
13 Ways to Break a Firewall (and alternatives for OT security)
Explore 13+ real-world OT attack scenarios that firewalls can’t stop—and learn smarter alternatives to protect your industrial systems.
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you
Explore 13+ real-world OT attack scenarios that firewalls can’t stop—and learn smarter alternatives to protect your industrial systems.
Spoiler Alert: Yes, investing in OT security is very much “worth it”. It helps prevent financial losses, operational disruptions, and compliance penalties far exceeding initial costs. The average ROI can reach up to 400%, ensuring both protection and operational continuity.
Adversaries who can physically touch a target have a huge advantage when it comes to compromising that target. Mike Almeyda of Force5 joins us to look at tools for physical security that support cybersecurity, especially for the North American NERC CIP standards.
From aging equipment to regulators who must approve every patch, securing safety-critical rail systems is hard, but it has to be done.
Job seekers say there are no OT security job postings. Hiring managers say nobody is applying to their posts. Amanda Theel and Eddy Mullins of Argonne National Labs walk us through recruiting issues, especially for fresh grads.
Data centers are critical information infrastructures, with a lot of associated physical infrastructure. Vlad-Gabriel Anghel of Data Center Dynamics Academy walks us through these very recent additions to critical infrastructures, and digs into industrial / OT security needs and solutions for the space.
Active defense or “intrusion prevention” deep into industrial networks has long been thought of as not workable. Youssef Jad – CTO at CyVault – joins us to talk about a new approach to OT active defense that is designed for sensitive OT / industrial environments.
Protecting operational data within the gas transmission SCADA system, while enabling safe visibility and exchange of operational data for both pipeline partners.
Enabling secure, cloud-based operational equipment effectiveness (OEE) monitoring without introducing any new cyber risks to the OT network.