OT Security Resources

Keep informed with the latest ICS cyber security blogs, white papers, webinars and more from Verve Industrial Protection.

2022 ICS Advisory Year in Review

Learn More
Filter By:
  • Reset Filter
Whitepaper

Addressing New ICS/OT Cybersecurity Regulations

In the spring and summer of 2021, the United States and global governments issued several new regulatory initiatives in response to several very public ransomware attacks on critical infrastructure such as Colonial Pipeline, as well as lesser-known, government-tracked hacking attempts of other entities. The writing is on the wall that the future of OT cyber security is one of greater…

Read more
Webinar

Build an effective risk & governance OT security platform

With almost half of the world’s known oil and gas reserves and much of the capacity to process or utilize them, the Middle East and North Africa (MENA) region is a cornerstone of today’s global energy and industrial system. As the region’s energy and utility industries continue to digitalize their assets, they have increasingly become targets of cyber threats. In…

Read more
Blog April 4, 2022

What are the Top CIS Controls?

What are the benefits of the Top CIS Controls and how are they implemented in OT or ICS cyber security environments?

Read more
News, Podcast March 29, 2022

Creating a Cyber Security Career in Production Environments

Derek Harp interviews Rick Kaun about his career, the decisions he made that led him to where he is today, and some gold nuggets of career advice.

Read more
Blog March 29, 2022

4 Benefits of OT Endpoint Security Asset Management

How endpoint OT security asset management improves a CISO’s ability to deliver measurable and rapid improvements to OT cybersecurity.

Read more
Blog March 10, 2022

Adapting XDR for OT Cybersecurity

These five adaptations of traditional IT XDR allow IT security teams to achieve effective and efficient multi-telemetry detection and response in OT environments.

Read more
Blog November 28, 2023

OT Patch Management: A Step-by-Step Guide

Learn what patch management in operational technology entails and a multi-staged approach that streamlines the patch management process.

Read more
Blog February 17, 2022

4 Ways to Manage the Impact of Log4j in OT Environments

Learn the steps asset owners should take to mitigate the Log4j vulnerability in OT environments with OT-safe practices.

Read more
Webinar

How to Remediate Log4j and Other Supply Chain Vulnerabilities in OT

Learn how to efficiently safeguard against supply chain vulnerabilities like Log4j without the risk of aggressive scanning.

Read more
Case Study

Power Case Study for Securing Different Asset Types

Find out how a leading power company reduced time to threat detection and response actions across the entire OT environment.

Read more
Whitepaper

5 Elements to Build a Business Case for OT Cyber Security

One of the biggest challenges industrial organizations face is developing a robust business plan that creates the right momentum, focus and budget to truly make measurable progress against cyber-related threats. The following whitepaper explains an effective, cross-industry approach to create the right commitment across an organization.

Read more
Blog January 5, 2022

4 Components to Rapidly Improve & Measure OT Security

The current approaches to OT cyber security lack the ability to demonstrate progress and improvement on key security metrics over time. Here’s how to change that.

Read more