: 80 Years of Cyber
Download your 80 Years of Cyber Infographic and embark on the exciting journey of industrial controls and cybersecurity,…
Read more

Infographic
Infographic: Top 10 OT Cyberattacks of 2024
2024 had more than its fair share of cyberattacks on OT systems. This infographic helps map out the…
Read more

Infographic
Top 10 Cyberattacks of 2023
2023 saw an uptick of cyberattacks across many industries. Our infographic focuses on cyberattacks in 2023 that impacted…
Read more

Infographic
Get the Checklist | EPA Cybersecurity Guidelines for the Water Sector
As part of the Whitehouse’s broader efforts to protect American infrastructure from attacks by nation-states and other cyber…
Read more

Infographic
Cyber Attacks On Critical Infrastructure
Cyber Attacks On Critical InfrastructureInfographicLooking to stay informed about the latest cyber attacks on critical infrastructure?Our exclusive infographic…
Read more
Infographic
Infographic: 80 Years of Cyber
Rees Machtemes, P.Eng.


Infographic
Infographic: 80 Years of Cyber
Download your 80 Years of Cyber Infographic and embark on the exciting journey of industrial controls and cybersecurity,…
Read more

Infographic
Infographic: Top 10 OT Cyberattacks of 2024
2024 had more than its fair share of cyberattacks on OT systems. This infographic helps map out the…
Read more

Infographic
Top 10 Cyberattacks of 2023
2023 saw an uptick of cyberattacks across many industries. Our infographic focuses on cyberattacks in 2023 that impacted…
Read more
Webinar
Top 10 OT Cyber Attacks of 2025
Andrew Ginter



Video
The Top 10 OT-Capable Malware: What We’ve Learned and What Comes Next
In 2024 alone, researchers discovered as many new OT-capable malware families (3) as were found in the previous…
Read more

Video
13 Ways to Break a Firewall (and alternatives for OT security)
Firewalls are almost always the second technical step taken to secureindustrial / OT automation systems. But how much…
Read more

Video
Risks, Rules & Gaps: The Latest on NIS2 and CRA
With the NIS 2 Directive and the Cyber Resilience Act (CRA), cybersecurity requirements are increasing for critical infrastructures…
Read more

Video
Safety-Critical Clouds in Power Generation - 7 Designs Using Cyber-Informed Engineering
We hope you can watch the webinar.
Read more

Video
Building a Game Plan for OT Remote Access
Provide an overview of the current landscape of solutions and needs.Recommend a decision process – how to gather…
Read more

Video
Unpacking the 2025 OT Cyber Threat Report
In 2024, there was 146% increase in the number of sites impacted by cyberattacks targeting heavy industry.The Waterfall…
Read more

Video
'Credibility' vs. 'Likelihood' in OT Security
If we implement the highest 62443 SL4 throughout, have we addressed all credible threats? Do we need strong…
Read more

Video
From Blind Spots to Action: OT Threats Exposed
We measure the strength of a security program by the attacks the program defeats with a high degree…
Read more
Podcast
We can't - and shouldn't - fix everything - Episode 147
Waterfall team


Podcast
We can't - and shouldn't - fix everything - Episode 147
We know there are problems in our security systems, but we can't and shouldn't fix everything. What do…
Read more

Podcast
Medical Device Cybersecurity Is Tricky - Episode 146
"I would estimate that somewhere between 30 and 50% of medical devices that are submitted to FDA today…
Read more

Podcast
Hardware Hacking - Essential OT Attack Knowledge - Episode 145
Hardware Hacking - Essential OT Attack Knowledge | Episode 145Please note: This transcript was auto-generated and then edited…
Read more

Podcast
Managing Risk with Digital Twins - What Do We Do Next? - Episode 144
Managing Risk with Digital Twins - What Do We Do Next? | Episode 144Please note: This transcript was…
Read more

Podcast
I don't sign s**t - Episode 143
Transcript of I don't sign s**t | Episode 143Please note: This transcript was auto-generated and then edited by a…
Read more

Podcast
NIS2 and the Cyber Resilience Act (CRA) - Episode 142
“So NIS2 is focusing on cybersecurity of entities, and the CRA is focusing on cybersecurity for products with…
Read more

Podcast
Network Duct Tape - Episode 141
“We abstract the policy from the network infrastructure such that you can have a group of devices or…
Read more

Podcast
Credibility, not Likelihood - Episode 140
“Large scale destructive attacks on big machinery is, not something that I would consider a credible attack.” -…
Read more

Podcast
Lessons Learned From Incident Response - Episode 139
If you didn't listen to a single thing I said, you can listen to these three things: collaborate,…
Read more
Podcast
Lessons Learned From Incident Response - Episode 139
Waterfall team


Podcast
Lessons Learned From Incident Response - Episode 139
Tune in to 'Lessons Learned From Incident Response', the latest episode of Waterfall Security's OT cybersecurity Podcast.
Read more

Podcast
Risk in Context: When to Patch, When to Let It Ride | Episode 109
In this episode, Rick Kaun, the VP of Solutions at Verve Industrial Protection, takes us deep into the world of…
Read more

Podcast
Hacking the CANbus | Episode 108
In this episode, Dr. Ken Tindell, the CTO at Canis, joins us to talk about cybersecurity and cars. Modern cars…
Read more

Podcast
Saving Money and Effort Automating Compliance | Episode 107
In this episode, Kathryn Wagner, the Vice President, Industry Solutions, Energy & Utilities at Assurx, joins us to explore the…
Read more

Podcast with auto template
How Cyber Fits Into Big-Picture Risk | Episode 106
In this episode, Dr. Janaka Ruwanpura, Vice-Provost, University of Calgary joins us to look at where cyber risks…
Read more

Podcast
Six Steps to Integrating IT & OT in Mining | Episode 105
In this episode, Rob Labbé from Mining and Metals ISAC explains how and why risk assessments are needed and…
Read more

Podcast
Jesus Molina on the Biden National Cyber Strategy
The Biden-Harris administration recently released their National Cybersecurity Strategy. This week, Jesus Molina of Waterfall Security joined ICS…
Read more

Podcast
Stakeholder-Specific Vulnerability Categorization (SSVC) | Episode #102
Stakeholder-specific vulnerability categorization (SSVC) is a new alternative to the common vulnerability scoring system (CVSS) used in the…
Read more

Podcast
Bridging industrial Cybersecurity Workforce Gaps | Episode #101
Industrial cybersecurity workforce gaps are not all the same. Different kinds of organizations in different stages of their…
Read more
Podcast
We can't - and shouldn't - fix everything - Episode 147
Waterfall team


Podcast
We can't - and shouldn't - fix everything - Episode 147
We know there are problems in our security systems, but we can't and shouldn't fix everything. What do…
Read more

Podcast
Medical Device Cybersecurity Is Tricky - Episode 146
"I would estimate that somewhere between 30 and 50% of medical devices that are submitted to FDA today…
Read more

Podcast
Hardware Hacking - Essential OT Attack Knowledge - Episode 145
Hardware Hacking - Essential OT Attack Knowledge | Episode 145Please note: This transcript was auto-generated and then edited…
Read more

Podcast
Managing Risk with Digital Twins - What Do We Do Next? - Episode 144
Managing Risk with Digital Twins - What Do We Do Next? | Episode 144Please note: This transcript was…
Read more

Podcast
I don't sign s**t - Episode 143
Transcript of I don't sign s**t | Episode 143Please note: This transcript was auto-generated and then edited by a…
Read more

Podcast
NIS2 and the Cyber Resilience Act (CRA) - Episode 142
“So NIS2 is focusing on cybersecurity of entities, and the CRA is focusing on cybersecurity for products with…
Read more

Podcast
Network Duct Tape - Episode 141
“We abstract the policy from the network infrastructure such that you can have a group of devices or…
Read more

Podcast
Credibility, not Likelihood - Episode 140
“Large scale destructive attacks on big machinery is, not something that I would consider a credible attack.” -…
Read more

Podcast
Experience & Challenges Using Asset Inventory Tools - Episode 138
“Trying to build a vulnerability management program when you don't know what's out there is a fool's errand...you're…
Read more
Webinar
Bringing Engineering on Board and Resetting IT Expectations
Andrew Ginter


Webinar
Bringing Engineering on Board and Resetting IT Expectations
In many organizations the relationship between IT/enterprise security and OT/engineering teams is dysfunctional. These teams work in the…
Read more
Webinar
Top 10 OT Cyber Attacks of 2025
Andrew Ginter



Video
The Top 10 OT-Capable Malware: What We’ve Learned and What Comes Next
In 2024 alone, researchers discovered as many new OT-capable malware families (3) as were found in the previous…
Read more

Video
13 Ways to Break a Firewall (and alternatives for OT security)
Firewalls are almost always the second technical step taken to secureindustrial / OT automation systems. But how much…
Read more

Video
Risks, Rules & Gaps: The Latest on NIS2 and CRA
With the NIS 2 Directive and the Cyber Resilience Act (CRA), cybersecurity requirements are increasing for critical infrastructures…
Read more

Video
Safety-Critical Clouds in Power Generation - 7 Designs Using Cyber-Informed Engineering
We hope you can watch the webinar.
Read more

Video
Building a Game Plan for OT Remote Access
Provide an overview of the current landscape of solutions and needs.Recommend a decision process – how to gather…
Read more

Video
Unpacking the 2025 OT Cyber Threat Report
In 2024, there was 146% increase in the number of sites impacted by cyberattacks targeting heavy industry.The Waterfall…
Read more

Video
'Credibility' vs. 'Likelihood' in OT Security
If we implement the highest 62443 SL4 throughout, have we addressed all credible threats? Do we need strong…
Read more

Video
From Blind Spots to Action: OT Threats Exposed
We measure the strength of a security program by the attacks the program defeats with a high degree…
Read more
past webinars
Evolving OT Cyber Attacks - Theory to Reality | Recorded Webinar
Waterfall team



Video
Watch: Naoufal Kerboute's Interview at GISEC 2022 for TECHx
Last March Waterfall Security Solutions participated in one of the important events at UAE - GISEC. Naoufal Kerboute,…
Read more

Video
Watch: Andrew Ginter's Interview at GISEC 2022 for TECHx
Last March Waterfall Security Solutions participated in one of the important events at UAE - GISEC. Andrew Ginter,…
Read more

Video
Rise of Ransomware 2022 | Industrial Security Institute
https://www.youtube.com/watch?v=i9oEDAYrI-o&t=17s&ab_channel=WaterfallSecuritySolutions THE INDUSTRIAL SECURITY INSTITUTE OT / industrial / ICS cybersecurity concepts from the perspective of the world’s…
Read more

Video
Round #5 Ask, Learn| Knocking Out OT Cyber Risk | iSi
https://youtu.be/uzlk7mTxilk SUBSCRIBE Free Book PREVIOUS EPS. PREVIOUS EPS. SUBSCRIBE Free Book Andrew Ginter's Book Secure Operations Technology Get…
Read more

Video
Round #4 Outsmart| Knocking Out OT Cyber Risk | iSi
https://youtu.be/1IJ9OjV8VzQ SUBSCRIBE MORE PREVIOUS EPS. PREVIOUS EPS. SUBSCRIBE Next EPS. The Top 20 Cyber Attacks on ICS THE…
Read more

Video
Round #3 Practice | Knocking Out OT Cyber Risk | iSi
https://youtu.be/DHiu_n9NOak SUBSCRIBE MORE PREVIOUS EPS. PREVIOUS EPS. SUBSCRIBE Next EPS. The Top 20 Cyber Attacks on ICS THE…
Read more

Video
Round #2 Double Jab Cross | Knocking Out OT Cyber Risk | iSi
https://youtu.be/Nw8NR4rIE0g SUBSCRIBE MORE PREVIOUS EPS. PREVIOUS EPS. SUBSCRIBE Next EPS. The Top 20 Cyber Attacks on ICS THE…
Read more

Video
Round #1 Strong Guard | Knocking Out OT Cyber Risk | iSi
https://www.youtube.com/watch?v=xYAWsteeOLM SUBSCRIBE MORE PREVIOUS EPS. PREVIOUS EPS. SUBSCRIBE Next EPS. The Top 20 Cyber Attacks on ICS THE…
Read more
Video
Webinar Recording: Engineering Cybersecurity Mitigations for Municipal Water Systems
Waterfall team


Video
Webinar Recording: Engineering Cybersecurity Mitigations for Municipal Water Systems
Mariano Martín Tirado, from Acciona, and Rees Machtemes, from Waterfall, discuss the risks and threat environment that Water…
Read more

Video
Webinar Recording: Cyber-securing Safety and Equipment Protection Systems in Mining
Safety is the top priority in almost all mines, and reliable, efficient physical operations are close seconds. Cybersecurity…
Read more

Video
Webinar Recording: Cyber Attacks with Physical Consequences – 2024 Threat Report
The new Waterfall Security / ICSStrive Threat Report documents 68 cyber attacks with real-world physical consequences impacting 515…
Read more

Video
Recorded Webinar: Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations
Integrating OT with IT introduces new threats to the reliability of existing operations. Connected networks move more than…
Read more

Video
Recorded Webinar: The NIS2 Directive: A Guide for OT Professionals
In this recorded webinar, we take an in-depth look at the European NIS2 Directive and help explain…
Read more

Video
Recorded Webinar: The Top 10 OT/ICS Cyberattacks of 2023
In this webinar recording, we take an in-depth look at the most novel, notorious, and impactful cyber…
Read more

Video
Recorded Webinar: Engineering-Grade OT Security: A Manager’s Guide
Want to get your advanced copy of Andrew Ginter's new book? >>Click here to get your copy
Read more

Video
Network Engineering | Recorded Webinar
Engineering-grade solutions are deterministic and predictable. Cyber-Informed Engineering (CIE) is exploring safety engineering, protection engineering and other engineering…
Read more

Video
Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities
Our Webinar with Andrew Ginter of Waterfall Security Solutions and Bill McEvoy of AVEVA covered many facets of…
Read more
Webinar
Bringing Engineering on Board and Resetting IT Expectations
Andrew Ginter


Webinar
Bringing Engineering on Board and Resetting IT Expectations
In many organizations the relationship between IT/enterprise security and OT/engineering teams is dysfunctional. These teams work in the…
Read more

Webinar
Top 10 OT Cyber Attacks of 2025
Watch the webinar for a comprehensive review of the cyber incidents that shaped the industrial landscape in 2025.…
Read more

Video
The Top 10 OT-Capable Malware: What We’ve Learned and What Comes Next
In 2024 alone, researchers discovered as many new OT-capable malware families (3) as were found in the previous…
Read more

Video
13 Ways to Break a Firewall (and alternatives for OT security)
Firewalls are almost always the second technical step taken to secureindustrial / OT automation systems. But how much…
Read more

Video
Risks, Rules & Gaps: The Latest on NIS2 and CRA
With the NIS 2 Directive and the Cyber Resilience Act (CRA), cybersecurity requirements are increasing for critical infrastructures…
Read more

Video
Safety-Critical Clouds in Power Generation - 7 Designs Using Cyber-Informed Engineering
We hope you can watch the webinar.
Read more

Video
Building a Game Plan for OT Remote Access
Provide an overview of the current landscape of solutions and needs.Recommend a decision process – how to gather…
Read more

Video
Unpacking the 2025 OT Cyber Threat Report
In 2024, there was 146% increase in the number of sites impacted by cyberattacks targeting heavy industry.The Waterfall…
Read more

Video
'Credibility' vs. 'Likelihood' in OT Security
If we implement the highest 62443 SL4 throughout, have we addressed all credible threats? Do we need strong…
Read more
Webinar
Top 10 OT Cyber Attacks of 2025
Andrew Ginter



Video
Risks, Rules & Gaps: The Latest on NIS2 and CRA
With the NIS 2 Directive and the Cyber Resilience Act (CRA), cybersecurity requirements are increasing for critical infrastructures…
Read more

Webinar without auto template
Webinar: HERA - Hardware-Enforced Remote Access
Software-based remote access — VPNs, 2FA, firewalls, jump hosts, and more all have vulnerabilities and potential zero-days that…
Read more

Webinar without auto template
Cyber Attacks with Physical Consequences – 2024 Threat Report
Understanding threats is essential to designing effective defenses. We invite you to join Andrew Ginter, Rees Machtemes and…
Read more

Webinar
Webinar: The NIS2 Directive: A Guide for OT Professionals
Register to join our upcoming webinar as Dr. Jesus Molina takes us through the ins-and-outs of the…
Read more

Webinar
Webinar: The Top 10 OT/ICS Cyberattacks of 2023
Join our webinar for an in-depth look at the most novel, notorious and impactful cyber incidents of…
Read more

Webinar
Webinar: Engineering-Grade OT Security: A manager's guide
Join our webinar to learn about engineering-grade OT security, a new model for cyber risk, and how…
Read more

Webinar
Network Engineering Webinar
Join our next webinar on October 3, 11 am New York time/ 8 am Pacific Time Engineering-grade…
Read more
Trending posts
IT/OT Cyber Theory: Espionage vs. Sabotage
January 6, 2026
Ships Re-Routed, Ships Run Aground
January 6, 2026
Stay up to date
Subscribe to our blog and receive insights straight to your inbox

