
Webinar Recording: Cyber Attacks with Physical Consequences – 2024 Threat Report
Webinar recording of a deep dive into the details of OT cyberattacks from our 2024 Threat Report.
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you

Webinar recording of a deep dive into the details of OT cyberattacks from our 2024 Threat Report.

Engineers have very recently started to use the “OT” term, primarily when interacting with enterprise security teams. Engineers use the term to refer to the computers and networks that control important, complex, and often dangerous physical processes

Industrial network engineers have always been uneasy with the task of “protecting information”. The real priority for OT security is in stopping inbound malicious information from entering the system and threatening machinery and workers.

From supply chain to Active Directory to segmentation designing security into ICS products is hard. Jake Hawkes walks us through how security gets built into AVEVA Enterprise SCADA.

The cyber threat environment is getting worse, and our adversaries are developing more powerful attack tools. Government agencies need to increase automation and network connectivity to maintain strategic military, governance, and economic advantages.

The fundamental difference between these two kinds of networks is consequences: most often, the worst-case consequences of cyber attacks are sharply, qualitatively different on IT vs OT networks…

Dr Jesus Molina takes us on an in-depth 2 on the European NIS2 Directive, it’s timeline, what it will entail, and who needs to comply.

How a UAE-based refinery was able to protect their legacy system to the extent it could safely be connected to the internet, IT networks, and the Cloud.

Andrew Ginter shares with us his top 5 favorite podcast episodes from the Industrial Security Podcast that he co-hosts

For those of us who live and breathe OT or ICS cybersecurity, what better way to end the year than with an in-depth look at the most novel, notorious and impactful cyber incidents on critical infrastructure, industrial controls systems, and physical operations around the globe.