OT/ICS Cyber Security Resources

Keep informed with the latest ICS cyber security blogs, white papers, webinars and more from Verve Industrial Protection.

OT Systems Management Whitepaper

Learn More
Filter By:
  • Reset Filter
Whitepaper

5 Elements to Build a Business Case for OT Cyber Security

One of the biggest challenges industrial organizations face is developing a robust business plan that creates the right momentum, focus and budget to truly make measurable progress against cyber-related threats. The following whitepaper explains an effective, cross-industry approach to create the right commitment across an organization.

Read more
Blog January 5, 2022

4 Components to Rapidly Improve & Measure OT Security

The current approaches to OT cyber security lack the ability to demonstrate progress and improvement on key security metrics over time. Here’s how to change that.

Read more
Case Study

Energy Case Study for Measurable Improvement

The objective was to deliver measurable improvement in OT security within a 12 month period of time and build a foundation to push further security advances on a continuous improvement basis. See how they did it in this case study:

Read more
Blog December 27, 2021

4 Benefits of an OEM Vendor Agnostic OT Security Approach

Here’s why traditional OEM-specific approaches will break under their own weight and complexity. There is an alternative that drives efficiency and effectiveness across the enterprise.

Read more
Blog December 17, 2021

Addressing the Log4j Vulnerability with Verve

This article outlines how Verve customers and other industrial organizations can effectively address Log4j vulnerabilities.

Read more
Blog December 14, 2021

5 Principles for Guiding OT Cyber Security Governance

Getting OT cybersecurity governance right is imperative to the success of an industrial company’s security program as new threats, regulations, and requirements emerge.

Read more
Whitepaper

5 Principles for Designing a Successful Governance Model for OT Cyber Security

In today’s large and complex industrial organizations, the right cyber security governance structure depends on the culture and existing model of the rest of the organization, as well as coordination and shared decision-rights across IT, security/risk management, operations, and finance. Download the “5 Principles for Designing a Successful Governance Model for OT Cyber Security” to discover the five guiding principles…

Read more
Webinar

Designing the Right OT Governance Structure & Approach

In today’s complex industrial organizations, the right cyber security governance structure depends on the culture and existing models in place. Whether you’re just getting started or well on your cyber security journey, governance is foundational in securing critical infrastructure and industrial operations. Download our on-demand webinar to learn how to align IT and OT security initiatives to make progress against…

Read more
Webinar

Leveraging IEC 62443 Standards in ICS Security

The IEC/ISA 62443 standard is becoming more widespread in usage and application for industrial control systems cybersecurity. In this webinar, we will walk through an introduction to the overall standards and try to help make sense out of different terminology in a practical manner. We will also share practical experiences on how to address these standards and make meaningful progress…

Read more
Guide

A CISO’s Guide to Building an OT Cybersecurity Program

How to manage risk in industrial OT environments against key drivers

Read more
Guide

The Ultimate Guide to OT Vulnerability Management

OT vulnerability management is seemingly straightforward cyber security process meant to reduce the amount of cyber-related threats and attacks. But it tends to be easier said than done. In this Ultimate Guide to OT Vulnerability Management, we discuss the biggest challenges around vulnerability management and provide actionable recommendations to overcome them for optimal cyber security efficiency.

Read more
Blog November 11, 2021

How to Prevent Ransomware in 2022

Reduce the risk of a ransomware attack with these proven tips for preventing and protecting against OT/ICS ransomware.

Read more