Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you

This webinar will cover the record-breaking costs of consequences, what is behind the drop in ransomware attacks and the key defensive developments of 2025, in light of these threats

Learn what OT cybersecurity is, how it protects critical infrastructure, and the key threats, strategies, and standards you need to know.

The standard answer to this questions is “The Consequence Boundary”…but which kind of consequences are we talking about? And aren’t there different levels of consequence? We help define these to answer the question.

Governments play an important role in OT security: they educate, they share threat information, they vet our employees and other trusted insiders, and from time to time they legislate cybersecurity defenses that the most consequential industrial enterprises must implement.

Dr Jesus Molina takes us on an in-depth 2 on the European NIS2 Directive, it’s timeline, what it will entail, and who needs to comply.

How a UAE-based refinery was able to protect their legacy system to the extent it could safely be connected to the internet, IT networks, and the Cloud.

For those of us who live and breathe OT or ICS cybersecurity, what better way to end the year than with an in-depth look at the most novel, notorious and impactful cyber incidents on critical infrastructure, industrial controls systems, and physical operations around the globe.

Protecting a regional Transmission System Operator (TSO) in Europe from outside cyber threats.

Protect liquefied natural gas (LNG) infrastructure from external cyber threats while complying with local cybersecurity regulations.