
Webinar Recording: Cyber Attacks with Physical Consequences – 2024 Threat Report
Webinar recording of a deep dive into the details of OT cyberattacks from our 2024 Threat Report.
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you
Webinar recording of a deep dive into the details of OT cyberattacks from our 2024 Threat Report.
The Cyber-Informed Engineering (CIE) initiative, funded by the US Department of Energy, is a new way to look at IEC 62443 – a perspective that clears up a lot of confusion.
How hard is it for an attacker to dig around in my network? Robin Berthier of Network Perception joins us to look at new network segmentation evaluation and visualization technology that lets us see at a glance how much trouble, or not, we’re in.
Data from the past year shows a continual increase in cyber attacks shutting down or even damaging manufacturing operations. The new Cyber-Informed Engineering (CIE) initiative provides a new perspective on addressing the problem, especially for the most consequential safety-critical and quality-critical manufacturing operations and systems.
Precision farming is heavily automated, as are the “food factories” essential to feeding the world’s population. Marcus Sachs at the McCrary Institute at Auburn University joins us to look at the threats, the challenges and opportunities to secure our food supplies from cyber risk.
Report on 68 cyberattacks that caused physical consequences to industrial control systems (ICS) and Operational Technology (OT) in 2023 that are in public records.
Join our upcoming webinar and learn about the IEC 62243 standard for powergen, how CIE can help with IEC 62443-3-2 risk assessments, and what kind of extra protection do 62443-4-2 certified components provide.
Webinar recording of Kevin Rittie, Andrew Ginter, and Alan Acquatella introducing a new approach for solving the long standing challenge of safely and securely converging IT and OT networks in an Oil & Gas operation.
From supply chain to Active Directory to segmentation designing security into ICS products is hard. Jake Hawkes walks us through how security gets built into AVEVA Enterprise SCADA.