
IT Remote Access VS. OT Remote Access
Outline comparing key differences between remote access used in an IT environment, and remote access solutions that cater to an industrial OT environment
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you
Outline comparing key differences between remote access used in an IT environment, and remote access solutions that cater to an industrial OT environment
An in-depth webinar that goes beyond the buzzwords and provides practical, industry-specific guidance on applying the ISA/IEC 62443 standards to safeguard critical power infrastructure
Dr Jesus Molina takes us on an in-depth 2 on the European NIS2 Directive, it’s timeline, what it will entail, and who needs to comply.
For those of us who live and breathe OT or ICS cybersecurity, what better way to end the year than with an in-depth look at the most novel, notorious and impactful cyber incidents on critical infrastructure, industrial controls systems, and physical operations around the globe.
In the webinar, we discuss engineering-grade OT security, a new model for cyber risk, and how to decide how much security is needed for different types of systems.
In the webinar, I introduced network engineering in the context of Cyber-Informed Engineering (CIE) with useful examples.
Uptime is a very important Key Performance Indicator (KPI) for data centers, and the physical infrastructures in data centers are essential to uptime – electric power systems, backup power, fire suppression, physical access control, cooling and more.