OT Security Resources

Keep informed with the latest ICS cyber security blogs, white papers, webinars and more from Verve Industrial Protection.

2022 ICS Advisory Year in Review

Learn More
Filter By:
  • Reset Filter
Blog December 17, 2021

Addressing the Log4j Vulnerability with Verve

This article outlines how Verve customers and other industrial organizations can effectively address Log4j vulnerabilities.

Read more
Blog December 14, 2021

5 Principles for Effective OT Security Governance

OT (Operational Technology) security governance is the set of policies, processes, and practices that an organization puts in place to manage and protect its operational technology infrastructure and assets. Getting OT cybersecurity governance right is imperative to the success of an industrial company’s security program as new threats, regulations, and requirements emerge.

Read more
Whitepaper

5 Principles for Designing a Successful Governance Model for OT Cyber Security

In today’s large and complex industrial organizations, the right cyber security governance structure depends on the culture and existing model of the rest of the organization, as well as coordination and shared decision-rights across IT, security/risk management, operations, and finance. Download the “5 Principles for Designing a Successful Governance Model for OT Cyber Security” to discover the five guiding principles…

Read more
Webinar

Designing the Right OT Governance Structure & Approach

In today’s complex industrial organizations, the right cyber security governance structure depends on the culture and existing models in place. Whether you’re just getting started or well on your cyber security journey, governance is foundational in securing critical infrastructure and industrial operations. Download our on-demand webinar to learn how to align IT and OT security initiatives to make progress against…

Read more
Webinar

Leveraging IEC 62443 Standards in ICS Security

The IEC/ISA 62443 standard is becoming more widespread in usage and application for industrial control systems cybersecurity. In this webinar, we will walk through an introduction to the overall standards and try to help make sense out of different terminology in a practical manner. We will also share practical experiences on how to address these standards and make meaningful progress…

Read more
Guide

A CISO’s Guide to Building an OT Cybersecurity Program

How to manage risk in industrial OT environments against key drivers

Read more
Guide

The Ultimate Guide to OT Vulnerability Management

OT vulnerability management is seemingly straightforward cyber security process meant to reduce the amount of cyber-related threats and attacks. But it tends to be easier said than done. In this Ultimate Guide to OT Vulnerability Management, we discuss the biggest challenges around vulnerability management and provide actionable recommendations to overcome them for optimal cyber security efficiency.

Read more
Whitepaper

5 Steps to OT Cybersecurity Compliance Success

Cyber attackers have industrial organizations squarely in their sights. Manufacturing and energy are now among the top three most targeted verticals, up from eighth and ninth, respectively, just two years ago. Ransomware has wreaked havoc on industries as diverse as fuel distribution pipelines, meatpacking, beer brewing, and paper packaging. Governments, insurers, customers, and boards of directors are responding to these…

Read more
Blog October 21, 2021

BlackMatter Ransomware and CISA Alert to Wastewater

Remediation and response strategies critical infrastructure operators can take to protect themselves from the risks of Blackmatter ransomware.

Read more
Webinar

Kick Starting the OT Cyber Security Business Case

This webinar focuses on how to raise awareness of the cyber risk in your industrial environment. Many people see the threats facing their controls systems environments, but do not know how to best raise awareness and mobilize the organization to act. In this webinar, we share experiences in how to create a shared awareness of risks and urgency with IT…

Read more
Webinar

Accelerate OT Cyber Security with a Technology-Enabled Vulnerability Assessment

In this cyber security webinar, Verve Industrial shares an approach to vulnerability assessments that provide deep, accurate risk perspectives, and the ability to immediately move from assessment to remediation, accelerating the time to security.

Read more
Blog October 11, 2021

Risk Management for OT Endpoint Security: 5 Steps for Success

How to take a true endpoint security risk management approach for successful cyber defense efforts. This approach provides an OT-specific way of conducting ITSM.

Read more