OT Security Resources

Keep informed with the latest ICS cyber security blogs, white papers, webinars and more from Verve Industrial Protection.

2022 ICS Advisory Year in Review

Learn More
Filter By:
  • Reset Filter
Blog January 5, 2022

4 Components to Rapidly Improve & Measure OT Security

The current approaches to OT cyber security lack the ability to demonstrate progress and improvement on key security metrics over time. Here’s how to change that.

Read more
Case Study

Energy Case Study for Measurable Improvement

The objective was to deliver measurable improvement in OT security within a 12 month period of time and build a foundation to push further security advances on a continuous improvement basis. See how they did it in this case study:

Read more
Blog December 27, 2021

4 Benefits of an OEM Vendor Agnostic OT Security Approach

Here’s why traditional OEM-specific approaches will break under their own weight and complexity. There is an alternative that drives efficiency and effectiveness across the enterprise.

Read more
Blog December 17, 2021

Addressing the Log4j Vulnerability with Verve

This article outlines how Verve customers and other industrial organizations can effectively address Log4j vulnerabilities.

Read more
Blog December 14, 2021

5 Principles for Effective OT Security Governance

OT (Operational Technology) security governance is the set of policies, processes, and practices that an organization puts in place to manage and protect its operational technology infrastructure and assets. Getting OT cybersecurity governance right is imperative to the success of an industrial company’s security program as new threats, regulations, and requirements emerge.

Read more
Whitepaper

5 Principles for Designing a Successful Governance Model for OT Cyber Security

In today’s large and complex industrial organizations, the right cyber security governance structure depends on the culture and existing model of the rest of the organization, as well as coordination and shared decision-rights across IT, security/risk management, operations, and finance. Download the “5 Principles for Designing a Successful Governance Model for OT Cyber Security” to discover the five guiding principles…

Read more
Webinar

Designing the Right OT Governance Structure & Approach

In today’s complex industrial organizations, the right cyber security governance structure depends on the culture and existing models in place. Whether you’re just getting started or well on your cyber security journey, governance is foundational in securing critical infrastructure and industrial operations. Download our on-demand webinar to learn how to align IT and OT security initiatives to make progress against…

Read more
Webinar

Leveraging IEC 62443 Standards in ICS Security

The IEC/ISA 62443 standard is becoming more widespread in usage and application for industrial control systems cybersecurity. In this webinar, we will walk through an introduction to the overall standards and try to help make sense out of different terminology in a practical manner. We will also share practical experiences on how to address these standards and make meaningful progress…

Read more
Guide

A CISO’s Guide to Building an OT Cybersecurity Program

How to manage risk in industrial OT environments against key drivers

Read more
Guide

The Ultimate Guide to OT Vulnerability Management

OT vulnerability management is seemingly straightforward cyber security process meant to reduce the amount of cyber-related threats and attacks. But it tends to be easier said than done. In this Ultimate Guide to OT Vulnerability Management, we discuss the biggest challenges around vulnerability management and provide actionable recommendations to overcome them for optimal cyber security efficiency.

Read more
Video

How to Assess and Mitigate OT Security Risks

John Livingston discusses best practices for incident response, managing IT security practices in OT environments, and more!

Read more
Video

Applying 62443 Concepts to Securing OT ICS Endpoints

John Livingston and Ryan Zahn share how to protect endpoints leveraging concepts from the 62443 family.

Read more