Video – Waterfall Security Solutions https://waterfall-security.com Unbreachable OT security, unlimited OT connectivity Wed, 03 Sep 2025 11:10:17 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.2 https://waterfall-security.com/wp-content/uploads/2023/09/cropped-favicon2-2-32x32.png Video – Waterfall Security Solutions https://waterfall-security.com 32 32 The Top 10 OT-Capable Malware: What We’ve Learned and What Comes Next https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/top-10-ot-capable-malware/ Sun, 20 Jul 2025 18:36:58 +0000 https://waterfall-security.com/?p=34335 What’s driving the sudden surge in OT capable malware? Who’s behind these threats and how should our defenses evolve to keep pace?

The post The Top 10 OT-Capable Malware: What We’ve Learned and What Comes Next appeared first on Waterfall Security Solutions.

]]>

The Top 10 OT-Capable Malware: What We’ve Learned and What Comes Next

Watch the webinar for an in-depth look at the data behind how OT-capable malware has changed over the last 15 years, what's driving this change and how our defenses should evolve to tackle these threats.

In 2024 alone, researchers discovered as many new OT-capable malware families (3) as were found in the previous six years combined—each with the potential to disrupt physical operations in ICS and OT environments. Altogether, in the past 15 years, 10 OT-capable malware were found in the wild.

What’s driving this sudden surge? Who’s behind these threats (none of which, by the way, use AI yet)? And how should our defenses evolve to keep pace with these changing threats?

In this webinar Andrew Ginter takes us through:

arrow red right Look at the data from the ‘Top 10 ICS/OT-Capable Malware’ since 2010

arrow red right Compare ransomware-grade OT malware with nation-state-grade OT malware

arrow red right Examine the differences between autonomous and remote-control malware

arrow red right Dig deeper into how AI can enable a new wave of autonomous malware in the near future

About the Speaker

Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post The Top 10 OT-Capable Malware: What We’ve Learned and What Comes Next appeared first on Waterfall Security Solutions.

]]>
13 Ways to Break a Firewall (and alternatives for OT security) https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/13-ways-to-break-a-firewall/ Wed, 25 Jun 2025 10:06:43 +0000 https://waterfall-security.com/?p=34010 Explore 13+ real-world OT attack scenarios that firewalls can’t stop—and learn smarter alternatives to protect your industrial systems.

The post 13 Ways to Break a Firewall (and alternatives for OT security) appeared first on Waterfall Security Solutions.

]]>

13 Ways to Break a Firewall (and alternatives for OT security)

Firewalls are a go-to for OT security—but how much protection do they really offer? In this webinar, we explore 13+ real-world attack scenarios that defeat firewalls, show where firewalls fall short, and share smarter, stronger alternatives for securing industrial systems.

Firewalls are almost always the second technical step taken to secure
industrial / OT automation systems. But how much security do firewalls impart?

One way to compare the strength of different defensive technologies and designs is to compare the attacks those designs defeat reliably, vs the attacks they do not defeat. In this presentation, we look at firewalls, at attacks that defeat firewalls, and at mitigations, compensating measures and alternatives for and to firewalls.

And yes, the number “13” is a lucky ‘marketing’ number. We will in fact touch on closer to 18 or 19 kinds of attacks/scenarios.

In this webinar Andrew Ginter takes us through:

arrow red right Which types of cyberattacks firewalls can and can’t stop in industrial environments

arrow red right Real-world examples of firewall failures

arrow red right Practical alternatives that strengthen OT security when firewalls fall short

About the Speaker

Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post 13 Ways to Break a Firewall (and alternatives for OT security) appeared first on Waterfall Security Solutions.

]]>
Risks, Rules & Gaps: The Latest on NIS2 and CRA https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/risks-rules-gaps-the-latest-on-nis2-and-cra/ Tue, 03 Jun 2025 09:05:07 +0000 https://waterfall-security.com/?p=32960 Watch the webinar where we’ll look at the latest developments in member state legislation to comply with NIS2 and CRA.

The post Risks, Rules & Gaps: The Latest on NIS2 and CRA appeared first on Waterfall Security Solutions.

]]>

Risks, Rules & Gaps: The Latest on NIS2 and CRA

Watch the webinar for a look at the latest developments in member state legislation to comply with NIS2, and at how the Cyber Resilience Act (CRA) is affecting both industrial automation manufacturers as well as owners and operators in different kinds of industries.

With the NIS 2 Directive and the Cyber Resilience Act (CRA), cybersecurity requirements are increasing for critical infrastructures as well as industrial automation and other products in the European Union.

But the road to stronger requirements is not all smooth. While NIS 2 has been in force since 2023, some Member States have not yet transposed the Directive into national law, even though the deadline for transposition has already passed. And the national laws implementing NIS-2 differ in each Member State, though with NIS-2 there is minimum degree of harmonization.

Finally, while the new CRA contains new harmonized requirements for products with digital elements, there are corner cases that seem to make little sense, especially when applying CRA-compliant products to change-controlled critical infrastructures.

Watch the webinar featuring Christine Kiefer LL.M from Reusch Law and Andrew Ginter from Waterfall Security, to learn more about the latest developments in cybersecurity law in the European Union. 

Picture of Christine Kiefer

Christine Kiefer

Attorney-at-Law Christina Kiefer, LL.M. (Oslo) is a Senior Associate in the Digital Business Unit of reuschlaw in Saarbrücken, advising companies and public institutions on data protection and cybersecurity as well as IT and contract law.

Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Risks, Rules & Gaps: The Latest on NIS2 and CRA appeared first on Waterfall Security Solutions.

]]>
Safety-Critical Clouds in Power Generation – 7 Designs Using Cyber-Informed Engineering https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/safety-critical-clouds-in-power-generation-7-designs-using-cyber-informed-engineering/ Sun, 27 Apr 2025 08:19:51 +0000 https://waterfall-security.com/?p=32589 Safety-critical and CI systems deserve engineering-grade cybersecurity. So, how can we provide this for Internet-based clouds? Watch the webinar where we will look at the problem from the perspective of the new Cyber-Informed Engineering (CIE).

The post Safety-Critical Clouds in Power Generation – 7 Designs Using Cyber-Informed Engineering appeared first on Waterfall Security Solutions.

]]>

Safety-Critical Clouds in Power Generation – 7 Designs Using Cyber-Informed Engineering

The industrial internet is coming. Reap almost all the benefits with almost none of the risks.

The Industrial Internet of Things (IIoT) is the future of automation in power generation and many other industries. The IIoT promises huge gains in efficiency and flexibility, with cloud-based systems and decision-making at the heart of these gains. Today, even safety-critical and critical-infrastructure (CI) decision-making is moving steadily out into the cloud.

But safety-critical and CI systems deserve engineering-grade cybersecurity. So, how can we provide this for Internet-based clouds?

Watch the webinar where we will look at the problem from the perspective of the new Cyber-Informed Engineering (CIE) initiative and dig into 7 design patterns for different kinds of safety-critical, cloud-based systems. 

In this webinar Andrew Ginter takes us through:

arrow red right Review the limitations of traditional IT-grade cyber protections for cloud systems.

arrow red right Explore seven engineering-grade designs for protecting safety-critical and reliability-critical clouds.

arrow red right Propose design principles for evaluating critical cloud designs.

For practitioners in power generation, OT security, or other critical infrastructures, this is an opportunity to explore two leading edges: the Industrial Internet (future of automation) and CIE (future of OT security).

We hope you can watch the webinar.

About the Speaker

Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Safety-Critical Clouds in Power Generation – 7 Designs Using Cyber-Informed Engineering appeared first on Waterfall Security Solutions.

]]>
Building a Game Plan for OT Remote Access https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/building-a-game-plan-for-ot-remote-access/ Mon, 17 Mar 2025 09:39:41 +0000 https://waterfall-security.com/?p=31658 OT remote access is seen as essential for many industries, but there are a variety of OT solutions out there. Watch the webinar as we help you make the right decision for your OT network.

The post Building a Game Plan for OT Remote Access appeared first on Waterfall Security Solutions.

]]>

Building a Game Plan for OT Remote Access

Watch the webinar where we’ll provide an overview of the current landscape of OT remote access solutions and help you make the right decision for your OT network.

OT remote access is seen as essential for many industries – partly to save costs, and partly because physical travel to very distant substations, compressor stations, mine sites, and other physical assets is difficult, time-consuming, and sometimes even dangerous. 

The problem is that there is a bewildering variety of OT remote access solutions out there, with different kinds of needs in different kinds of industries and use cases.

In this webinar Andrew Ginter takes us through:

  • Provide an overview of the current landscape of solutions and needs.

  • Recommend a decision process – how to gather critical information, the steps required to make informed decisions in a specific order.

  • Provide examples of the decision process across various industries and contexts – from municipal utilities to backbone / heavy infrastructure to manufacturing and building automation.

Watch the webinar as we "fly low and fast" - in 60 minutes see all the options in one place, and where and why each one makes sense, with concrete examples.

Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Building a Game Plan for OT Remote Access appeared first on Waterfall Security Solutions.

]]>
Unpacking the 2025 OT Cyber Threat Report https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/unpacking-2025-ot-cyber-threat-report/ Wed, 26 Feb 2025 09:31:45 +0000 https://waterfall-security.com/?p=31318 Watch the webinar that unpacks Waterfall's 2025 OT Cyber Threat Report and understand today's OT cyber threat landscape.

The post Unpacking the 2025 OT Cyber Threat Report appeared first on Waterfall Security Solutions.

]]>

Unpacking the 2025 OT Cyber Threat Report

Watch the webinar where we’ll dive deep into the findings of the most credible report in the OT Security industry.

In 2024, there was 146% increase in the number of sites impacted by cyberattacks targeting heavy industry.

The Waterfall Threat Report 2025 brings you comprehensive, verifiable data on cyber attacks that makes it the most trusted resource in the field.

Watch the webinar and join Greg Hale, Editor of ISSSource and Co-founder of ICS Strive, and Andrew Ginter, VP of Industrial Security at Waterfall, as they talk us through today’s threat landscape.

In this webinar Andrew Ginter and Greg Hale take us through:

arrow red right Discover the latest cybersecurity trends: From nation-state attacks to the explosion of ICS-capable malware, the report uncovers critical patterns.

arrow red right Understand the shifting landscape: New incident disclosure rules may be hindering transparency, not helping it. Learn why.

arrow red right Hear directly from the experts: Greg Hale, Editor of ISSSource and Co-founder of ICS Strive, alongside Andrew Ginter, VP of Industrial Security at Waterfall, will guide you through the most pressing findings.

About the speakers
Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Picture of Greg Hale

Greg Hale

Greg Hale is the founder and editor of Industrial Safety and Security Source (ISSSource.com), the website focused on sharing Safety and Security news in the manufacturing automation sector. Prior to starting up ISSSource.com 12 years ago, he was the chief editor of InTech magazine for more than 10 years

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Share

The post Unpacking the 2025 OT Cyber Threat Report appeared first on Waterfall Security Solutions.

]]>
‘Credibility’ vs. ‘Likelihood’ in OT Security https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/credibility-vs-likelihood-in-ot-security/ Sun, 02 Feb 2025 13:59:51 +0000 https://waterfall-security.com/?p=30861 Watch the webinar to explore and weigh in on a cutting-edge debate that is likely to change forever how we think about high-consequence threats.

The post ‘Credibility’ vs. ‘Likelihood’ in OT Security appeared first on Waterfall Security Solutions.

]]>

‘Credibility’ vs. ‘Likelihood’ in OT Security

New Perspectives on High Consequence Security

If we implement the highest 62443 SL4 throughout, have we addressed all credible threats? Do we need strong protections against all credible threats with serious consequences? These are important questions as our OT threat environment continues to deteriorate.

But if “risk = consequence x likelihood,” can we even ask these questions with the word “likelihood”?

In this webinar Andrew Ginter takes us through:

arrow red right The argument that we need our high-consequence risk and security guidance to stop talking about “likelihood” and start talking about either “frequency” or “credibility,” depending on context.

arrow red right The cutting-edge debate that is likely to change forever how we think about high-consequence threats

About the Speaker

Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post ‘Credibility’ vs. ‘Likelihood’ in OT Security appeared first on Waterfall Security Solutions.

]]>
From Blind Spots to Action: OT Threats Exposed https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/from-blind-spots-to-action-ot-threats-exposed/ Sun, 29 Dec 2024 10:03:46 +0000 https://waterfall-security.com/?p=29880 Watch the webinar on some of the biggest OT cyberthreats, and risks, that businesses face today.

The post From Blind Spots to Action: OT Threats Exposed appeared first on Waterfall Security Solutions.

]]>
OT Insights CenterFrom Blind Spots to Action: OT Threats Exposed

Watch our first webinar of the new year as we discuss some of the biggest OT cyberthreats, and risks, that businesses face today.

We measure the strength of a security program by the attacks the program defeats with a high degree of confidence. We measure residual risk as the simplest attacks with significant consequences that the program does not defeat.

In many sites and industries, these residual risks have grown to the point where they are material threats to safe, reliable, and efficient physical operations. With widely available attack tools becoming ever more capable, credible and residual risks are increasing.

In this webinar, Andrew walks us through the attacks, blind spots and the potentially serious consequences for OT networks. If you’re also interested in how global OT security standards are evolving, check out our webinar on new OT cybersecurity guidelines.

Watch now to deepen your knowledge on:

arrow red right How to identify and mitigate significant OT cyberthreats. For further insights, explore our session on navigating OT remote access technologies.

arrow red rightHow to assess residual risk while prioritizing the severity of potential consequences.

arrow red rightExamples of ‘high-risk, severe-consequence threats’, often ignored due to their misleadingly low “severity score.”

arrow red rightModern methods for effectively managing these blind spots.

About the Speaker

Share

The post From Blind Spots to Action: OT Threats Exposed appeared first on Waterfall Security Solutions.

]]>
Top 10 Cyberattacks on Industrial and Critical Infrastructure of 2024 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/top-10-cyberattacks-on-industrial-and-critical-infrastructure-of-2024/ Mon, 25 Nov 2024 10:33:07 +0000 https://waterfall-security.com/?p=28512 Watch the webinar to review the top 10 cyber incidents that impacted physical operations in critical infrastructure and heavy industry in 2024.

The post Top 10 Cyberattacks on Industrial and Critical Infrastructure of 2024 appeared first on Waterfall Security Solutions.

]]>

Top 10 Cyberattacks on Industrial and Critical Infrastructure of 2024

Watch the webinar as Rees Machtemes takes us on an in-depth look at the most novel, notorious and impactful cyber incidents of 2024 on critical infrastructure around the globe.

As 2024 winds down, we wrap up and discuss the year’s most important cyber incidents that targeted physical operations – in both critical infrastructure and heavy industry. In this webinar, we outline the top ten most impactful incidents and important near-misses that every cybersecurity practitioner should be aware of.

In this webinar, Rees Machtemes takes us through:

arrow red right The costliest incidents in terms of lost time and money

arrow red right Incidents impacting safety and human life

arrow red right How control systems and OT networks were targeted

arrow red right Threat actors and TTP details

arrow red right What we might see in the near future in these same themes.

About the Speaker

Picture of Rees Machtemes, P.Eng.

Rees Machtemes, P.Eng.

Rees is the lead threat researcher for the annual Waterfall / ICSStrive OT Threat Report and writes frequently on the topic of OT / ICS cybersecurity. Being solutions-focused, he champions INL’s Cyber-Informed Engineering program and regularly provides advice and commentary to government agencies and standards bodies issuing OT security guidance.

Rees is a professional engineer with 15 years of industry experience in: power engineering, substation automation design, plant automation, telecommunications, data centres, and IT. He holds a degree in Electrical Engineering from the University of Alberta.

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Top 10 Cyberattacks on Industrial and Critical Infrastructure of 2024 appeared first on Waterfall Security Solutions.

]]>
Webinar: Evolving Global OT Cyber Guidelines, Recent Developments and What is Driving it https://waterfall-security.com/ot-insights-center/ot-security-standards/webinar-evolving-global-ot-cyber-guidelines-recent-developments-and-what-is-driving-it/ Wed, 06 Nov 2024 08:20:41 +0000 https://waterfall-security.com/?p=28112 Watch the webinar for a look into the recent evolution of OT security standards

The post Webinar: Evolving Global OT Cyber Guidelines, Recent Developments and What is Driving it appeared first on Waterfall Security Solutions.

]]>

Webinar: Evolving Global OT Cyber Guidelines, Recent Developments and What is Driving it

Watch the webinar for a look into the recent evolution of OT security standards.

Watch the webinar for a look into the recent evolution of OT security standards. There are some common themes in the OT cyber security guidance published in recent years around the world. Governments and standards bodies are feeling the pressure to increase the level of protective measures and methodologies when it comes to highly consequential systems and infrastructure.

In this webinar, Andrew Ginter takes us through:

arrow red right Who are the countries and standards bodies leading the way?

arrow red right How Engineering and Security principles are influencing the approach to OT cyber?

arrow red right What are consequence boundaries and how do they inform an OT security strategy?

arrow red right Our prediction on the future of OT cyber best practices.

Meet Your Expert Guide:

Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Webinar: Evolving Global OT Cyber Guidelines, Recent Developments and What is Driving it appeared first on Waterfall Security Solutions.

]]>