How to Apply ISA/IEC62443 - A Practical Guide Q&A Follow up
- 3 min
Fortifying Industrial Operations: A Strategic Remediation Plan
- 2 min
Overcoming the challenging task of prioritizing your actions to reduce Cybersecurity Risks in OT Management
- 2 min
Understanding the intricate details and implications of Operational Technology (OT) Vulnerabilities
- 2 min
The Critical Importance of Up-to-Date Asset Inventory for Enhanced Security in OT Environments
- 2 min
Raspberry Pi and OpenPLC How To and Use Cases
- 6 min
Getting started in OT Cybersecurity: Books, Podcasts, Certifications, Free & Formal Training & more
- 3 min
Book: Industrial Cybersecurity: Case Studies and Best Practices by Steve Mustard, PE, CAP, GICSP
- 3 min
Re-Sealing the Foundation of Commercial Construction
- 1 min
Operational Technology Cybersecurity – United and Strong
Building Control System WhisperGate Attack Post on LinkedIn
Control System Cyber Security Books I'm Currently Reading
- 2 min
BOOK Synopsis: Security PHA Review for Consequence Based Cybersecurity- Jim McGlone & Edward Marszal
How do We Knock Down OT Risk? Authors Unite at (CS)²AI Symposium Sept. 15, 2021
- 9 min
Q&A Follow Up with Jules Vos: Deciphering the Value of Zero Trust & CARTA in Operational Technology
- 1 min
How Do You Ask Your CISO for OT Cybersecurity Budget?
- 9 min
OT Cyber Risk Management – You’re Doing It Wrong
- 3 min
Colonial Pipeline Cyberattack
ASSESSMENT FINDINGS: EXTERNAL THREATS AND INTERNAL SELF-INFLICTED WOUNDS
Creating a DoD Cybersecurity Maturity Model Certification Compliant Risk Management Plan