OT/ICS Cyber Security Resources

Keep informed with the latest ICS cyber security blogs, white papers, webinars and more from Verve Industrial Protection.

OT Systems Management Whitepaper

Learn More
Filter By:
  • Reset Filter
Blog September 15, 2021

5 Steps to Build an ICS Cybersecurity Program with IEC 62443 Standards

This article is intended to help asset owners, integrators and customers understand how to begin a cybersecurity program to improve overall maturity against the elements of the IEC 62443 standard.

Read more
Blog September 7, 2021

How to Reduce Risk and Respond to Threats in Industrial Environments

What are the overall objectives of OT cyber security and how can we ensure progress against risk reduction and threat response?

Read more

Dynamic OT Managed Detection & Response

Download this on-demand webinar to learn how to apply endpoint detection and response in OT environments. Specifically, in this webinar you will learn: – How to gather key endpoint and network data to detect risks and threats – How to enable response, not just detection, in sensitive OT environments – Organization implications for successful MDR in OT

Read more

Developing an Industrial Cyber Security Strategy

With ransomware threats on the rise, it’s crucial for industrial organizations to create an effective strategy to protect their OT infrastructure. Download this guide to learn how to align leadership, goals, and resources for a successful cyber security program. This guide will teach you how to: ▸ align the right leadership ▸ establish aggressive and clear targets ▸ design a…

Read more

Best practices for mitigating ransomware for OT/IIoT Cybersecurity in Energy & Utilities

Learn from leading cybersecurity experts about best practices to protect your organization, such as implementing industrial frameworks and foundational security controls, aligning IT & OT, gaining executive buy-in and selecting the right tools for the job.

Read more
Blog July 27, 2021

Getting Prepared: Tabletops and Scripts to Act Through a Ransomware Event

Finding value and reducing ransomware risks and impacts across people, process and technology

Read more
Blog July 22, 2021

Weathering the Deluge of OT Vulnerabilities: A Pragmatic Approach

When infosec media fixates on certain vulnerabilities, it feels like the world is one hack away from absolute chaos. But is it really?

Read more
Blog July 21, 2021

TSA Issues Part II of Pipeline Cyber Security Directives

This new directive was not released publicly, but from our sources, contains significant new requirements for pipeline operators. Instead of simply reporting and assessment requirements, TSA is following a model that we see becoming the norm: specific requirements of protections and remediating actions.

Read more

The Future of Industrial Cyber Security Compliance

Addressing the coming industrial security compliance challenge: Learnings from 15 years of NERC CIP and other industrial cyber-compliance management. The recent rise of public industrial cyber security incidents is creating a groundswell of regulation across the globe, focused on protecting the world’s critical infrastructure. While each regulatory entity is approaching this in slightly different ways, there are some common learnings…

Read more
Blog, Guide

The Ultimate Guide to Understanding OT Security

What is OT security, how does it work, and where should you start when building a robust cyber security program?

Read more

APAC/Singapore - Think Global but Act Local

SecurityWeek’s ICS Cyber Security Conference is the conference where ICS users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber incidents, analyze their causes and cooperate on solutions.

Read more
Blog, Guide June 23, 2021

The Ultimate Guide to Protecting OT Systems with IEC 62443

This comprehensive collection of standards is laser-focused on industrial controls. Here’s how to make the most of them.

Read more