![Threat Report Webinar](https://waterfall-security.com/wp-content/uploads/2024/04/power-webinar-recording_optimized-300x169.png)
Webinar Recording: Cyber Attacks with Physical Consequences – 2024 Threat Report
Webinar recording of a deep dive into the details of OT cyberattacks from our 2024 Threat Report.
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you [benefit or goal of the resources].
Webinar recording of a deep dive into the details of OT cyberattacks from our 2024 Threat Report.
How hard is it for an attacker to dig around in my network? Robin Berthier of Network Perception joins us to look at new network segmentation evaluation and visualization technology that lets us see at a glance how much trouble, or not, we’re in.
Industrial network engineers have always been uneasy with the task of “protecting information”. The real priority for OT security is in stopping inbound malicious information from entering the system and threatening machinery and workers.
From supply chain to Active Directory to segmentation designing security into ICS products is hard. Jake Hawkes walks us through how security gets built into AVEVA Enterprise SCADA.
The fundamental difference between these two kinds of networks is consequences: most often, the worst-case consequences of cyber attacks are sharply, qualitatively different on IT vs OT networks…
Upstream Oil & Gas production has a unique range of threats and risks to consider when compared to other industrial operations.
Our checklist infographic takes a dive into what to consider and secure when it comes to Upstream operations.
The Waterfall Unidirectional Security Gateway and how it has been applied at Oil & Gas production sites such as oil fields and offshore platforms.
The operational technology (OT) environments that power critical infrastructure face rapidly escalating cyber threats. As facilities like power plants, water treatment centers, and manufacturing plants connect operations to external networks, they expose vulnerable legacy OT systems. Attacks like TRITON, Stuxnet, and Industroyer demonstrate the damage hackers can inflict when they access operational networks. To protect themselves, organizations need OT security solutions exploring for industrial control systems.
IT/OT integration introduces threats to reliable operations. Connected networks move both data, malware, and remote-control cyber attacks along their wires and cables. In the Oil & Gas industry, E&P, pipelines, and refineries have found that securing IT/OT connections involves more than just having Enterprise Security telling Engineering what to do and Engineering saying “no” to IT over and over.
Dr Jesus Molina takes us on an in-depth 2 on the European NIS2 Directive, it’s timeline, what it will entail, and who needs to comply.