
Needles in Haystacks – Recruiting OT Incident Responders – Episode 137
OT incident responders need to know a lot. Doug Leece of Enbridge explores what is OT incident response and what do you look for recruiting people into that role.
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you
OT incident responders need to know a lot. Doug Leece of Enbridge explores what is OT incident response and what do you look for recruiting people into that role.
Daly Brown and Nick Foubert of Metropolitan Technologies look at a new approach to designing OT systems.
Looking for Security Funding for Capital Budgets? Ian Fleming of Deloitte explains how we can embed up to 20 or 30 years of cybersecurity budget into capital plans, rather than fight for budget every year.
Download your 80 Years of Cyber Infographic and embark on the exciting journey of industrial controls and cybersecurity, from the dawn of electronic computers to today’s hyper-connected world.
Watch the webinar to explore and weigh in on a cutting-edge debate that is likely to change forever how we think about high-consequence threats.
In 2024, we witnessed more cyberattacks targeting OT and critical infrastructure. Analyzing these attacks reveals valuable insights that can help us bolster our OT security planning for 2025. Let’s explore the overarching themes of this past year’s attacks.
OT security is evolving with the “Level Zero” approach, which combines cybersecurity and engineering to prevent physical and cyber threats. This holistic strategy is a game-changer for safeguarding critical infrastructure and marks the next major step in OT security. Join the inaugural Level Zero conference to be part of this groundbreaking shift.
We can debate whether threats are credible and whether we should spend money and effort addressing credible residual risks, but to debate any of that, we must first understand the attacks.
One of the most significant vulnerabilities when it comes to OT security for critical infrastructure are the risks posed by the use of remote access into OT.
Watch the webinar on some of the biggest OT cyberthreats, and risks, that businesses face today.