
The 2025 OT Cyber Threat Report
The Waterfall Threat Report 2025 brings you comprehensive insights on cyber attacks that caused physical consequences in OT environments.
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you
The Waterfall Threat Report 2025 brings you comprehensive insights on cyber attacks that caused physical consequences in OT environments.
Daly Brown and Nick Foubert of Metropolitan Technologies look at a new approach to designing OT systems.
Looking for Security Funding for Capital Budgets? Ian Fleming of Deloitte explains how we can embed up to 20 or 30 years of cybersecurity budget into capital plans, rather than fight for budget every year.
One of the most significant vulnerabilities when it comes to OT security for critical infrastructure are the risks posed by the use of remote access into OT.
Watch the webinar on some of the biggest OT cyberthreats, and risks, that businesses face today.
The standard answer to this questions is “The Consequence Boundary”…but which kind of consequences are we talking about? And aren’t there different levels of consequence? We help define these to answer the question.
Nation state threats are often portrayed as the “irresistible forces” of cyber threats, with little qualification. Joseph Price of Deloitte joins us to dig deeper – what are nation states capable of, what are they up to, and how should we interpret the information that is available to the public?
Security automation needs a machine-readable vulnerability database. Carmit Yadin of Device Total joins us to look at limitations of the widely-used National Vulnerability Database (NVD), and explore a new “data science” alternative.
Spoiler Alert: Yes, investing in OT security is very much “worth it”. It helps prevent financial losses, operational disruptions, and compliance penalties far exceeding initial costs. The average ROI can reach up to 400%, ensuring both protection and operational continuity.
Tomomi Ayoyama translated the book Countering Cyber Sabotage – Consequence-Driven, Cyber-Informed Engineering – to Japanese. Tomomi recalls the effort of translating CCE to Japanese and looks forward to applying CCE and OT security principles to industrial cloud systems at Cognite.