All

Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you [benefit or goal of the resources].

  • All
  • Blog
  • Books and eBooks
  • Case studies
  • Infographic
  • Podcast
  • Webinar
  • Video

IT/OT Cyber Theory: Espionage vs. Sabotage

ITOT Cyber Theory Espionage vs Sabotage
ITOT Cyber Theory Espionage vs Sabotage

IT/OT Cyber Theory: Espionage vs. Sabotage

The second-generation of OT security advice started to emerge in 2012-2016.
Read more
Ships Re-Routed, Ships Run Aground

Ships Re-Routed, Ships Run Aground

When we make decisions about other people's safety, we have ethical and often legal obligations to make reasonable…
Read more
New CISA, CCCS et al Alert Advice on Pro-Russian Hacktivists Targeting

New CISA, CCCS et al Alert | Advice on Pro-Russian Hacktivists Targeting

The most recent CISA, CCCS et al alert / advice on pro-Russian hacktivists targeting critical infrastructures is a…
Read more
Aligning Engineering and IT Expectations - webinar invitation

Bringing Engineering on Board and Resetting IT Expectations

In many organizations the relationship between IT/enterprise security and OT/engineering teams is dysfunctional. These teams work in the…
Read more
We can't - and shouldn't - fix everything

We can't - and shouldn't - fix everything - Episode 147

"We have new intel. The threat has changed, the probability has changed, the impact has changed, whatever it…
Read more
Medical Device Cybersecurity Is Tricky

Medical Device Cybersecurity Is Tricky - Episode 146

"I would estimate that somewhere between 30 and 50% of medical devices that are submitted to FDA today…
Read more
Hardware Hacking - Essential OT Attack Knowledge

Hardware Hacking - Essential OT Attack Knowledge - Episode 145

Hardware Hacking - Essential OT Attack Knowledge | Episode 145Please note: This transcript was auto-generated and then edited…
Read more
Top 10 OT Cyber Attacks of 2025 - webinar recording

Top 10 OT Cyber Attacks of 2025

Watch the webinar for a comprehensive review of the cyber incidents that shaped the industrial landscape in 2025.…
Read more
manufacturing cyber security

Cyber Threats to the Manufacturing Industry: Risks, Impact, and Protection Strategies

The manufacturing sector stands at a critical inflection point as digital transformation reshapes production environments worldwide. While smart…
Read more

IT/OT Cyber Theory: Espionage vs. Sabotage

ITOT Cyber Theory Espionage vs Sabotage
ITOT Cyber Theory Espionage vs Sabotage

IT/OT Cyber Theory: Espionage vs. Sabotage

The second-generation of OT security advice started to emerge in 2012-2016.
Read more
Ships Re-Routed, Ships Run Aground

Ships Re-Routed, Ships Run Aground

When we make decisions about other people's safety, we have ethical and often legal obligations to make reasonable…
Read more
New CISA, CCCS et al Alert Advice on Pro-Russian Hacktivists Targeting

New CISA, CCCS et al Alert | Advice on Pro-Russian Hacktivists Targeting

The most recent CISA, CCCS et al alert / advice on pro-Russian hacktivists targeting critical infrastructures is a…
Read more
manufacturing cyber security

Cyber Threats to the Manufacturing Industry: Risks, Impact, and Protection Strategies

The manufacturing sector stands at a critical inflection point as digital transformation reshapes production environments worldwide. While smart…
Read more
Cyber security oil and gas

Top Oil and Gas Security Challenges and Best Practices for Protection

The oil and gas industry faces a complex maze of cybersecurity challenges as digital transformation continues to reshape…
Read more
Data Diode vs Firewall

Data Diode vs Firewall: Understanding the Key Differences in OT Security

When you're protecting operational technology infrastructure, the security solution you pick could mean the difference between weathering a…
Read more
Remote Access at Wind Farms

Doing the Math – Remote Access at Wind Farms

By Andrew Ginter, VP Industrial Security, Waterfall Security Stuff wears out. Friction is the enemy of moving parts…
Read more
Secure Industrial Remote Access Solutions

Secure Industrial Remote Access Solutions

Securing industrial remote access is no longer optional—it's essential for protecting operations, maintaining uptime, and safeguarding critical infrastructure.…
Read more
What is SCADA Security

SCADA Security Fundamentals

Securing SCADA systems is no longer optional—it's a critical requirement for protecting industrial operations, critical infrastructure, and public…
Read more

Cyber Threats to the Manufacturing Industry: Risks, Impact, and Protection Strategies

manufacturing cyber security
manufacturing cyber security

Cyber Threats to the Manufacturing Industry: Risks, Impact, and Protection Strategies

Read more
Cyber security oil and gas

Top Oil and Gas Security Challenges and Best Practices for Protection

The oil and gas industry faces a complex maze of cybersecurity challenges as digital transformation continues to reshape…
Read more
Data Diode vs Firewall

Data Diode vs Firewall: Understanding the Key Differences in OT Security

When you're protecting operational technology infrastructure, the security solution you pick could mean the difference between weathering a…
Read more
Remote Access at Wind Farms

Doing the Math – Remote Access at Wind Farms

By Andrew Ginter, VP Industrial Security, Waterfall Security Stuff wears out. Friction is the enemy of moving parts…
Read more
How OT hackers are getting IN today

How Are OT Hackers Getting IN Today?

Operational Technology (OT) refers to the hardware and software systems that control and monitor physical devices and processes…
Read more

The 2023 Threat Report – At a Glance

The new 2023 OT Cyber Threats Report is available – a collaboration between Waterfall Security Solutions and ICSSTRIVE.…
Read more
NIS2 Directive and Impact on OT Cybersecurity

NIS2 and Its Impact on Operational Technology Cybersecurity

The Network and Information Systems Directive (NIS2) primarily focuses on information technology (IT) and addresses the protection of…
Read more
Segmentation 202 Unidirectional Architectures

Segmentation 202: Unidirectional Architectures

This is the second blog in the series, following Segmentation 201: Unidirectional Gateways vs. Firewalls. Unidirectional architectures are…
Read more
OT Risk Management Getting Started and Assigning Risk

OT Risk Management: Getting Started and Assigning Risk

OT SYSTEMS ARE INCREASINGLY JUST AS EXPOSED TO ATTACKS AS IT SYSTEMS The increase in digitalization, automation, cloud…
Read more

IT/OT Cyber Theory: Espionage vs. Sabotage

ITOT Cyber Theory Espionage vs Sabotage
ITOT Cyber Theory Espionage vs Sabotage

IT/OT Cyber Theory: Espionage vs. Sabotage

The second-generation of OT security advice started to emerge in 2012-2016.
Read more
Ships Re-Routed, Ships Run Aground

Ships Re-Routed, Ships Run Aground

When we make decisions about other people's safety, we have ethical and often legal obligations to make reasonable…
Read more
New CISA, CCCS et al Alert Advice on Pro-Russian Hacktivists Targeting

New CISA, CCCS et al Alert | Advice on Pro-Russian Hacktivists Targeting

The most recent CISA, CCCS et al alert / advice on pro-Russian hacktivists targeting critical infrastructures is a…
Read more
Secure Industrial Remote Access Solutions

Secure Industrial Remote Access Solutions

Securing industrial remote access is no longer optional—it's essential for protecting operations, maintaining uptime, and safeguarding critical infrastructure.…
Read more
What is SCADA Security

SCADA Security Fundamentals

Securing SCADA systems is no longer optional—it's a critical requirement for protecting industrial operations, critical infrastructure, and public…
Read more
What is OT Network Monitoring

What is OT Network Monitoring?

Ready to strengthen your industrial network’s defense without compromising operational integrity? Waterfall Security Solutions offers proven, non-intrusive security…
Read more
ics

What Is ICS (Industrial Control System) Security?

In today’s interconnected industrial landscape, the security of ICS and SCADA systems is more critical than ever. From…
Read more
Unidirectional vs Bidirectional Integration

Unidirectional vs Bidirectional: Complete Integration Guide

Before making a decision, assess your organization’s:Risk toleranceOperational requirementsRegulatory obligationsLong-term scalability goalsIn some cases, a hybrid architecture may…
Read more

What Is Industrial Control System Software?

The industrial landscape is changing rapidly. Companies that choose flexible, scalable, and secure ICS solutions today will lead…
Read more

IT & OT Relationship Management

IT & OT Relationship Management eBook
IT & OT Relationship Management eBook

IT & OT Relationship Management

In many organizations the relationship between IT/enterprise security and OT/engineering teams is dysfunctional. Much has been written about…
Read more
Rethinking Secure Remote Access for Industrial and OT Networks

Rethinking Secure Remote Access for Industrial and OT Networks

Remote access is essential—but traditional solutions like VPNs and jump hosts are increasingly under fire from both attackers…
Read more
13 Ways to Break a Firewall eBook

13 Ways to Break a Firewall

Firewalls are almost always the second technical step taken to secure industrial / OT automation systems. But how…
Read more
Cross Domain Solutions

Cross-Domain Solutions: What They Are, How They Work, and Where You Use Them

This comprehensive guide cuts through the complexity to deliver practical insights on the full spectrum of cross-domain solutions.…
Read more
Data Diodes Vs Unidirectional Gateways eBook

Data Diodes vs. Unidirectional Gateways

Attackers often target industrial systems through bi-directional communication channels. That's why understanding how to effectively implement one-way data…
Read more
2025 Threat Report

The 2025 OT Cyber Threat Report

Sharp Rise in Affected Sites: While the overall increase in attacks slowed, their reach expanded dramatically – by…
Read more
Threat Report Webinar

2024 Threat Report – OT Cyberattacks with Physical Consequences

Appendix A, at the end of the Threat Report, also includes the entire dataset used for the report…
Read more

eBook: Unidirectional Security Gateways for Government Networks

Download your copy today and learn how to fully secure government networks against all remote cyber threats including…
Read more

Engineering-grade OT Security - A Manager's Guide

Fill out the form and get your copy today.
Read more

Cybersecurity for Government Networks

Government Network Cybersecurity
Government Network Cybersecurity

Cybersecurity for Government Networks

Securing a classified/high-security network with a Unidirectional Security Gateway, ensuring continuous and secure cross-domain data flow, while preventing…
Read more
UAE based oil and gas refinery

UAE Based Oil & Gas Refinery 

Click to enlarge
Read more
European TSO Case Study

Securing a European TSO

100% Security: With Unidirectional Security Gateways, the PI Production Server is now physically protected from any threats emanating…
Read more
Cybersecurity In Mining

Cybersecurity In Mining

Cyber Threats To The Mining Industry
Read more

Cybersecurity for Government Networks

Government Network Cybersecurity
Government Network Cybersecurity

Cybersecurity for Government Networks

Securing a classified/high-security network with a Unidirectional Security Gateway, ensuring continuous and secure cross-domain data flow, while preventing…
Read more
UAE based oil and gas refinery

UAE Based Oil & Gas Refinery 

Click to enlarge
Read more
European TSO Case Study

Securing a European TSO

100% Security: With Unidirectional Security Gateways, the PI Production Server is now physically protected from any threats emanating…
Read more
Cybersecurity In Mining

Cybersecurity In Mining

Cyber Threats To The Mining Industry
Read more

IT & OT Relationship Management

IT & OT Relationship Management eBook
IT & OT Relationship Management eBook

IT & OT Relationship Management

In many organizations the relationship between IT/enterprise security and OT/engineering teams is dysfunctional. Much has been written about…
Read more
Rethinking Secure Remote Access for Industrial and OT Networks

Rethinking Secure Remote Access for Industrial and OT Networks

Remote access is essential—but traditional solutions like VPNs and jump hosts are increasingly under fire from both attackers…
Read more
13 Ways to Break a Firewall eBook

13 Ways to Break a Firewall

Firewalls are almost always the second technical step taken to secure industrial / OT automation systems. But how…
Read more
Cross Domain Solutions

Cross-Domain Solutions: What They Are, How They Work, and Where You Use Them

This comprehensive guide cuts through the complexity to deliver practical insights on the full spectrum of cross-domain solutions.…
Read more
Data Diodes Vs Unidirectional Gateways eBook

Data Diodes vs. Unidirectional Gateways

Attackers often target industrial systems through bi-directional communication channels. That's why understanding how to effectively implement one-way data…
Read more
2025 Threat Report

The 2025 OT Cyber Threat Report

Sharp Rise in Affected Sites: While the overall increase in attacks slowed, their reach expanded dramatically – by…
Read more
Threat Report Webinar

2024 Threat Report – OT Cyberattacks with Physical Consequences

Appendix A, at the end of the Threat Report, also includes the entire dataset used for the report…
Read more

eBook: Unidirectional Security Gateways for Government Networks

Download your copy today and learn how to fully secure government networks against all remote cyber threats including…
Read more

Engineering-grade OT Security - A Manager's Guide

Fill out the form and get your copy today.
Read more

Infographic: 80 Years of Cyber

80 years of cyber
80 years of cyber

Infographic: 80 Years of Cyber

Download your 80 Years of Cyber Infographic and embark on the exciting journey of industrial controls and cybersecurity,…
Read more
Top 10 Attacks of 2024

Infographic: Top 10 OT Cyberattacks of 2024

2024 had more than its fair share of cyberattacks on OT systems. This infographic helps map out the…
Read more

Top 10 Cyberattacks of 2023

2023 saw an uptick of cyberattacks across many industries. Our infographic focuses on cyberattacks in 2023 that impacted…
Read more

Get the Checklist | EPA Cybersecurity Guidelines for the Water Sector

As part of the Whitehouse’s broader efforts to protect American infrastructure from attacks by nation-states and other cyber…
Read more

Cyber Attacks On Critical Infrastructure

Cyber Attacks On Critical InfrastructureInfographicLooking to stay informed about the latest cyber attacks on critical infrastructure?Our exclusive infographic…
Read more

Cyber Attacks On Critical Infrastructure

Cyber Attacks On Critical Infrastructure

Read more

Infographic: 80 Years of Cyber

80 years of cyber
80 years of cyber

Infographic: 80 Years of Cyber

Download your 80 Years of Cyber Infographic and embark on the exciting journey of industrial controls and cybersecurity,…
Read more
Top 10 Attacks of 2024

Infographic: Top 10 OT Cyberattacks of 2024

2024 had more than its fair share of cyberattacks on OT systems. This infographic helps map out the…
Read more

Top 10 Cyberattacks of 2023

2023 saw an uptick of cyberattacks across many industries. Our infographic focuses on cyberattacks in 2023 that impacted…
Read more

Top 10 OT Cyber Attacks of 2025

Top 10 OT Cyber Attacks of 2025 - webinar recording
Top 10 OT Cyber Attacks of 2025 - webinar recording

Top 10 OT Cyber Attacks of 2025

Read more
Webinar Top 10 OT Capable Malware Aug 2025 - Webinar Recording

The Top 10 OT-Capable Malware: What We’ve Learned and What Comes Next

In 2024 alone, researchers discovered as many new OT-capable malware families (3) as were found in the previous…
Read more
Webinar 13 Ways to Break a Firewall July 2025

13 Ways to Break a Firewall (and alternatives for OT security)

Firewalls are almost always the second technical step taken to secureindustrial / OT automation systems. But how much…
Read more
NIS2 and CRA Webinar Recording

Risks, Rules & Gaps: The Latest on NIS2 and CRA

With the NIS 2 Directive and the Cyber Resilience Act (CRA), cybersecurity requirements are increasing for critical infrastructures…
Read more
Safety-Critical Clouds in Power Generation – 7 Designs Using Cyber-Informed Engineering

Safety-Critical Clouds in Power Generation - 7 Designs Using Cyber-Informed Engineering

We hope you can watch the webinar.
Read more
Building a Game Plan for OT Remote Access

Building a Game Plan for OT Remote Access

Provide an overview of the current landscape of solutions and needs.Recommend a decision process – how to gather…
Read more
Webinar Unpacking the 2025 OT Cyber Threat Report

Unpacking the 2025 OT Cyber Threat Report

In 2024, there was 146% increase in the number of sites impacted by cyberattacks targeting heavy industry.The Waterfall…
Read more

'Credibility' vs. 'Likelihood' in OT Security

If we implement the highest 62443 SL4 throughout, have we addressed all credible threats? Do we need strong…
Read more

From Blind Spots to Action: OT Threats Exposed

We measure the strength of a security program by the attacks the program defeats with a high degree…
Read more

We can't - and shouldn't - fix everything - Episode 147

We can't - and shouldn't - fix everything
We can't - and shouldn't - fix everything

We can't - and shouldn't - fix everything - Episode 147

We know there are problems in our security systems, but we can't and shouldn't fix everything. What do…
Read more
Medical Device Cybersecurity Is Tricky

Medical Device Cybersecurity Is Tricky - Episode 146

"I would estimate that somewhere between 30 and 50% of medical devices that are submitted to FDA today…
Read more
Hardware Hacking - Essential OT Attack Knowledge

Hardware Hacking - Essential OT Attack Knowledge - Episode 145

Hardware Hacking - Essential OT Attack Knowledge | Episode 145Please note: This transcript was auto-generated and then edited…
Read more
Managing Risk with Digital Twins - What Do We Do Next?

Managing Risk with Digital Twins - What Do We Do Next? - Episode 144

Managing Risk with Digital Twins - What Do We Do Next? | Episode 144Please note: This transcript was…
Read more
I don't sign st - episode 143

I don't sign s**t - Episode 143

Transcript of I don't sign s**t | Episode 143Please note: This transcript was auto-generated and then edited by a…
Read more
NIS2 and the Cyber Resilience Act (CRA)

NIS2 and the Cyber Resilience Act (CRA) - Episode 142

“So NIS2 is focusing on cybersecurity of entities, and the CRA is focusing on cybersecurity for products with…
Read more
Network Duct Tape

Network Duct Tape - Episode 141

“We abstract the policy from the network infrastructure such that you can have a group of devices or…
Read more
Credibility, not Likelihood - Episode 140

Credibility, not Likelihood - Episode 140

“Large scale destructive attacks on big machinery is, not something that I would consider a credible attack.” -…
Read more
Lessons Learned From Incident Response - Episode 139

Lessons Learned From Incident Response - Episode 139

If you didn't listen to a single thing I said, you can listen to these three things: collaborate,…
Read more

Lessons Learned From Incident Response - Episode 139

Lessons Learned From Incident Response - Episode 139
Lessons Learned From Incident Response - Episode 139

Lessons Learned From Incident Response - Episode 139

Tune in to 'Lessons Learned From Incident Response', the latest episode of Waterfall Security's OT cybersecurity Podcast.
Read more

Risk in Context: When to Patch, When to Let It Ride | Episode 109

In this episode, Rick Kaun, the VP of Solutions at Verve Industrial Protection, takes us deep into the world of…
Read more
Hacking the Canbus, with Dr Ken Tindell

Hacking the CANbus | Episode 108

In this episode, Dr. Ken Tindell, the CTO at Canis, joins us to talk about cybersecurity and cars. Modern cars…
Read more

Saving Money and Effort Automating Compliance | Episode 107

In this episode, Kathryn Wagner, the Vice President, Industry Solutions, Energy & Utilities at Assurx, joins us to explore the…
Read more

How Cyber Fits Into Big-Picture Risk | Episode 106

In this episode, Dr. Janaka Ruwanpura, Vice-Provost, University of Calgary joins us to look at where cyber risks…
Read more

Six Steps to Integrating IT & OT in Mining | Episode 105

In this episode, Rob Labbé from Mining and Metals ISAC explains how and why risk assessments are needed and…
Read more

Jesus Molina on the Biden National Cyber Strategy

The Biden-Harris administration recently released their National Cybersecurity Strategy. This week, Jesus Molina of Waterfall Security joined ICS…
Read more

Stakeholder-Specific Vulnerability Categorization (SSVC) | Episode #102

Stakeholder-specific vulnerability categorization (SSVC) is a new alternative to the common vulnerability scoring system (CVSS) used in the…
Read more

Bridging industrial Cybersecurity Workforce Gaps | Episode #101

Industrial cybersecurity workforce gaps are not all the same. Different kinds of organizations in different stages of their…
Read more

We can't - and shouldn't - fix everything - Episode 147

We can't - and shouldn't - fix everything
We can't - and shouldn't - fix everything

We can't - and shouldn't - fix everything - Episode 147

We know there are problems in our security systems, but we can't and shouldn't fix everything. What do…
Read more
Medical Device Cybersecurity Is Tricky

Medical Device Cybersecurity Is Tricky - Episode 146

"I would estimate that somewhere between 30 and 50% of medical devices that are submitted to FDA today…
Read more
Hardware Hacking - Essential OT Attack Knowledge

Hardware Hacking - Essential OT Attack Knowledge - Episode 145

Hardware Hacking - Essential OT Attack Knowledge | Episode 145Please note: This transcript was auto-generated and then edited…
Read more
Managing Risk with Digital Twins - What Do We Do Next?

Managing Risk with Digital Twins - What Do We Do Next? - Episode 144

Managing Risk with Digital Twins - What Do We Do Next? | Episode 144Please note: This transcript was…
Read more
I don't sign st - episode 143

I don't sign s**t - Episode 143

Transcript of I don't sign s**t | Episode 143Please note: This transcript was auto-generated and then edited by a…
Read more
NIS2 and the Cyber Resilience Act (CRA)

NIS2 and the Cyber Resilience Act (CRA) - Episode 142

“So NIS2 is focusing on cybersecurity of entities, and the CRA is focusing on cybersecurity for products with…
Read more
Network Duct Tape

Network Duct Tape - Episode 141

“We abstract the policy from the network infrastructure such that you can have a group of devices or…
Read more
Credibility, not Likelihood - Episode 140

Credibility, not Likelihood - Episode 140

“Large scale destructive attacks on big machinery is, not something that I would consider a credible attack.” -…
Read more
Experience & Challenges Using Asset Inventory Tools - Episode 138

Experience & Challenges Using Asset Inventory Tools - Episode 138

“Trying to build a vulnerability management program when you don't know what's out there is a fool's errand...you're…
Read more

Bringing Engineering on Board and Resetting IT Expectations

Aligning Engineering and IT Expectations - webinar invitation
Aligning Engineering and IT Expectations - webinar invitation

Bringing Engineering on Board and Resetting IT Expectations

In many organizations the relationship between IT/enterprise security and OT/engineering teams is dysfunctional. These teams work in the…
Read more

Top 10 OT Cyber Attacks of 2025

Top 10 OT Cyber Attacks of 2025 - webinar recording
Top 10 OT Cyber Attacks of 2025 - webinar recording

Top 10 OT Cyber Attacks of 2025

Read more
Webinar Top 10 OT Capable Malware Aug 2025 - Webinar Recording

The Top 10 OT-Capable Malware: What We’ve Learned and What Comes Next

In 2024 alone, researchers discovered as many new OT-capable malware families (3) as were found in the previous…
Read more
Webinar 13 Ways to Break a Firewall July 2025

13 Ways to Break a Firewall (and alternatives for OT security)

Firewalls are almost always the second technical step taken to secureindustrial / OT automation systems. But how much…
Read more
NIS2 and CRA Webinar Recording

Risks, Rules & Gaps: The Latest on NIS2 and CRA

With the NIS 2 Directive and the Cyber Resilience Act (CRA), cybersecurity requirements are increasing for critical infrastructures…
Read more
Safety-Critical Clouds in Power Generation – 7 Designs Using Cyber-Informed Engineering

Safety-Critical Clouds in Power Generation - 7 Designs Using Cyber-Informed Engineering

We hope you can watch the webinar.
Read more
Building a Game Plan for OT Remote Access

Building a Game Plan for OT Remote Access

Provide an overview of the current landscape of solutions and needs.Recommend a decision process – how to gather…
Read more
Webinar Unpacking the 2025 OT Cyber Threat Report

Unpacking the 2025 OT Cyber Threat Report

In 2024, there was 146% increase in the number of sites impacted by cyberattacks targeting heavy industry.The Waterfall…
Read more

'Credibility' vs. 'Likelihood' in OT Security

If we implement the highest 62443 SL4 throughout, have we addressed all credible threats? Do we need strong…
Read more

From Blind Spots to Action: OT Threats Exposed

We measure the strength of a security program by the attacks the program defeats with a high degree…
Read more

Evolving OT Cyber Attacks - Theory to Reality | Recorded Webinar

Evolving OT Cyber Attacks – Theory to Reality
Evolving OT Cyber Attacks – Theory to Reality

Evolving OT Cyber Attacks - Theory to Reality | Recorded Webinar

Read more

Watch: Naoufal Kerboute's Interview at GISEC 2022 for TECHx

Last March Waterfall Security Solutions participated in one of the important events at UAE - GISEC. Naoufal Kerboute,…
Read more

Watch: Andrew Ginter's Interview at GISEC 2022 for TECHx

Last March Waterfall Security Solutions participated in one of the important events at UAE - GISEC. Andrew Ginter,…
Read more

Rise of Ransomware 2022 | Industrial Security Institute

https://www.youtube.com/watch?v=i9oEDAYrI-o&t=17s&ab_channel=WaterfallSecuritySolutions THE INDUSTRIAL SECURITY INSTITUTE OT / industrial / ICS cybersecurity concepts from the perspective of the world’s…
Read more

Round #5 Ask, Learn| Knocking Out OT Cyber Risk | iSi

https://youtu.be/uzlk7mTxilk SUBSCRIBE Free Book PREVIOUS EPS. PREVIOUS EPS. SUBSCRIBE Free Book Andrew Ginter's Book Secure Operations Technology Get…
Read more

Round #4 Outsmart| Knocking Out OT Cyber Risk | iSi

https://youtu.be/1IJ9OjV8VzQ SUBSCRIBE MORE PREVIOUS EPS. PREVIOUS EPS. SUBSCRIBE Next EPS. The Top 20 Cyber Attacks on ICS THE…
Read more

Round #3 Practice | Knocking Out OT Cyber Risk | iSi

https://youtu.be/DHiu_n9NOak SUBSCRIBE MORE PREVIOUS EPS. PREVIOUS EPS. SUBSCRIBE Next EPS. The Top 20 Cyber Attacks on ICS THE…
Read more

Round #2 Double Jab Cross | Knocking Out OT Cyber Risk | iSi

https://youtu.be/Nw8NR4rIE0g SUBSCRIBE MORE PREVIOUS EPS. PREVIOUS EPS. SUBSCRIBE Next EPS. The Top 20 Cyber Attacks on ICS THE…
Read more

Round #1 Strong Guard | Knocking Out OT Cyber Risk | iSi

https://www.youtube.com/watch?v=xYAWsteeOLM SUBSCRIBE MORE PREVIOUS EPS. PREVIOUS EPS. SUBSCRIBE Next EPS. The Top 20 Cyber Attacks on ICS THE…
Read more

Webinar Recording: Engineering Cybersecurity Mitigations for Municipal Water Systems

Water Webinar Recording
Water Webinar Recording

Webinar Recording: Engineering Cybersecurity Mitigations for Municipal Water Systems

Mariano Martín Tirado, from Acciona, and Rees Machtemes, from Waterfall, discuss the risks and threat environment that Water…
Read more
Mining Webinar Recording

Webinar Recording: Cyber-securing Safety and Equipment Protection Systems in Mining

Safety is the top priority in almost all mines, and reliable, efficient physical operations are close seconds. Cybersecurity…
Read more
Threat Report Webinar

Webinar Recording: Cyber Attacks with Physical Consequences – 2024 Threat Report

The new Waterfall Security / ICSStrive Threat Report documents 68 cyber attacks with real-world physical consequences impacting 515…
Read more
Webinar Recording OT/IT with CIE

Recorded Webinar: Cyber-Informed Engineering Transforms IT/OT Convergence in Oil & Gas Operations

Integrating OT with IT introduces new threats to the reliability of existing operations. Connected networks move more than…
Read more
NIS2 Recorded Webinar

Recorded Webinar: The NIS2 Directive: A Guide for OT Professionals

In this recorded webinar, we take an in-depth look at the European NIS2 Directive and help explain…
Read more
Top 10 Cyberattacks 2023 Webinar Recording

Recorded Webinar: The Top 10 OT/ICS Cyberattacks of 2023

In this webinar recording, we take an in-depth look at the most novel, notorious, and impactful cyber…
Read more
Andrew Ginter new book recorded webinar

Recorded Webinar: Engineering-Grade OT Security: A Manager’s Guide

Want to get your advanced copy of Andrew Ginter's new book? >>Click here to get your copy
Read more
Network Engineering Recorded Webinar

Network Engineering | Recorded Webinar

Engineering-grade solutions are deterministic and predictable. Cyber-Informed Engineering (CIE) is exploring safety engineering, protection engineering and other engineering…
Read more
AVEVA | Webinar | Engineering Grade Security for Water Utilities

Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities

Our Webinar with Andrew Ginter of Waterfall Security Solutions and Bill McEvoy of AVEVA covered many facets of…
Read more

Bringing Engineering on Board and Resetting IT Expectations

Aligning Engineering and IT Expectations - webinar invitation
Aligning Engineering and IT Expectations - webinar invitation

Bringing Engineering on Board and Resetting IT Expectations

In many organizations the relationship between IT/enterprise security and OT/engineering teams is dysfunctional. These teams work in the…
Read more
Top 10 OT Cyber Attacks of 2025 - webinar recording

Top 10 OT Cyber Attacks of 2025

Watch the webinar for a comprehensive review of the cyber incidents that shaped the industrial landscape in 2025.…
Read more
Webinar Top 10 OT Capable Malware Aug 2025 - Webinar Recording

The Top 10 OT-Capable Malware: What We’ve Learned and What Comes Next

In 2024 alone, researchers discovered as many new OT-capable malware families (3) as were found in the previous…
Read more
Webinar 13 Ways to Break a Firewall July 2025

13 Ways to Break a Firewall (and alternatives for OT security)

Firewalls are almost always the second technical step taken to secureindustrial / OT automation systems. But how much…
Read more
NIS2 and CRA Webinar Recording

Risks, Rules & Gaps: The Latest on NIS2 and CRA

With the NIS 2 Directive and the Cyber Resilience Act (CRA), cybersecurity requirements are increasing for critical infrastructures…
Read more
Safety-Critical Clouds in Power Generation – 7 Designs Using Cyber-Informed Engineering

Safety-Critical Clouds in Power Generation - 7 Designs Using Cyber-Informed Engineering

We hope you can watch the webinar.
Read more
Building a Game Plan for OT Remote Access

Building a Game Plan for OT Remote Access

Provide an overview of the current landscape of solutions and needs.Recommend a decision process – how to gather…
Read more
Webinar Unpacking the 2025 OT Cyber Threat Report

Unpacking the 2025 OT Cyber Threat Report

In 2024, there was 146% increase in the number of sites impacted by cyberattacks targeting heavy industry.The Waterfall…
Read more

'Credibility' vs. 'Likelihood' in OT Security

If we implement the highest 62443 SL4 throughout, have we addressed all credible threats? Do we need strong…
Read more

Top 10 OT Cyber Attacks of 2025

Top 10 OT Cyber Attacks of 2025 - webinar recording
Top 10 OT Cyber Attacks of 2025 - webinar recording

Top 10 OT Cyber Attacks of 2025

Read more
NIS2 and CRA Webinar Recording

Risks, Rules & Gaps: The Latest on NIS2 and CRA

With the NIS 2 Directive and the Cyber Resilience Act (CRA), cybersecurity requirements are increasing for critical infrastructures…
Read more
HERA Webinar Recording

Webinar: HERA - Hardware-Enforced Remote Access

Software-based remote access — VPNs, 2FA, firewalls, jump hosts, and more all have vulnerabilities and potential zero-days that…
Read more
Threat Report Webinar 2024

Cyber Attacks with Physical Consequences – 2024 Threat Report

Understanding threats is essential to designing effective defenses. We invite you to join Andrew Ginter, Rees Machtemes and…
Read more

Webinar: The NIS2 Directive: A Guide for OT Professionals

Register to join our upcoming webinar as Dr. Jesus Molina takes us through the ins-and-outs of the…
Read more

Webinar: The Top 10 OT/ICS Cyberattacks of 2023

Join our webinar for an in-depth look at the most novel, notorious and impactful cyber incidents of…
Read more

Webinar: Engineering-Grade OT Security: A manager's guide

Join our webinar to learn about engineering-grade OT security, a new model for cyber risk, and how…
Read more

Network Engineering Webinar

Join our next webinar on October 3, 11 am New York time/ 8 am Pacific Time Engineering-grade…
Read more

Stay up to date

Subscribe to our blog and receive insights straight to your inbox