Whitepapers & Guides

White papers, guides, and ebooks related to cyber security issues for industrial control systems.

2021-22 ICS Advisory Report

View now
Filter By:
Guide

The Ultimate Guide to OT Vulnerability Management

OT vulnerability management is seemingly straightforward cyber security process meant to reduce the amount of cyber-related threats and attacks. But it tends to be easier said than done. In this Ultimate Guide to OT Vulnerability Management, we discuss the biggest challenges around vulnerability management and provide actionable recommendations to overcome them for optimal cyber security efficiency.

Read more
Whitepaper

5 Steps to OT Cybersecurity Compliance Success

Cyber attackers have industrial organizations squarely in their sights. Manufacturing and energy are now among the top three most targeted verticals, up from eighth and ninth, respectively, just two years ago. Ransomware has wreaked havoc on industries as diverse as fuel distribution pipelines, meatpacking, beer brewing, and paper packaging. Governments, insurers, customers, and boards of directors are responding to these…

Read more
Whitepaper

Technology-Enabled Vulnerability Assessment

Conducting vulnerability assessments for industrial organizations is often a costly, manual effort requiring on-site resources which, as a result, happens infrequently. But a technology-enabled vulnerability assessment significantly reduces the time and labor requirements to enable real-time, ongoing visibility to track progress and have continuous visibility into risks. This white paper describes how to apply this approach to quickly prioritize security…

Read more
Whitepaper

Developing an Industrial Cyber Security Strategy

With ransomware threats on the rise, it’s crucial for industrial organizations to create an effective strategy to protect their OT infrastructure. Download this guide to learn how to align leadership, goals, and resources for a successful cyber security program. This guide will teach you how to: ▸ align the right leadership ▸ establish aggressive and clear targets ▸ design a…

Read more
Blog, Guide June 23, 2021

The Ultimate Guide to Protecting OT Systems with IEC 62443

This comprehensive collection of standards is laser-focused on industrial controls. Here’s how to make the most of them.

Read more
Guide

The Rising Threat to Manufacturing Cyber Security

Why have threats to manufacturing increased and how can you protect your organization from cyber-related risk?

Read more
Whitepaper

Cyber Security for Pharmaceutical & Medical Device Manufacturing

Cyber security in operational technology (OT) is a challenge in almost any industry. The combination of devices aging, embedded proprietary software, 24×7 operations, etc. makes managing security a difficult task. In pharmaceuticals and medical device manufacturing, those challenges are exacerbated by regulatory burdens and risks to patient safety and personal information in some cases. The pharma/med device CISO’s job is…

Read more
Whitepaper

Achieve CMMC Security Maturity

Download the whitepaper to learn how the CMMC applies to both IT and OT systems, what compliance entails and how to meet requirements.

Read more
Whitepaper

Anomaly Detection: Don’t Be Passive About OT Security

Learn why OT systems management is a better solution than passive anomaly detection for managing OT security environments.

Read more
Whitepaper

2020 ICS Advisory Report

This document was performed as a summary piece highlighting the last two years of ICS advisories in an in-depth way.  All reasonable efforts were made to analyze the data and create an informative piece such that any consumers can apply their own interpretations or actions.  No warranties or guarantees are provided. Download the 2020 ICS Advisory Report for a robust…

Read more
Guide

The Ultimate Guide to Reading ICS Cyber Security Advisories Like A Pro

CVEs and advisories should not be scary – here are the basics to get anyone started.

Read more
Whitepaper

Verve Value Prop

This document outlines how the Verve Security Center (VSC) platform provides far greater insights and coverage for asset awareness and system monitoring through our superior architecture and also includes patch management, configuration management, incident response, and other requirements of the NIST CSF. The following sections walk through the origin and philosophy of Verve and examine how our solution works and…

Read more