All
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you [benefit or goal of the resources].
- All
- Blog
- Books and eBooks
- Case studies
- Infographic
- Podcast
- Video
496
Webinar
Building a Game Plan for OT Remote Access
Andrew Ginter


Webinar
Building a Game Plan for OT Remote Access
OT remote access is seen as essential for many industries, but there are a variety of OT solutions…
Read more

Books and eBooks
The 2025 OT Cyber Threat Report
Sharp Rise in Affected Sites: While the overall increase in attacks slowed, their reach expanded dramatically – by…
Read more

Video
Unpacking the 2025 OT Cyber Threat Report
In 2024, there was 146% increase in the number of sites impacted by cyberattacks targeting heavy industry.The Waterfall…
Read more

Blog
The world needs CIE. CIE needs you.
This first Level Zero will highlight innovation, emphasize critical insights, socialize what works, and connect people to cooperate.I've…
Read more

Podcast
Would You Rather Use a Control System That's Proven Correct? - Episode 136
“With digital transformation there's a lot of possible new cyber threats to the existing infrastructure and architectures of…
Read more

Podcast
Needles in Haystacks - Recruiting OT Incident Responders - Episode 137
“When physical processes are controlled by computers, if there's a mistake, there's a physical outcome and people are…
Read more

Podcast
How to Embed 30 Years of Security Funding into Capital Budgets - Episode 135
“Budgeting for OT cybersecurity shouldn't be an afterthought for a capital project. Trying to integrate it into the…
Read more

Infographic
Infographic: 80 Years of Cyber
Discover how the rise of industrial control systems (ICS) and programmable logic controllers (PLCs) in the 1960s and…
Read more

Video
'Credibility' vs. 'Likelihood' in OT Security
If we implement the highest 62443 SL4 throughout, have we addressed all credible threats? Do we need strong…
Read more
Blog
The world needs CIE. CIE needs you.
Andrew Ginter


Blog
The world needs CIE. CIE needs you.
The new Level Zero OT Cyber Security 2025 Conference is where the world’s experts at the intersection of…
Read more

Blog
Learning From 2024's Top OT Attacks and Planning for 2025's Security
By understanding the tactics and targets of 2024's attacks, we can refine our OT security strategies for 2025.…
Read more

Blog
Finally, An OT Security Approach That Works
This is the inaugural Level Zero OT Cyber Security 2025 Conference – an event people will talk about…
Read more

Blog
Why Understanding OT Attacks Is Important
We can debate whether threats are credible and whether we should spend money and effort addressing credible residual…
Read more

Blog
Secure Remote Access for Critical Infrastructure: What’s at Stake?
In this digital age, ensuring the security of critical infrastructure is not just an operational necessity—it is a…
Read more

Blog
Where does IT Security END and OT Security BEGIN?
So, to summarize, OT begins at the consequence boundary. The place along the entire network where the consequences…
Read more

Blog
Andrew Ginter's Top 3 Webinars of 2024
These are my top 3. If you would like to see even more of our videos, I encourage…
Read more

Blog
Andrew Ginter's Top 3 Podcast Episodes of 2024
Episode #131: Hitting Tens of Thousands of Vehicles At Once with Matt MacKinnonIn this episode, Matt MacKinnon, Head…
Read more

Blog
Are OT Security Investments Worth It?
Collaboration between OT, IT, and security teams ensures aligned strategies and shared ownership of cybersecurity protocols. Approaches such…
Read more
Blog
How Are OT Hackers Getting IN Today?
Waterfall team



Blog
The 2023 Threat Report – At a Glance
The new 2023 OT Cyber Threats Report is available – a collaboration between Waterfall Security Solutions and ICSSTRIVE.…
Read more

Blog
NIS2 and Its Impact on Operational Technology Cybersecurity
The Network and Information Systems Directive (NIS2) primarily focuses on information technology (IT) and addresses the protection of…
Read more

Blog
Segmentation 202: Unidirectional Architectures
This is the second blog in the series, following Segmentation 201: Unidirectional Gateways vs. Firewalls. Unidirectional architectures are…
Read more

Blog
OT Risk Management: Getting Started and Assigning Risk
OT SYSTEMS ARE INCREASINGLY JUST AS EXPOSED TO ATTACKS AS IT SYSTEMS The increase in digitalization, automation, cloud…
Read more

Blog
CISA ICSJWG Event - A Lot to Look Forward To
The first face-to-face CISA / JCDC ICSJWG event is running in Salt Lake City May 9-11. I am…
Read more

Blog
Air Gaps – I do not think it means what you think it means
Air gaps are confusing – a significant minority of practitioners use the term “air gap” in a way…
Read more

Blog
Ransomware Attacks on Hospitals: The Good, the Bad, and the Ugly
The Hospital Clinic in Barcelona recently suffered a ransomware cyberattack. This ransomware affected the services of the 819-bed…
Read more

Blog
The OT Security Revolution
From IT security inspiration to OT security innovation, we are living in the OT security revolution. In recent…
Read more
Blog
The world needs CIE. CIE needs you.
Andrew Ginter


Blog
The world needs CIE. CIE needs you.
The new Level Zero OT Cyber Security 2025 Conference is where the world’s experts at the intersection of…
Read more

Blog
Learning From 2024's Top OT Attacks and Planning for 2025's Security
By understanding the tactics and targets of 2024's attacks, we can refine our OT security strategies for 2025.…
Read more

Blog
Finally, An OT Security Approach That Works
This is the inaugural Level Zero OT Cyber Security 2025 Conference – an event people will talk about…
Read more

Blog
Why Understanding OT Attacks Is Important
We can debate whether threats are credible and whether we should spend money and effort addressing credible residual…
Read more

Blog
Secure Remote Access for Critical Infrastructure: What’s at Stake?
In this digital age, ensuring the security of critical infrastructure is not just an operational necessity—it is a…
Read more

Blog
Where does IT Security END and OT Security BEGIN?
So, to summarize, OT begins at the consequence boundary. The place along the entire network where the consequences…
Read more

Blog
Andrew Ginter's Top 3 Webinars of 2024
These are my top 3. If you would like to see even more of our videos, I encourage…
Read more

Blog
Andrew Ginter's Top 3 Podcast Episodes of 2024
Episode #131: Hitting Tens of Thousands of Vehicles At Once with Matt MacKinnonIn this episode, Matt MacKinnon, Head…
Read more

Blog
Are OT Security Investments Worth It?
Collaboration between OT, IT, and security teams ensures aligned strategies and shared ownership of cybersecurity protocols. Approaches such…
Read more
Books and eBooks
The 2025 OT Cyber Threat Report
Waterfall team


Books and eBooks
The 2025 OT Cyber Threat Report
The Waterfall Threat Report 2025 brings you comprehensive insights on cyber attacks that caused physical consequences in OT…
Read more

Books and eBooks
2024 Threat Report – OT Cyberattacks with Physical Consequences
Appendix A, at the end of the Threat Report, also includes the entire dataset used for the report…
Read more

Books and eBooks
eBook: Unidirectional Security Gateways for Government Networks
Download your copy today and learn how to fully secure government networks against all remote cyber threats including…
Read more

Books and eBooks
Engineering-grade OT Security - A Manager's Guide
Fill out the form and get your copy today.
Read more

Books and eBooks
2023 Threat Report - OT Cyberattacks With Physical Consequences
Two cyberattacks that bankrupted the targeted organization An attack that resulted in a fire that damaged equipment…
Read more

Books and eBooks
Firewalls vs Unidirectional Gateways Ebook
Define what is a firewall Review firewall principles Introduce Unidirectional Gateways Compare the effectiveness of these two…
Read more

Books and eBooks
BSEE Real-time Monitoring (RTM) Requirements For OCS Operators
Fill out the form and get your copy today.
Read more

Books and eBooks
OT Security Incidents In 2021
2021 Data OT OutagesRansomware ConsequencesFuture RecommendationsConclusions
Read more

Books and eBooks
Cybersecurity for AVEVA PI Servers
The Problem with Firewalls & DMZ Configurations Security for AVEVA PI & Data Hub Installations The Unidirectional…
Read more
Case studies
Cybersecurity for Government Networks
Waterfall team


Case studies
Cybersecurity for Government Networks
Securing a classified/high-security network with a Unidirectional Security Gateway, ensuring continuous and secure cross-domain data flow, while preventing…
Read more

Case studies
Securing a European TSO
100% Security: With Unidirectional Security Gateways, the PI Production Server is now physically protected from any threats emanating…
Read more
Case studies
Cybersecurity for Government Networks
Waterfall team


Case studies
Cybersecurity for Government Networks
Securing a classified/high-security network with a Unidirectional Security Gateway, ensuring continuous and secure cross-domain data flow, while preventing…
Read more

Case studies
Securing a European TSO
100% Security: With Unidirectional Security Gateways, the PI Production Server is now physically protected from any threats emanating…
Read more
Books and eBooks
The 2025 OT Cyber Threat Report
Waterfall team


Books and eBooks
The 2025 OT Cyber Threat Report
The Waterfall Threat Report 2025 brings you comprehensive insights on cyber attacks that caused physical consequences in OT…
Read more

Books and eBooks
2024 Threat Report – OT Cyberattacks with Physical Consequences
Appendix A, at the end of the Threat Report, also includes the entire dataset used for the report…
Read more

Books and eBooks
eBook: Unidirectional Security Gateways for Government Networks
Download your copy today and learn how to fully secure government networks against all remote cyber threats including…
Read more

Books and eBooks
Engineering-grade OT Security - A Manager's Guide
Fill out the form and get your copy today.
Read more

Books and eBooks
2023 Threat Report - OT Cyberattacks With Physical Consequences
Two cyberattacks that bankrupted the targeted organization An attack that resulted in a fire that damaged equipment…
Read more

Books and eBooks
Firewalls vs Unidirectional Gateways Ebook
Define what is a firewall Review firewall principles Introduce Unidirectional Gateways Compare the effectiveness of these two…
Read more

Books and eBooks
BSEE Real-time Monitoring (RTM) Requirements For OCS Operators
Fill out the form and get your copy today.
Read more

Books and eBooks
OT Security Incidents In 2021
2021 Data OT OutagesRansomware ConsequencesFuture RecommendationsConclusions
Read more

Books and eBooks
Cybersecurity for AVEVA PI Servers
The Problem with Firewalls & DMZ Configurations Security for AVEVA PI & Data Hub Installations The Unidirectional…
Read more
Infographic
Infographic: 80 Years of Cyber
Rees Machtemes, P.Eng.


Infographic
Infographic: 80 Years of Cyber
Download your 80 Years of Cyber Infographic and embark on the exciting journey of industrial controls and cybersecurity,…
Read more

Infographic
Infographic: Top 10 OT Cyberattacks of 2024
2024 had more than its fair share of cyberattacks on OT systems. This infographic helps map out the…
Read more

Infographic
Top 10 Cyberattacks of 2023
2023 saw an uptick of cyberattacks across many industries. Our infographic focuses on cyberattacks in 2023 that impacted…
Read more

Infographic
Get the Checklist | EPA Cybersecurity Guidelines for the Water Sector
As part of the Whitehouse’s broader efforts to protect American infrastructure from attacks by nation-states and other cyber…
Read more

Infographic
Cyber Attacks On Critical Infrastructure
Cyber Attacks On Critical Infrastructure Infographic Looking to stay informed about the latest cyber attacks on critical infrastructure?…
Read more

Infographic
How cyber attacks impact industrial operations? (Infographic)
Sophisticated, targeted ransomware attacks shutting down OT systems and critical infrastructure have gained considerable momentum in recent years.…
Read more
Infographic
Cyber Attacks On Critical Infrastructure
Waterfall team



Infographic
How cyber attacks impact industrial operations? (Infographic)
Sophisticated, targeted ransomware attacks shutting down OT systems and critical infrastructure have gained considerable momentum in recent years.…
Read more
Infographic
Infographic: 80 Years of Cyber
Rees Machtemes, P.Eng.


Infographic
Infographic: 80 Years of Cyber
Download your 80 Years of Cyber Infographic and embark on the exciting journey of industrial controls and cybersecurity,…
Read more

Infographic
Infographic: Top 10 OT Cyberattacks of 2024
2024 had more than its fair share of cyberattacks on OT systems. This infographic helps map out the…
Read more

Infographic
Top 10 Cyberattacks of 2023
2023 saw an uptick of cyberattacks across many industries. Our infographic focuses on cyberattacks in 2023 that impacted…
Read more
Podcast
Would You Rather Use a Control System That's Proven Correct? - Episode 136
Waterfall team


Podcast
Would You Rather Use a Control System That's Proven Correct? - Episode 136
Daly Brown and Nick Foubert of Metropolitan Technologies look at a new approach to designing OT systems.
Read more

Podcast
Needles in Haystacks - Recruiting OT Incident Responders - Episode 137
“When physical processes are controlled by computers, if there's a mistake, there's a physical outcome and people are…
Read more

Podcast
How to Embed 30 Years of Security Funding into Capital Budgets - Episode 135
“Budgeting for OT cybersecurity shouldn't be an afterthought for a capital project. Trying to integrate it into the…
Read more

Podcast
Insights into Nation State Threats - Podcast Episode 134
Deloitte is one of the "Big Four" accounting firms and a global leader in professional services, offering expertise…
Read more

Podcast
OT Security Data Science - A Better Vulnerability Database - Episode 133
DeviceTotal offers the world's first agentless solution to detect and eliminate vulnerabilities and risks in OT, IoT, network,…
Read more

Podcast
Driving Change - Cloud Systems and Japanese CCE | Episode 132
Dr. Tomomi Aoyama is a distinguished figure in the field of industrial cybersecurity, currently serving as Private SaaS…
Read more

Podcast
Hitting Tens of Thousands of Vehicles At Once | Episode 131
Matt MacKinnon handles Global Strategic Alliances at Upstream Security. Matt is an accomplished manager with success in leading…
Read more

Podcast
AI Takes on Polymorphic Malware | Episode 130
Gary Southwell is a cybersecurity veteran who worked on deploying some of the first Checkpoint firewalls back in…
Read more

Podcast
New Resource: Adapting IT Advice for OT | Episode 129
Jack Bliss is a motivated cybersecurity consultant that enjoys working with others to achieve common goals. Experience with…
Read more
Podcast
Risk in Context: When to Patch, When to Let It Ride | Episode 109
Waterfall team



Podcast
Hacking the CANbus | Episode 108
In this episode, Dr. Ken Tindell, the CTO at Canis, joins us to talk about cybersecurity and cars. Modern cars…
Read more

Podcast
Saving Money and Effort Automating Compliance | Episode 107
In this episode, Kathryn Wagner, the Vice President, Industry Solutions, Energy & Utilities at Assurx, joins us to explore the…
Read more

Podcast
How Cyber Fits Into Big-Picture Risk | Episode 106
In this episode, Dr. Janaka Ruwanpura, Vice-Provost, University of Calgary joins us to look at where cyber risks…
Read more

Podcast
Six Steps to Integrating IT & OT in Mining | Episode 105
In this episode, Rob Labbé from Mining and Metals ISAC explains how and why risk assessments are needed and…
Read more

Podcast
Jesus Molina on the Biden National Cyber Strategy
The Biden-Harris administration recently released their National Cybersecurity Strategy. This week, Jesus Molina of Waterfall Security joined ICS…
Read more

Podcast
Stakeholder-Specific Vulnerability Categorization (SSVC) | Episode #102
Stakeholder-specific vulnerability categorization (SSVC) is a new alternative to the common vulnerability scoring system (CVSS) used in the…
Read more

Podcast
Bridging industrial Cybersecurity Workforce Gaps | Episode #101
Industrial cybersecurity workforce gaps are not all the same. Different kinds of organizations in different stages of their…
Read more

Podcast
Engineering-Grade security in the US DOE Cyber Informed Engineering Strategy | Episode #100
Cyber Informed Engineering – the new US DOE Strategy includes unhackable safeties, manual operations, and other engineering-grade protections,…
Read more
Podcast
Would You Rather Use a Control System That's Proven Correct? - Episode 136
Waterfall team


Podcast
Would You Rather Use a Control System That's Proven Correct? - Episode 136
Daly Brown and Nick Foubert of Metropolitan Technologies look at a new approach to designing OT systems.
Read more

Podcast
Needles in Haystacks - Recruiting OT Incident Responders - Episode 137
“When physical processes are controlled by computers, if there's a mistake, there's a physical outcome and people are…
Read more

Podcast
How to Embed 30 Years of Security Funding into Capital Budgets - Episode 135
“Budgeting for OT cybersecurity shouldn't be an afterthought for a capital project. Trying to integrate it into the…
Read more

Podcast
Insights into Nation State Threats - Podcast Episode 134
Deloitte is one of the "Big Four" accounting firms and a global leader in professional services, offering expertise…
Read more

Podcast
OT Security Data Science - A Better Vulnerability Database - Episode 133
DeviceTotal offers the world's first agentless solution to detect and eliminate vulnerabilities and risks in OT, IoT, network,…
Read more

Podcast
Driving Change - Cloud Systems and Japanese CCE | Episode 132
Dr. Tomomi Aoyama is a distinguished figure in the field of industrial cybersecurity, currently serving as Private SaaS…
Read more

Podcast
Hitting Tens of Thousands of Vehicles At Once | Episode 131
Matt MacKinnon handles Global Strategic Alliances at Upstream Security. Matt is an accomplished manager with success in leading…
Read more

Podcast
AI Takes on Polymorphic Malware | Episode 130
Gary Southwell is a cybersecurity veteran who worked on deploying some of the first Checkpoint firewalls back in…
Read more

Podcast
New Resource: Adapting IT Advice for OT | Episode 129
Jack Bliss is a motivated cybersecurity consultant that enjoys working with others to achieve common goals. Experience with…
Read more
Video
Unpacking the 2025 OT Cyber Threat Report
Andrew Ginter


Video
Unpacking the 2025 OT Cyber Threat Report
Watch the webinar that unpacks Waterfall's 2025 OT Cyber Threat Report and understand today's OT cyber threat landscape.
Read more

Video
'Credibility' vs. 'Likelihood' in OT Security
If we implement the highest 62443 SL4 throughout, have we addressed all credible threats? Do we need strong…
Read more

Video
From Blind Spots to Action: OT Threats Exposed
We measure the strength of a security program by the attacks the program defeats with a high degree…
Read more

Video
Top 10 Cyberattacks on Industrial and Critical Infrastructure of 2024
As 2024 winds down, we wrap up and discuss the year’s most important cyber incidents that targeted physical…
Read more

Video
Webinar: Evolving Global OT Cyber Guidelines, Recent Developments and What is Driving it
Watch the webinar for a look into the recent evolution of OT security standards. There are some common…
Read more

Video
Webinar: Navigating OT Remote Access - Technologies, Limitations, and the Latest Recommendations
Watch the insightful webinar where we delve into the rapidly evolving landscape of OT remote access. With the…
Read more

Video
Webinar: HERA - Hardware-Enforced Remote Access
Software-based remote access — VPNs, 2FA, firewalls, jump hosts, and more all have vulnerabilities and potential zero-days that…
Read more

Video
Webinar Recording: Engineering Cybersecurity Mitigations for Municipal Water Systems
Large water utilities are looking to gain efficiencies by adopting new distributed edge devices and digital transformation initiatives…
Read more

Video
Webinar Recording: Cyber-securing Safety and Equipment Protection Systems in Mining
Safety is the top priority in almost all mines, and reliable, efficient physical operations are close seconds. Cybersecurity…
Read more
Video
Evolving OT Cyber Attacks - Theory to Reality | Recorded Webinar
Waterfall team



Video
Missing Links for Managing OT Cyber Risk | Recorded Webinar Securityweek
Managing OT cyber risk is more than cybersecurity - an IT-SEC only approach ignores powerful engineering tools for…
Read more

Video
12 Months of Cyber Attacks—Lessons, Trends, and Predictions | Automation.com Recorded Webinar
Industrial cyber attacks leading to production downtime and other physical consequences more than doubled in 2021 over 2020.…
Read more

Video
Watch: Naoufal Kerboute's Interview at GISEC 2022 for TECHx
Last March Waterfall Security Solutions participated in one of the important events at UAE - GISEC. Naoufal Kerboute,…
Read more

Video
Watch: Andrew Ginter's Interview at GISEC 2022 for TECHx
Last March Waterfall Security Solutions participated in one of the important events at UAE - GISEC. Andrew Ginter,…
Read more

Video
Redefining OT security with Unidirectional Security Gateways
Watch highlights from an interview by Ran Pedhazur, Chief Business Development Officer at Waterfall, and Nicolai Solling, Chief…
Read more

Video
Bakotech Webinar Recording: Firewalls vs. Unidirectional Security Gateways
https://www.youtube.com/watch?v=nGJaJnXPZdc eBook | Firewalls vs. Unidirectional Gateways
Read more

Video
How to Protect Critical Infrastructure from Cyberattacks
https://www.youtube.com/watch?v=UkYCFBy_9Q0&ab_channel=WaterfallSecuritySolutions SUBSCRIBE NEXT EPS. PREVIOUS EPS. PREVIOUS EPS. SUBSCRIBE NEXT EPS. Free consultation with Unidirectional solutions architect CONTACT…
Read more

Video
Rise of Ransomware 2022 | Industrial Security Institute
https://www.youtube.com/watch?v=i9oEDAYrI-o&t=17s&ab_channel=WaterfallSecuritySolutions THE INDUSTRIAL SECURITY INSTITUTE OT / industrial / ICS cybersecurity concepts from the perspective of the world’s…
Read more
Video
Webinar Recording: Engineering Cybersecurity Mitigations for Municipal Water Systems
Waterfall team


Video
Webinar Recording: Engineering Cybersecurity Mitigations for Municipal Water Systems
Mariano Martín Tirado, from Acciona, and Rees Machtemes, from Waterfall, discuss the risks and threat environment that Water…
Read more

Video
Webinar Recording: Cyber-securing Safety and Equipment Protection Systems in Mining
Safety is the top priority in almost all mines, and reliable, efficient physical operations are close seconds. Cybersecurity…
Read more

Video
Webinar Recording: Cyber Attacks with Physical Consequences – 2024 Threat Report
The new Waterfall Security / ICSStrive Threat Report documents 68 cyber attacks with real-world physical consequences impacting 515…
Read more

Video
Recorded Webinar: Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations
Integrating OT with IT introduces new threats to the reliability of existing operations. Connected networks move more than…
Read more

Video
Recorded Webinar: The NIS2 Directive: A Guide for OT Professionals
In this recorded webinar, we take an in-depth look at the European NIS2 Directive and help explain…
Read more

Video
Recorded Webinar: The Top 10 OT/ICS Cyberattacks of 2023
In this webinar recording, we take an in-depth look at the most novel, notorious, and impactful cyber…
Read more

Video
Recorded Webinar: Engineering-Grade OT Security: A Manager’s Guide
Want to get your advanced copy of Andrew Ginter's new book? >>Click here to get your copy
Read more

Video
Network Engineering | Recorded Webinar
Engineering-grade solutions are deterministic and predictable. Cyber-Informed Engineering (CIE) is exploring safety engineering, protection engineering and other engineering…
Read more

Video
Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities
Our Webinar with Andrew Ginter of Waterfall Security Solutions and Bill McEvoy of AVEVA covered many facets of…
Read more
Webinar
Building a Game Plan for OT Remote Access
Andrew Ginter


Webinar
Building a Game Plan for OT Remote Access
OT remote access is seen as essential for many industries, but there are a variety of OT solutions…
Read more

Video
Webinar: HERA - Hardware-Enforced Remote Access
Software-based remote access — VPNs, 2FA, firewalls, jump hosts, and more all have vulnerabilities and potential zero-days that…
Read more

Webinar
Cyber Attacks with Physical Consequences – 2024 Threat Report
Understanding threats is essential to designing effective defenses. We invite you to join Andrew Ginter, Rees Machtemes and…
Read more

Webinar
Webinar: The NIS2 Directive: A Guide for OT Professionals
Register to join our upcoming webinar as Dr. Jesus Molina takes us through the ins-and-outs of the…
Read more

Webinar
Webinar: The Top 10 OT/ICS Cyberattacks of 2023
Join our webinar for an in-depth look at the most novel, notorious and impactful cyber incidents of…
Read more

Webinar
Webinar: Engineering-Grade OT Security: A manager's guide
Join our webinar to learn about engineering-grade OT security, a new model for cyber risk, and how…
Read more

Webinar
Network Engineering Webinar
Join our next webinar on October 3, 11 am New York time/ 8 am Pacific Time Engineering-grade…
Read more
Webinar
Building a Game Plan for OT Remote Access
Andrew Ginter


Webinar
Building a Game Plan for OT Remote Access
OT remote access is seen as essential for many industries, but there are a variety of OT solutions…
Read more

Video
Webinar: HERA - Hardware-Enforced Remote Access
Software-based remote access — VPNs, 2FA, firewalls, jump hosts, and more all have vulnerabilities and potential zero-days that…
Read more

Webinar
Cyber Attacks with Physical Consequences – 2024 Threat Report
Understanding threats is essential to designing effective defenses. We invite you to join Andrew Ginter, Rees Machtemes and…
Read more

Webinar
Webinar: The NIS2 Directive: A Guide for OT Professionals
Register to join our upcoming webinar as Dr. Jesus Molina takes us through the ins-and-outs of the…
Read more

Webinar
Webinar: The Top 10 OT/ICS Cyberattacks of 2023
Join our webinar for an in-depth look at the most novel, notorious and impactful cyber incidents of…
Read more

Webinar
Webinar: Engineering-Grade OT Security: A manager's guide
Join our webinar to learn about engineering-grade OT security, a new model for cyber risk, and how…
Read more

Webinar
Network Engineering Webinar
Join our next webinar on October 3, 11 am New York time/ 8 am Pacific Time Engineering-grade…
Read more
Trending posts
Building a Game Plan for OT Remote Access
March 17, 2025
The 2025 OT Cyber Threat Report
March 11, 2025
Unpacking the 2025 OT Cyber Threat Report
February 26, 2025
Stay up to date
Subscribe to our blog and receive insights straight to your inbox