Whitepapers & Guides

White papers, guides, and ebooks related to cyber security issues for industrial control systems.

2021-22 ICS Advisory Report

View now
Filter By:
Guide March 14, 2023

Building an OT Systems Management Program

Learn how to address IT OT security integration for success in industrial cyber security and reliability through OT systems management.

Read more
Guide

2022 ICS Advisory Report

To provide more information on the threat landscape for ICS, Verve’s research team updated the analytical comparison completed last year regarding the trend of ICS advisories and CVEs. To get a better view of growing ICS risks and vulnerabilities, Verve analyzed publicly available data points and reviewed our own vulnerability analysis data from the past couple of years. We: Examined…

Read more
Whitepaper

Understanding EU's NIS2 Cybersecurity Directive

What is the NIS2 Directive for Cybersecurity in the European Union and how should critical infrastructure entities address their OT security program? Disclaimer: This report is based on the 2020 version of the regulation and will be updated to reflect the latest version once published.

Read more
Whitepaper

End-to-End Patch Management Program

Patch management in an operational technology (OT)/industrial control system (ICS) setting is full of challenges.  From proprietary hardware and software to a lack of staff, inadequate or non-existent testing equipment, and regulatory reporting and system maintenance, many organizations struggle to determine what is in scope. This results in unpatched systems, lack of visibility to risk status, compliance fines, significant labor…

Read more
Whitepaper

5 Steps to Greater Security Maturity with NIST CSF

This guide and the accompanying case study provide a roadmap to using the CSF to drive greater cybersecurity maturity in control systems.

Read more
Blog, Guide

The Ultimate Guide to Understanding OT Security

What is OT security, how does it work, and where should you start when building a robust OT cyber security program?

Read more
Guide

2021-22 ICS Advisory Report

To provide more information on the threat landscape for ICS, Verve’s research team looked at updating the analytical comparison completed last year regarding the trend of ICS advisories and CVEs. To get a better view of growing risks and vulnerabilities, Verve analyzed publicly available data points and reviewed our own vulnerability analysis data from the past couple of years. We:…

Read more
Whitepaper

Leveraging MITRE ATT&CK and the Verve Security Center

Make sense of the MITRE ATT&CK framework and create additional value through reporting and SIEM capabilities.

Read more
Whitepaper

Addressing New ICS/OT Cybersecurity Regulations

In the spring and summer of 2021, the United States and global governments issued several new regulatory initiatives in response to several very public ransomware attacks on critical infrastructure such as Colonial Pipeline, as well as lesser-known, government-tracked hacking attempts of other entities. The writing is on the wall that the future of OT cyber security is one of greater…

Read more
Whitepaper

5 Elements to Build a Business Case for OT Cyber Security

One of the biggest challenges industrial organizations face is developing a robust business plan that creates the right momentum, focus and budget to truly make measurable progress against cyber-related threats. The following whitepaper explains an effective, cross-industry approach to create the right commitment across an organization.

Read more
Whitepaper

5 Principles for Designing a Successful Governance Model for OT Cyber Security

In today’s large and complex industrial organizations, the right cyber security governance structure depends on the culture and existing model of the rest of the organization, as well as coordination and shared decision-rights across IT, security/risk management, operations, and finance. Download the “5 Principles for Designing a Successful Governance Model for OT Cyber Security” to discover the five guiding principles…

Read more
Guide

A CISO’s Guide to Building an OT Cybersecurity Program

How to manage risk in industrial OT environments against key drivers

Read more