eBook: Protecting Critical Infrastructure – Winter Edition
This eBook includes stories on how NotPetya took down shipping giant Maersk and which OT/ICS devices are the riskiest.
Home | WTWH Media | View All
This eBook includes stories on how NotPetya took down shipping giant Maersk and which OT/ICS devices are the riskiest.
Since at least 2011, cyber actors sponsored by the People’s Republic of China (PRC) have been targeting control systems in U.S. ports, and the rail, power, water and transportation sectors, reflecting the PRC’s systems warfare […]
In today’s interconnected digital landscape, the risks to the industrial sector are greater than ever. Whether these come from outside the organization or from simple human error, the resulting disruptions can be significant, from shutting […]
This eBook includes stories on how to design for IT/OT security challenges and ways to accelerate digital transformation.
This Throwback Attacks eBook includes stories on how Chinese hackers stole plans for the F-35 and why protecting critical assets is important.
This eBook includes stories on how to design for future cybersecurity challenges and why outdated policies can put smart factories in danger.
A converged IT/OT SOC can help you defend against threats, but you definitely need buy-in throughout the organization.
How secure are your OT systems? A converged IT/OT SOC can give you greater visibility and help defend against outside threats.
A converged IT/OT SOC can give you greater visibility across your operations and help you defend against outside threats.
Already used regularly for IT security, a converged IT/OT SOC can give you greater visibility across your operations and help you defend against outside threats.
This webcast helped attendees learn about how organizations can create a converged IT/OT SOC. Additional questions were answered by Jim Cook.
In this highly interactive webcast, Jeff McDaniel of Airgap will demonstrate how easy it is to close the identity gap for OT.
Already used regularly for IT security, a converged IT/OT SOC can give you greater visibility across your operations and help you defend against outside threats.
This eBook includes stories on how you can detect ransomware faster and how tabletop exercises can help prepare your employees.
The Securing the IIoT eBook includes stories on how to mitigate cloud security threat and accelerating smart manufacturing.
In this webcast, learn how a standards-based, defense-in-depth approach can be effective in protecting critical services and infrastructures.
This webcast will examine the rising tide of ransomware and how you can protect OT/ICS, without risking human safety or creating downtime.
This eBook includes stories on how what you need to know about the NERC CIP standards and how to minimize cybersecurity risk in manufacturing.
In this webcast, Jay Williams, CEO of Industrial Defender, will discuss how to secure a cybersecurity budget and get buy-in from the C-suite.
This eBook includes stories on why supply chain attacks create a target-rich environment and why supply chain and ransomware are a toxic mix.
In this webcast, Matt Ziegler will discuss why it is important to understand what assets are on your XIoT network and how you can do so.
This eBook includes stories on how outdated policies put systems at risk and what’s being done to protect the grid from ransomware.
As industrial devices become more connected, cyber risk is exploding. We’re proud to announce the new, weekly ICS Pulse Podcast.
This eBook includes stories on the impact of the CMMC and how supply chain attacks are changing the nature of ICS security.
Critical infrastructure provides the essential services that keep American society running. A cyberattack on these systems could create a destabilizing effect on the nation’s physical security, economic security, public health and/or safety. Featured articles in this […]
Every vendor is telling you to buy their new AI/ML product to secure your systems, ICS or not. Can AI/ML solve your cybersecurity problems
In this webcast, UL’s cyber experts discuss Industry 4.0 cybersecurity and how you can mitigate security risks and ensure compliance
This webcast on June 14 will show you why OT attacks are on the rise and how MITRE ATT&CK can help you defend against them
This webcast looks at why supply chain attacks are on the rise and what your organization can do to protect against them
The year 2021 was the year cybersecurity went mainstream. High-profile strikes such as the Colonial Pipeline ransomware attack in May 2021 and the SolarWinds supply chain hack resulted in a new U.S. Executive Order and […]
To protect against attacks, companies need IT and OT to work together. This webcast presents 5 things OT can learn from IT (and vice versa)
Computing at the edge is one of the fastest growing areas in the industrial sector, but it can also create new cybersecurity risks
Without the right approach to cybersecurity, cyber-physical systems involving the Internet of Things, Big Data and cloud computing are nothing more than an expanded attack surface for hackers
In this session, the presenter will outline the current threat landscape, identify some of the most common vulnerabilities and outline some practical first steps to take to secure industrial control systems, as well as how to take a more holistic view of ICS security
Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business
Featured articles in this eBook include stories on extending IT security to the plant floor, IT/OT collaboration driving digitalization and lessons learned from the SolarWinds attack.
Featured articles in this eBook include stories on cybersecurity for IIoT robots, cybersecurity asset updates and using cybersecurity to improve tomorrow’s manufacturing operations.
Looking to learn more about industrial cybersecurity? Register for the on-demand cybersecurity webcast
The International Society of Automation (isa.org) is a non-profit professional association founded in 1945 to create a better world through automation. ISA advances technical competence by connecting the automation community to achieve operational excellence. The […]
The Cybersecurity and Infrastructure Security Agency (CISA) is the Nation’s risk advisor, working with partners to defend against today’s threats and collaborating to build more secure and resilient infrastructure for the future. CISA’s new logo officially […]
Despite the threats of cyberattack on computer-controlled industrial systems, utilities and other users of these systems can be hesitant to adopt common security technologies out of concern for their impact on system performance. NIST has […]
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.