
8 (and a Half) Questions for Your OT “Secure” Remote Access Vendors
Ask different questions, get different answers. What should you be asking your OT “secure” remote access (SRA) vendor?
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you

Ask different questions, get different answers. What should you be asking your OT “secure” remote access (SRA) vendor?

Hardware-enforced OT Security solutions help industrial operators follow the latest multi-government OT security guidance

The UK National Cyber Security Centre (NCSC) in conjunction with many others, including CISA, CCCS, BSI, FBI, NCSC-NL and NCSC-NZ, has just issued new guidance: Secure connectivity principles for Operational Technology (OT).

The second-generation of OT security advice started to emerge in 2012-2016.

“Everyone” has heard of the 5-week shutdown of Jaguar Land Rover by a cyber attack. That attack is the obvious headline for Waterfall’s up-coming webinar “Top 10 OT Cyber Attacks of 2025” that I’m currently researching.

The most recent CISA, CCCS et al alert / advice on pro-Russian hacktivists targeting critical infrastructures is a lot of good work, with one or two exceptions.

We know there are problems in our security systems, but we can’t and shouldn’t fix everything. What do we fix? Who decides? How do we explain what’s reasonable to people who do decide? Kayne McGladrey, CEO In Residence at Hyperproof, joins us to explore risk, communication, and a surprising role for insurance.

Yes the device has to be safe to use on patients, and yes it has to produce its results reliably, but patient / data confidentiality is also really important. Naomi Schwartz of Medcrypt joins us to explore the multi-faceted world of medical device cybersecurity – from MRI’s to blood sugar testers.

If you can touch it, you can hack it, usually. And having hacked it, you can often more easily find exploitable vulnerabilities. Marcel Rick-Cen of Foxgrid walks us through the basics of hacking industrial hardware and software systems.

How can we USE this information to make useful decisions about next steps to address cyber risk? Vivek Ponada of Frenos joins us to explore a new kind of OT / industrial digital twin – grab all that data and work it to draw useful conclusions.