OT Security Resources

Keep informed with the latest ICS cyber security blogs, white papers, webinars and more from Verve Industrial Protection.

2022 ICS Advisory Year in Review

Learn More
Filter By:
  • Reset Filter
Video

The Forgotten ICS Endpoint

Explore various ICS topics through invited speakers while showcasing current capabilities available today.

Read more
Whitepaper

Technology-Enabled Vulnerability Assessment

Conducting vulnerability assessments for industrial organizations is often a costly, manual effort requiring on-site resources which, as a result, happens infrequently. But a technology-enabled vulnerability assessment significantly reduces the time and labor requirements to enable real-time, ongoing visibility to track progress and have continuous visibility into risks. This white paper describes how to apply this approach to quickly prioritize security…

Read more
Video

Navigating the New TSA Directive for Pipelines

Learn key security insights for establishing and managing an OT security compliance program under TSA directives with Verve.

Read more
Webinar

How to Develop an Industrial Cyber Security Strategy

With cyber-related threats on the rise to our industrial and critical infrastructure, it’s crucial to create an effective strategy to protect OT assets. These assets that control manufacturing processes and infrastructure operations are at higher risk as we see ransomware becoming more prevalent and disruptive. This webinar shares how to align leadership, goals, and resources for a successful cyber security…

Read more
Blog September 15, 2021

5 Steps to Build an ICS Cybersecurity Program with IEC 62443 Standards

This article is intended to help asset owners, integrators and customers understand how to begin a cybersecurity program to improve overall maturity against the elements of the IEC 62443 standard.

Read more
Blog September 7, 2021

How to Reduce Risk and Respond to Threats in Industrial Environments

What are the overall objectives of OT cyber security and how can we ensure progress against risk reduction and threat response?

Read more
Webinar

Dynamic OT Managed Detection & Response

Download this on-demand webinar to learn how to apply endpoint detection and response in OT environments. Specifically, in this webinar you will learn: – How to gather key endpoint and network data to detect risks and threats – How to enable response, not just detection, in sensitive OT environments – Organization implications for successful MDR in OT

Read more
Whitepaper

Developing an Industrial Cyber Security Strategy

With ransomware threats on the rise, it’s crucial for industrial organizations to create an effective strategy to protect their OT infrastructure. Download this guide to learn how to align leadership, goals, and resources for a successful cyber security program. This guide will teach you how to: ▸ align the right leadership ▸ establish aggressive and clear targets ▸ design a…

Read more
Blog July 27, 2021

Getting Prepared: Tabletops and Scripts to Act Through a Ransomware Event

Finding value and reducing ransomware risks and impacts across people, process and technology

Read more
Blog July 22, 2021

Weathering the Deluge of OT Vulnerabilities: A Pragmatic Approach

When infosec media fixates on certain vulnerabilities, it feels like the world is one hack away from absolute chaos. But is it really?

Read more
Webinar

The Future of Industrial Cyber Security Compliance

Addressing the coming industrial security compliance challenge: Learnings from 15 years of NERC CIP and other industrial cyber-compliance management. The recent rise of public industrial cyber security incidents is creating a groundswell of regulation across the globe, focused on protecting the world’s critical infrastructure. While each regulatory entity is approaching this in slightly different ways, there are some common learnings…

Read more