Whitepapers & Guides

White papers, guides, and ebooks related to cyber security issues for industrial control systems.

eBook: The State of OT Cyber Security

Download now
Filter By:
Whitepaper

Don’t Be Passive About OT Security

Learn why OT systems management is a better solution than passive detection for managing OT security environments.

Read more
Whitepaper

2020 ICS Advisory Report

This document was performed as a summary piece highlighting the last two years of ICS advisories in an in-depth way.  All reasonable efforts were made to analyze the data and create an informative piece such that any consumers can apply their own interpretations or actions.  No warranties or guarantees are provided. Download the 2020 ICS Advisory Report for a robust…

Read more
Whitepaper

The Ultimate Guide to Reading ICS Cyber Security Advisories Like A Pro

CVEs and advisories should not be scary – here are the basics to get anyone started.

Read more
Whitepaper

Verve Value Prop

This document outlines how the Verve Security Center (VSC) platform provides far greater insights and coverage for asset awareness and system monitoring through our superior architecture and also includes patch management, configuration management, incident response, and other requirements of the NIST CSF. The following sections walk through the origin and philosophy of Verve and examine how our solution works and…

Read more
Whitepaper

OT Endpoint Protection Whitepaper

Endpoint protection is a critical element of all cybersecurity programs but has traditionally been hard to execute in industrial control systems (or operating technology) environments. Leveraging our 25-year experience in ICS engineering, Verve Industrial Protection built an endpoint protection solution that addresses the unique criteria and challenges of OT environments. This paper summarizes that solution.

Read more
Whitepaper

Protecting Embedded Systems

From an asset owner’s perspective: Defining firmware and discovering embedded vulnerabilities to protect devices from exploitation.

Read more
Whitepaper

End-to-End Patch Management Whitepaper

Verve’s End to End patching solution brings dramatic labor savings, efficiency, and assurance that you have the latest software on each of your devices.

Read more
Whitepaper

Vulnerability Management in OT Whitepaper

The purpose of this white paper is to share an alternative approach to vulnerability management in OT, which has evolved over the course of a decade from work with dozens of industrial organizations managing IT-OT environments.

Read more
Whitepaper

OT Systems Management Whitepaper

To develop robust OT cyber security roadmaps and foundations, organizations with OT systems (everything from manufacturing process controls to building control systems to security access systems) should embrace the concept of OTSM (OT Systems Management), paralleling their ITSM practices, but within the unique environments of operating systems. Achieving a mature level of OTSM is critical to improve overall ROI from…

Read more
Whitepaper

OT Endpoint Management Whitepaper

OT endpoint management is necessary to protect the world’s infrastructure, but it is often not deployed due to several key challenges. Find out how to overcome those hurdles. Verve Security Center offers a complete solution for Endpoint Management, specifically designed for Operating Technology in Industrial Control Systems

Read more
Whitepaper

5 Principles for Designing a Successful Governance Model for OT Cyber Security

In today’s large and complex industrial organizations, the right cyber security governance structure depends on the culture and existing model of the rest of the organization, as well as coordination and shared decision-rights across IT, security/risk management, operations, and finance. Download the “5 Principles for Designing a Successful Governance Model for OT Cyber Security” to discover the five guiding principles…

Read more
eBook

The State of OT Cyber Security

Verve Industrial Protection assessed the history of OT cyber attacks and determined where they are likely headed based on twenty-five years of industrial cyber security experience in ICS environments. Most predictions from ten years ago about a rapid rise in cyber-physical attacks did not come true. Certainly, there has been significant financial damage to many firms resulting from powerful intrusions…

Read more