How to Apply ISA/IEC62443 - A Practical Guide Q&A Follow up
Fortifying Industrial Operations: A Strategic Remediation Plan
Overcoming the challenging task of prioritizing your actions to reduce Cybersecurity Risks in OT Management
Understanding the intricate details and implications of Operational Technology (OT) Vulnerabilities
The Critical Importance of Up-to-Date Asset Inventory for Enhanced Security in OT Environments
Raspberry Pi and OpenPLC How To and Use Cases
Getting started in OT Cybersecurity: Books, Podcasts, Certifications, Free & Formal Training & more
Book: Industrial Cybersecurity: Case Studies and Best Practices by Steve Mustard, PE, CAP, GICSP
Re-Sealing the Foundation of Commercial Construction
Operational Technology Cybersecurity – United and Strong
Building Control System WhisperGate Attack Post on LinkedIn
Control System Cyber Security Books I'm Currently Reading
BOOK Synopsis: Security PHA Review for Consequence Based Cybersecurity- Jim McGlone & Edward Marszal
How do We Knock Down OT Risk? Authors Unite at (CS)²AI Symposium Sept. 15, 2021
Q&A Follow Up with Jules Vos: Deciphering the Value of Zero Trust & CARTA in Operational Technology
How Do You Ask Your CISO for OT Cybersecurity Budget?
OT Cyber Risk Management – You’re Doing It Wrong
Colonial Pipeline Cyberattack
ASSESSMENT FINDINGS: EXTERNAL THREATS AND INTERNAL SELF-INFLICTED WOUNDS
Creating a DoD Cybersecurity Maturity Model Certification Compliant Risk Management Plan