Safeguarding Device Manufacturing: Practical Protective Measures AgainstCounterfeit Components
How to Apply ISA/IEC62443 - A Practical Guide Q&A Follow up
Fortifying Industrial Operations: A Strategic Remediation Plan
Overcoming the challenging task of prioritizing your actions to reduce Cybersecurity Risks in OT Management
Understanding the intricate details and implications of Operational Technology (OT) Vulnerabilities
The Critical Importance of Up-to-Date Asset Inventory for Enhanced Security in OT Environments
Raspberry Pi and OpenPLC How To and Use Cases
Q&A Follow-Up: Applying Network Segmentation to Secure OT Environments
Getting started in OT Cybersecurity: Books, Podcasts, Certifications, Free & Formal Training & more
Book: Industrial Cybersecurity: Case Studies and Best Practices by Steve Mustard, PE, CAP, GICSP
Re-Sealing the Foundation of Commercial Construction
Operational Technology Cybersecurity – United and Strong
Building Control System WhisperGate Attack Post on LinkedIn
Q & A Follow-Up - Cyber Security for Energy - Electric Sector Symposium January 19, 2022 (2 of 2)
Q & A Follow-Up - Cyber Security for Energy - Electric Sector Symposium January 19, 2022 (1of 2)
Q & A Follow-Up- Control System Cyber Security 2021 Annual Report: The Future of Industrial Security
Control System Cyber Security Books I'm Currently Reading
Q&A Follow-Up with Rick Kaun: Navigating the New TSA Directive for Pipelines
BOOK Synopsis: Security PHA Review for Consequence Based Cybersecurity- Jim McGlone & Edward Marszal
How do We Knock Down OT Risk? Authors Unite at (CS)²AI Symposium Sept. 15, 2021