
Network Engineering | Recorded Webinar
In the webinar, I introduced network engineering in the context of Cyber-Informed Engineering (CIE) with useful examples.
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you
In the webinar, I introduced network engineering in the context of Cyber-Informed Engineering (CIE) with useful examples.
Job seekers say there are no OT security job postings. Hiring managers say nobody is applying to their posts. Amanda Theel and Eddy Mullins of Argonne National Labs walk us through recruiting issues, especially for fresh grads.
The NIS2 Directive is a directive by the European Parliament on the measures that need to be taken for a high common level of cybersecurity across the European Union.
Join our next webinar to learn about engineering-grade OT security, a new model for cyber risk, and how to decide how much security is needed for different types of systems, as described in Andrew Ginter’s new book, Engineering-Grade OT Security: A Manager’s Guide.
Data centers are critical information infrastructures, with a lot of associated physical infrastructure. Vlad-Gabriel Anghel of Data Center Dynamics Academy walks us through these very recent additions to critical infrastructures, and digs into industrial / OT security needs and solutions for the space.
Cyber attacks are becoming more sophisticated, cloud-based innovation is increasing attack opportunities, and governments are issuing stronger cyber regulations, such as the new European NIS2 and the new German KRITIS directives.
Uptime is a very important Key Performance Indicator (KPI) for data centers, and the physical infrastructures in data centers are essential to uptime – electric power systems, backup power, fire suppression, physical access control, cooling and more.
What are data center OT networks? How are they different from other OT networks? What are their vulnerabilities, and what are the consequences of their vulnerabilities?
In data centers, ICS play a crucial role in managing cooling, power distribution, access control, and physical security. However, this convergence of OT and ICS with traditional IT systems also introduces potential vulnerabilities that malicious actors can exploit.