webinar – Waterfall Security Solutions https://waterfall-security.com Unbreachable OT security, unlimited OT connectivity Tue, 09 Sep 2025 07:33:56 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.2 https://waterfall-security.com/wp-content/uploads/2023/09/cropped-favicon2-2-32x32.png webinar – Waterfall Security Solutions https://waterfall-security.com 32 32 The Top 10 OT-Capable Malware: What We’ve Learned and What Comes Next https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/top-10-ot-capable-malware/ Sun, 20 Jul 2025 18:36:58 +0000 https://waterfall-security.com/?p=34335 What’s driving the sudden surge in OT capable malware? Who’s behind these threats and how should our defenses evolve to keep pace?

The post The Top 10 OT-Capable Malware: What We’ve Learned and What Comes Next appeared first on Waterfall Security Solutions.

]]>

The Top 10 OT-Capable Malware: What We’ve Learned and What Comes Next

Watch the webinar for an in-depth look at the data behind how OT-capable malware has changed over the last 15 years, what's driving this change and how our defenses should evolve to tackle these threats.

In 2024 alone, researchers discovered as many new OT-capable malware families (3) as were found in the previous six years combined—each with the potential to disrupt physical operations in ICS and OT environments. Altogether, in the past 15 years, 10 OT-capable malware were found in the wild.

What’s driving this sudden surge? Who’s behind these threats (none of which, by the way, use AI yet)? And how should our defenses evolve to keep pace with these changing threats?

In this webinar Andrew Ginter takes us through:

arrow red right Look at the data from the ‘Top 10 ICS/OT-Capable Malware’ since 2010

arrow red right Compare ransomware-grade OT malware with nation-state-grade OT malware

arrow red right Examine the differences between autonomous and remote-control malware

arrow red right Dig deeper into how AI can enable a new wave of autonomous malware in the near future

About the Speaker

Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post The Top 10 OT-Capable Malware: What We’ve Learned and What Comes Next appeared first on Waterfall Security Solutions.

]]>
13 Ways to Break a Firewall (and alternatives for OT security) https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/13-ways-to-break-a-firewall/ Wed, 25 Jun 2025 10:06:43 +0000 https://waterfall-security.com/?p=34010 Explore 13+ real-world OT attack scenarios that firewalls can’t stop—and learn smarter alternatives to protect your industrial systems.

The post 13 Ways to Break a Firewall (and alternatives for OT security) appeared first on Waterfall Security Solutions.

]]>

13 Ways to Break a Firewall (and alternatives for OT security)

Firewalls are a go-to for OT security—but how much protection do they really offer? In this webinar, we explore 13+ real-world attack scenarios that defeat firewalls, show where firewalls fall short, and share smarter, stronger alternatives for securing industrial systems.

Firewalls are almost always the second technical step taken to secure
industrial / OT automation systems. But how much security do firewalls impart?

One way to compare the strength of different defensive technologies and designs is to compare the attacks those designs defeat reliably, vs the attacks they do not defeat. In this presentation, we look at firewalls, at attacks that defeat firewalls, and at mitigations, compensating measures and alternatives for and to firewalls.

And yes, the number “13” is a lucky ‘marketing’ number. We will in fact touch on closer to 18 or 19 kinds of attacks/scenarios.

In this webinar Andrew Ginter takes us through:

arrow red right Which types of cyberattacks firewalls can and can’t stop in industrial environments

arrow red right Real-world examples of firewall failures

arrow red right Practical alternatives that strengthen OT security when firewalls fall short

About the Speaker

Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post 13 Ways to Break a Firewall (and alternatives for OT security) appeared first on Waterfall Security Solutions.

]]>
Safety-Critical Clouds in Power Generation – 7 Designs Using Cyber-Informed Engineering https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/safety-critical-clouds-in-power-generation-7-designs-using-cyber-informed-engineering/ Sun, 27 Apr 2025 08:19:51 +0000 https://waterfall-security.com/?p=32589 Safety-critical and CI systems deserve engineering-grade cybersecurity. So, how can we provide this for Internet-based clouds? Watch the webinar where we will look at the problem from the perspective of the new Cyber-Informed Engineering (CIE).

The post Safety-Critical Clouds in Power Generation – 7 Designs Using Cyber-Informed Engineering appeared first on Waterfall Security Solutions.

]]>

Safety-Critical Clouds in Power Generation – 7 Designs Using Cyber-Informed Engineering

The industrial internet is coming. Reap almost all the benefits with almost none of the risks.

The Industrial Internet of Things (IIoT) is the future of automation in power generation and many other industries. The IIoT promises huge gains in efficiency and flexibility, with cloud-based systems and decision-making at the heart of these gains. Today, even safety-critical and critical-infrastructure (CI) decision-making is moving steadily out into the cloud.

But safety-critical and CI systems deserve engineering-grade cybersecurity. So, how can we provide this for Internet-based clouds?

Watch the webinar where we will look at the problem from the perspective of the new Cyber-Informed Engineering (CIE) initiative and dig into 7 design patterns for different kinds of safety-critical, cloud-based systems. 

In this webinar Andrew Ginter takes us through:

arrow red right Review the limitations of traditional IT-grade cyber protections for cloud systems.

arrow red right Explore seven engineering-grade designs for protecting safety-critical and reliability-critical clouds.

arrow red right Propose design principles for evaluating critical cloud designs.

For practitioners in power generation, OT security, or other critical infrastructures, this is an opportunity to explore two leading edges: the Industrial Internet (future of automation) and CIE (future of OT security).

We hope you can watch the webinar.

About the Speaker

Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Safety-Critical Clouds in Power Generation – 7 Designs Using Cyber-Informed Engineering appeared first on Waterfall Security Solutions.

]]>
Building a Game Plan for OT Remote Access https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/building-a-game-plan-for-ot-remote-access/ Mon, 17 Mar 2025 09:39:41 +0000 https://waterfall-security.com/?p=31658 OT remote access is seen as essential for many industries, but there are a variety of OT solutions out there. Watch the webinar as we help you make the right decision for your OT network.

The post Building a Game Plan for OT Remote Access appeared first on Waterfall Security Solutions.

]]>

Building a Game Plan for OT Remote Access

Watch the webinar where we’ll provide an overview of the current landscape of OT remote access solutions and help you make the right decision for your OT network.

OT remote access is seen as essential for many industries – partly to save costs, and partly because physical travel to very distant substations, compressor stations, mine sites, and other physical assets is difficult, time-consuming, and sometimes even dangerous. 

The problem is that there is a bewildering variety of OT remote access solutions out there, with different kinds of needs in different kinds of industries and use cases.

In this webinar Andrew Ginter takes us through:

  • Provide an overview of the current landscape of solutions and needs.

  • Recommend a decision process – how to gather critical information, the steps required to make informed decisions in a specific order.

  • Provide examples of the decision process across various industries and contexts – from municipal utilities to backbone / heavy infrastructure to manufacturing and building automation.

Watch the webinar as we "fly low and fast" - in 60 minutes see all the options in one place, and where and why each one makes sense, with concrete examples.

Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Building a Game Plan for OT Remote Access appeared first on Waterfall Security Solutions.

]]>
Unpacking the 2025 OT Cyber Threat Report https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/unpacking-2025-ot-cyber-threat-report/ Wed, 26 Feb 2025 09:31:45 +0000 https://waterfall-security.com/?p=31318 Watch the webinar that unpacks Waterfall's 2025 OT Cyber Threat Report and understand today's OT cyber threat landscape.

The post Unpacking the 2025 OT Cyber Threat Report appeared first on Waterfall Security Solutions.

]]>

Unpacking the 2025 OT Cyber Threat Report

Watch the webinar where we’ll dive deep into the findings of the most credible report in the OT Security industry.

In 2024, there was 146% increase in the number of sites impacted by cyberattacks targeting heavy industry.

The Waterfall Threat Report 2025 brings you comprehensive, verifiable data on cyber attacks that makes it the most trusted resource in the field.

Watch the webinar and join Greg Hale, Editor of ISSSource and Co-founder of ICS Strive, and Andrew Ginter, VP of Industrial Security at Waterfall, as they talk us through today’s threat landscape.

In this webinar Andrew Ginter and Greg Hale take us through:

arrow red right Discover the latest cybersecurity trends: From nation-state attacks to the explosion of ICS-capable malware, the report uncovers critical patterns.

arrow red right Understand the shifting landscape: New incident disclosure rules may be hindering transparency, not helping it. Learn why.

arrow red right Hear directly from the experts: Greg Hale, Editor of ISSSource and Co-founder of ICS Strive, alongside Andrew Ginter, VP of Industrial Security at Waterfall, will guide you through the most pressing findings.

About the speakers
Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Picture of Greg Hale

Greg Hale

Greg Hale is the founder and editor of Industrial Safety and Security Source (ISSSource.com), the website focused on sharing Safety and Security news in the manufacturing automation sector. Prior to starting up ISSSource.com 12 years ago, he was the chief editor of InTech magazine for more than 10 years

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

Share

The post Unpacking the 2025 OT Cyber Threat Report appeared first on Waterfall Security Solutions.

]]>
From Blind Spots to Action: OT Threats Exposed https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/from-blind-spots-to-action-ot-threats-exposed/ Sun, 29 Dec 2024 10:03:46 +0000 https://waterfall-security.com/?p=29880 Watch the webinar on some of the biggest OT cyberthreats, and risks, that businesses face today.

The post From Blind Spots to Action: OT Threats Exposed appeared first on Waterfall Security Solutions.

]]>
OT Insights CenterFrom Blind Spots to Action: OT Threats Exposed

Watch our first webinar of the new year as we discuss some of the biggest OT cyberthreats, and risks, that businesses face today.

We measure the strength of a security program by the attacks the program defeats with a high degree of confidence. We measure residual risk as the simplest attacks with significant consequences that the program does not defeat.

In many sites and industries, these residual risks have grown to the point where they are material threats to safe, reliable, and efficient physical operations. With widely available attack tools becoming ever more capable, credible and residual risks are increasing.

In this webinar, Andrew walks us through the attacks, blind spots and the potentially serious consequences for OT networks. If you’re also interested in how global OT security standards are evolving, check out our webinar on new OT cybersecurity guidelines.

Watch now to deepen your knowledge on:

arrow red right How to identify and mitigate significant OT cyberthreats. For further insights, explore our session on navigating OT remote access technologies.

arrow red rightHow to assess residual risk while prioritizing the severity of potential consequences.

arrow red rightExamples of ‘high-risk, severe-consequence threats’, often ignored due to their misleadingly low “severity score.”

arrow red rightModern methods for effectively managing these blind spots.

About the Speaker

Share

The post From Blind Spots to Action: OT Threats Exposed appeared first on Waterfall Security Solutions.

]]>
Andrew Ginter’s Top 3 Webinars of 2024 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/andrew-ginters-top-3-webinars-of-2024/ Tue, 17 Dec 2024 11:38:14 +0000 https://waterfall-security.com/?p=29379 Get up to speed on key trends and strategies in industrial security with Andrew Ginter’s favorite webinars of 2024,

The post Andrew Ginter’s Top 3 Webinars of 2024 appeared first on Waterfall Security Solutions.

]]>

Andrew Ginter’s Top 3 Webinars of 2024

Discover Andrew Ginter’s top picks for the most insightful and engaging webinars of 2024, covering key trends and strategies in industrial security.
Picture of Andrew Ginter

Andrew Ginter

As 2024 comes to a close, it’s traditional to reflect on the and maybe catch up on bits of reading and events that we missed throughout the year because of our busy schedules. To this end, I recommend to you three of this year’s Waterfall webinars, each an overview of Waterfall or other authors’ reports that read faster when we’ve seen an overview, so each of us can skip faster to the material we find most potentially useful.

My Top Three Webinars of 2024:

1) Cyber Attacks with Physical Consequences – 2024 Threat Report

By the numbers –Waterfall & ICS Strive produce the world’s most conservative and most credible OT / industrial security threat report. In this webinar the authors review the numbers – public disclosures of attacks with physical consequences. And we look at what the numbers mean for the practice and future of industrial cybersecurity.

To read further, the threat report is available here.

2) IEC 62443 for Power Generation

The IEC 62443 standards are cross industry, somewhat out of date, and deliberately vague in many areas – and so need to be interpreted to apply them successfully. In this webinar, Dr. Jesus Molina provides an overview of his report that shows how to interpret and apply the standards to conventional electric power plants.

To read further, the IEC 62443 for Power Generation report is available here.

3) Evolving Global OT Cyber Guidelines

This webinar is a favorite of mine because of big turnout and the thoughtful questions and comments from the audience. In this webinar, we explore the latest developments in OT cybersecurity regulations, standards and guidance worldwide and what these developments mean for industries navigating this complex landscape.

If you would like to read more, I recommend the brand new, multi-national Principles of OT Security – it’s good, and with only 9 pages of payload, it’s an easy read over the holidays.

These are my top 3. If you would like to see even more of our videos, I encourage you to subscribe to the Waterfall Youtube channel where we upload new videos regularly.

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Andrew Ginter’s Top 3 Webinars of 2024 appeared first on Waterfall Security Solutions.

]]>
Webinar: Evolving Global OT Cyber Guidelines, Recent Developments and What is Driving it https://waterfall-security.com/ot-insights-center/ot-security-standards/webinar-evolving-global-ot-cyber-guidelines-recent-developments-and-what-is-driving-it/ Wed, 06 Nov 2024 08:20:41 +0000 https://waterfall-security.com/?p=28112 Watch the webinar for a look into the recent evolution of OT security standards

The post Webinar: Evolving Global OT Cyber Guidelines, Recent Developments and What is Driving it appeared first on Waterfall Security Solutions.

]]>

Webinar: Evolving Global OT Cyber Guidelines, Recent Developments and What is Driving it

Watch the webinar for a look into the recent evolution of OT security standards.

Watch the webinar for a look into the recent evolution of OT security standards. There are some common themes in the OT cyber security guidance published in recent years around the world. Governments and standards bodies are feeling the pressure to increase the level of protective measures and methodologies when it comes to highly consequential systems and infrastructure.

In this webinar, Andrew Ginter takes us through:

arrow red right Who are the countries and standards bodies leading the way?

arrow red right How Engineering and Security principles are influencing the approach to OT cyber?

arrow red right What are consequence boundaries and how do they inform an OT security strategy?

arrow red right Our prediction on the future of OT cyber best practices.

Meet Your Expert Guide:

Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Webinar: Evolving Global OT Cyber Guidelines, Recent Developments and What is Driving it appeared first on Waterfall Security Solutions.

]]>
Webinar: HERA – Hardware-Enforced Remote Access https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/webinar-hera-hardware-enforced-remote-access/ Tue, 16 Jul 2024 07:31:13 +0000 https://waterfall-security.com/?p=23774 Recorded webinar as we took a look at solutions enforced by dedicated hardware, and what benefits such solutions offer for OT security.

The post Webinar: HERA – Hardware-Enforced Remote Access appeared first on Waterfall Security Solutions.

]]>

Webinar: HERA – Hardware-Enforced Remote Access

Watch now the webinar as we look at solutions that are enforced by dedicated hardware, and what benefits such solutions offer over comparable software-only solutions.

Software-based remote access — VPNs, 2FA, firewalls, jump hosts, and more all have vulnerabilities and potential zero-days that are exploited routinely by sophisticated threat actors. In this webinar, we look at problems with and attacks that breach conventional “secure” remote access, and we introduce Waterfall’s HERA — Hardware-Enforced Remote Access. With a layer of hardware-enforced protection, in addition to layers of software protection, HERA represents a material improvement in the security of remote access systems for OT networks, even at unattended sites. With strong client protections, TPM support, session recording, moderated access, moderated sessions, zero trust controls, and many other powerful features, HERA opens up a new era for protected remote access to critical networks.

Please watch our webinar to learn about problems with “secure” remote access and a new, powerful capability for safer remote access to OT systems.

In this webinar, Andrew Ginter takes us through:

arrow red right

What attacks have been breaching 2FA, VPNs and other conventional “secure” remote access solutions? What attacks have been breaching 2FA, VPNs and other conventional “secure” remote access solutions? What attacks have been breaching 2FA, VPNs and other conventional “secure” remote access solutions?

arrow red right

How are these attacks and risks neutralized by hardware enforcement?

arrow red right

How can HERA contribute to strong OT network segmentation and physical segmentation requirements?

arrow red right

And examples of how Hardware Enforced Remote Access would be used day-to-day in an industrial setting.

About the Speaker

Picture of Andrew Ginter

Andrew Ginter

VP Industrial Security at Waterfall Security Solutions

Picture of Greg Hale

Greg Hale

Editor/Founder at ISSSource and co-author of the annual Waterfall / ICS Strive Threat Report

Picture of Jim McGlone

Jim McGlone

CTO at Automation, Strategy & Performance and co-author of the highly-regarded Security PHA Review text

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Webinar: HERA – Hardware-Enforced Remote Access appeared first on Waterfall Security Solutions.

]]>
Webinar Recording: Cyber-securing Safety and Equipment Protection Systems in Mining https://waterfall-security.com/ot-insights-center/metals-mining/webinar-recording-cyber-securing-safety-and-equipment-protection-systems-in-mining/ Thu, 30 May 2024 08:44:25 +0000 https://waterfall-security.com/?p=23499 Cyber-Informed Engineering (CIE) offers a new engineering-friendly approach to understanding and addressing cyber threats that have the potential to impair worker safety and damage long-lead-time equipment in Mining & Metals operations.

The post Webinar Recording: Cyber-securing Safety and Equipment Protection Systems in Mining appeared first on Waterfall Security Solutions.

]]>

Webinar Recording: Cyber-securing Safety and Equipment Protection Systems in Mining

Recording of our webinar from May 29th 2024

Picture of Waterfall team

Waterfall team

Mining Webinar Recording

Safety is the top priority in almost all mines, and reliable, efficient physical operations are close seconds. Cybersecurity is essential to all these priorities, in a world where automation is remotely accessible and where many mines are the targets of threats from sophisticated ransomware criminals to nation states. In addition, the trend towards cloud computing and cloud-based predictive maintenance services complicates cybersecurity and expands attack opportunities.

The good news is that Cyber-Informed Engineering (CIE) offers a new engineering-friendly approach to understanding and addressing cyber threats that have the potential to impair worker safety and damage long-lead-time equipment.

In this webinar recording, Andrew Ginter discusses:

arrow red right The latest cyberattack outage data as we introduce CIE and dig into consequences, blind spots, electro-mechanical mitigations, and network engineering. 

arrow red right Comparing engineering-grade designs to IT-grade designs such as “secure” remote access and “secure” by design initiatives – these IT-grade approaches work well for small shoe factories, but have serious limitations in the most consequential mining networks.

arrow red right We’ll finish with a look at advanced topics – such as data abstraction for safer cloud-based remote control of mining operations.

Watch Now:

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Webinar Recording: Cyber-securing Safety and Equipment Protection Systems in Mining appeared first on Waterfall Security Solutions.

]]>