Whitepapers & Guides

White papers, guides, and ebooks related to cyber security issues for industrial control systems.

eBook: The State of OT Cyber Security

Download now
Filter By:
Whitepaper

Protecting Embedded Systems

From an asset owner's perspective: Defining firmware and discovering embedded vulnerabilities to protect devices from exploitation.

Read more
Whitepaper

End-to-End Patch Management Whitepaper

Verve End to End patching solution brings dramatic labor savings, efficiency, and assurance that you have the latest software on each of your devices.

Read more
Whitepaper

Vulnerability Management in OT Whitepaper

The purpose of this white paper is to share an alternative approach to vulnerability management in OT, which has evolved over the course of a decade from work with dozens of industrial organizations managing IT-OT environments.

Read more
Whitepaper

OT Systems Management Whitepaper

To develop robust OT cyber security roadmaps and foundations, organizations with OT systems (everything from manufacturing process controls to building control systems to security access systems) should embrace the concept of OTSM (OT Systems Management), paralleling their ITSM practices, but within the unique environments of operating systems. Achieving a mature level of OTSM is critical to improve overall ROI from increasingly connected industrial systems and to ensure foundational elements of OT cyber security are in place to protect critical infrastructure from targeted and untargeted attacks.

Read more
Whitepaper

OT Endpoint Management Whitepaper

OT endpoint management is necessary to protect the world’s infrastructure, but it is often not deployed due to several key challenges. Find out how to overcome those hurdles. Verve Security Center offers a complete solution for Endpoint Management, specifically designed for Operating Technology in Industrial Control Systems

Read more
eBook

5 Principles for Designing a Successful Governance Model for OT Cyber Security

In today’s large and complex industrial organizations, the right cyber security governance structure depends on the culture and existing model of the rest of the organization, as well as coordination and shared decision-rights across IT, security/risk management, operations, and finance. Download the "5 Principles for Designing a Successful Governance Model for OT Cyber Security" to discover the five guiding principles you should consider for your organization.

Read more
eBook

The State of OT Cyber Security

Verve Industrial Protection assessed the history of OT cyber attacks and determined where they are likely headed based on twenty-five years of industrial cyber security experience in ICS environments. Most predictions from ten years ago about a rapid rise in cyber-physical attacks did not come true. Certainly, there has been significant financial damage to many firms resulting from powerful intrusions and attacks. However, relative to the IT world, OT has remained relatively unscathed. The real question is what the patterns of historical attacks, emerging threat vectors, and new OT initiatives connecting to ever more physical systems in the cyber world mean for the next decade. Operators are not strategically planning for this year or next. They make long-term investments in cyber security initiatives that take time to mature. This document is intended as a perspective on what a ten-year outlook might look like, drawing on history and creative analogies. Download the e-book to learn more about how the history of IT and OT cyber security informs our predictions, draws implications and recommends the best actions to take.

Read more