Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you

How can we USE this information to make useful decisions about next steps to address cyber risk? Vivek Ponada of Frenos joins us to explore a new kind of OT / industrial digital twin – grab all that data and work it to draw useful conclusions.

In many organizations the relationship between IT/enterprise security and OT/engineering teams is dysfunctional. Much has been written about the problem. Most of that writing misses the point. In most cases, the relationship problem can be resolved with a little clarity, a bit more good will, and a modicum of mutual education.

Tim McCreight of TaleCraft Security in his (coming soon) book “I don’t sign s**t” uses story-telling to argue that front line security leaders should not be accepting multi-billion dollar risks on behalf of the business. We need to escalate those decisions – with often surprising results when we do.

Secure, efficient, and reliable industrial remote access solutions enable monitoring, maintenance, and troubleshooting of SCADA and control systems from anywhere, protecting critical operations.

NIS2 legislation is late in many EU countries, and the new CRA applies to most suppliers of industrial / OT computerized and software products to the EU. Christina Kieffer, attorney at reuschlaw, walks us through what’s new and what it means for vendors, as well as for owner / operators.

Protect SCADA systems with best practices in SCADA security, including access control, monitoring, encryption, and compliance for critical infrastructure.

How OT network monitoring enhances industrial system security and reliability through real-time visibility, alert management, and tailored solutions for operational technology challenges.

How ICS security protects Industrial Control Systems, from SCADA and PLCs to critical infrastructure, vulnerabilities, and best practices