OT Security Resources

Keep informed with the latest ICS cyber security blogs, white papers, webinars and more from Verve Industrial Protection.

2022 ICS Advisory Year in Review

Learn More
Filter By:
  • Reset Filter
Webinar

Designing the Right OT Governance Structure & Approach

In today’s complex industrial organizations, the right cyber security governance structure depends on the culture and existing models in place. Whether you’re just getting started or well on your cyber security journey, governance is foundational in securing critical infrastructure and industrial operations. Download our on-demand webinar to learn how to align IT and OT security initiatives to make progress against…

Read more
Webinar

Leveraging IEC 62443 Standards in ICS Security

The IEC/ISA 62443 standard is becoming more widespread in usage and application for industrial control systems cybersecurity. In this webinar, we will walk through an introduction to the overall standards and try to help make sense out of different terminology in a practical manner. We will also share practical experiences on how to address these standards and make meaningful progress…

Read more
Guide

A CISO’s Guide to Building an OT Cybersecurity Program

How to manage risk in industrial OT environments against key drivers

Read more
Guide

The Ultimate Guide to OT Vulnerability Management

OT vulnerability management is seemingly straightforward cyber security process meant to reduce the amount of cyber-related threats and attacks. But it tends to be easier said than done. In this Ultimate Guide to OT Vulnerability Management, we discuss the biggest challenges around vulnerability management and provide actionable recommendations to overcome them for optimal cyber security efficiency.

Read more
Video

How to Assess and Mitigate OT Security Risks

John Livingston discusses best practices for incident response, managing IT security practices in OT environments, and more!

Read more
Video

Applying 62443 Concepts to Securing OT ICS Endpoints

John Livingston and Ryan Zahn share how to protect endpoints leveraging concepts from the 62443 family.

Read more
Whitepaper

5 Steps to OT Cybersecurity Compliance Success

Cyber attackers have industrial organizations squarely in their sights. Manufacturing and energy are now among the top three most targeted verticals, up from eighth and ninth, respectively, just two years ago. Ransomware has wreaked havoc on industries as diverse as fuel distribution pipelines, meatpacking, beer brewing, and paper packaging. Governments, insurers, customers, and boards of directors are responding to these…

Read more
Blog October 21, 2021

BlackMatter Ransomware and CISA Alert to Wastewater

Remediation and response strategies critical infrastructure operators can take to protect themselves from the risks of Blackmatter ransomware.

Read more
Webinar

Kick Starting the OT Cyber Security Business Case

This webinar focuses on how to raise awareness of the cyber risk in your industrial environment. Many people see the threats facing their controls systems environments, but do not know how to best raise awareness and mobilize the organization to act. In this webinar, we share experiences in how to create a shared awareness of risks and urgency with IT…

Read more
Webinar

Accelerate OT Cyber Security with a Technology-Enabled Vulnerability Assessment

In this cyber security webinar, Verve Industrial shares an approach to vulnerability assessments that provide deep, accurate risk perspectives, and the ability to immediately move from assessment to remediation, accelerating the time to security.

Read more
Blog October 11, 2021

Risk Management for OT Endpoint Security: 5 Steps for Success

How to take a true endpoint security risk management approach for successful cyber defense efforts. This approach provides an OT-specific way of conducting ITSM.

Read more
Video

Challenges of IIoT Cybersecurity: Strategies for Success in a Rapidly Evolving Landscape

Explore effective strategies to tackle emerging challenges in IIoT cybersecurity and stay ahead of evolving threats.

Read more