OT Security Resources

Keep informed with the latest ICS cyber security blogs, white papers, webinars and more from Verve Industrial Protection.

2022 ICS Advisory Year in Review

Learn More
Filter By:
  • Reset Filter
Guide

2021-22 ICS Advisory Report

To provide more information on the threat landscape for ICS, Verve’s research team looked at updating the analytical comparison completed last year regarding the trend of ICS advisories and CVEs. To get a better view of growing risks and vulnerabilities, Verve analyzed publicly available data points and reviewed our own vulnerability analysis data from the past couple of years. We:…

Read more
Webinar

Rising Demand for OT Attack Surface Management

Learn how to apply Attack Surface Management in industrial environments in an OT-safe and efficient way.

Read more
Video

Ransomware Attacks on the Rise - How Do We Defend?

Hear from a panel of speakers about managing ransomware in the critical infrastructure industries.

Read more
Blog June 10, 2022

What is MITRE ATT&CK? The Definitive Guide.

This article is intended to explain what the MITRE ATT&CK framework is, how it should be applied for ICS, and how it compares to other cyber security frameworks.

Read more
Webinar

Following CISAs Guidance to Improve ICS Security

Learn how organizations successfully build consistent cyber practices that address existing and emerging threats.

Read more
Whitepaper

Leveraging MITRE ATT&CK and the Verve Security Center

Make sense of the MITRE ATT&CK framework and create additional value through reporting and SIEM capabilities.

Read more
Blog June 1, 2022

What is the NIST Cybersecurity Framework?

Discover the NIST Cybersecurity Framework’s five key functions: Identify, Protect, Detect, Respond, and Recover. Customize your strategy with Profiles and assess readiness using Implementation Tiers for robust cybersecurity practices.

Read more
Blog May 18, 2022

Respond to Growing OT Vulnerabilities with Endpoint Systems Management

While there has been a string of alerts and buzz around naming the various threats, the recommendations remain the same: Manage your OT systems through core security fundamentals.

Read more
Webinar

Asset Inventory: The Foundation to a Successful OT Security Program

Regardless of where you are in your security maturity journey, getting asset inventory right is critical to the effectiveness of your program.

Read more
Video

Adopting a Prevention-First Approach to Cybersecurity in Critical Infrastructure

As seen at CS4CA World, this panel aims to discuss a proactive cybersecurity approach for critical infrastructure organizations.

Read more
Video

How to Build a Robust OT Cybersecurity Program

To meet growing regulatory requirements and defend our critical infrastructure from growing attacks, we need an approach that goes beyond perimeter segmentation or network detection.

Read more
Blog April 14, 2022

What Critical Infrastructure Can Learn From Conti Ransomware Leaks

For the cybercrime group Conti, every operational and critical infrastructure company based in the United States or one of the many allied countries could be their next target.

Read more