Content Library

Latest ICS Cyber Security Event Guide

ICS Cyber Security 2019 will hear from senior policy makers and regulatory partners on how they addressed a full spectrum of cyber threats, demonstrate how to prepare against new targeting methods aimed at Intellectual Property (IP) and data theft, and gai ...

Sponsored Content

Free Book: Secure Operations Technology (SEC-OT)

Secure Operations Technology documents the SEC-OT perspective, methodology and best practices, including protection against both offline and online cyber attacks, as well as a set of twenty standard cyberattack patterns to use when evaluating the security of industrial sites. Secure Operations Technology is available free of charge via our sponsor...

Featured Content

The need to create a culture of agile incident response in ICS

The digitisation of networks has brought a fair share of risks for ICS to be cyber attacked. Download this interview from , Professor Helge Janicke, Director of the Cyber Technology Institute at De Montfort University, who will be speaking at this year’s ICS Cyber Security conference, to learn more about:How...

Cyber Security Challenges, Focuses for 2019

Annual Survey on Spend and Trends in Cyber Security Cyber Security Hub fielded an email survey to subscribers in October 2018 to identify enterprise cyber security trends, among cyber security project owners with direct responsibility and cyber security organizational influencers. This report combines both quantitative and qualitative data for a look...

Industrial IoT Concerns Worsen As More Devices Connect To The Web

IIoT Disruptions Could Cost Millions As Network Widens It’s no secret that the “Internet of Things” (IoT) is one of the next big discussion points in the cyber security space. That is, security practitioners are actively seeking ways to shore up defense and get a handle of the network.

Improving cyber security for Industrial Control Systems: Rebuilding the OT/IT relationship

Cyber security solutions are in place for industrial control systems, and yet the gap between OT and IT is not addressed, leaving a risk for organisations' cyber security. The challenge now is to mitigate it, by improving the communication between these two departments and assess who is liable for the...

Industrial Control Systems and Process Control Networks Cybersecurity Assessment

As industrial control systems (ICS) and process control network (PCN) environments become more connected, “security by obscurity” is no longer an adequate strategy. Sophisticated adversaries have begun to take notice of vulnerabilities found in today’s operational environments. The ICS/PCN Cybersecurity Assessment evaluates technology and network defense processes to measure the...

The ICS Threat Matrix: “Software only as safe as the last patch”

2016 saw cyber criminals continue to become ever smarter, more efficient and increasingly successful at penetrating industrial networks. Industrial control systems (ICS) operators reported more security incidents to their governing authorities than in any year to date. In this video, we talk to cyber security experts about the biggest problems...

ICS Cyber Security: State of the market & expert overview

The number of cyber attacks is on the rise and Industrial Control Systems must be secured, in order for global organisations to avoid suffering real, physical damage.Ahead of the ICS Cyber Security conference, more than 350 experts from all around the world have answered our recent survey and shared their...

28 Solutions to the Cross-Sector ICS Nightmare

In February 2017, two researchers at the Georgia Institute of Technology simulated a cyber attack on a water treatment plant. Using ransomware, the academics managed to access programmable logic controllers (PLCs) to shut off valves, increase the chlorine content of water and show false information on computer displays.The ICS world...

How mature is your cyber security?

Cyber security solutions are already in place in various sectors to secure ICS from attacks, but assaults keep happening. This poses now the challenge to assess whether these solutions are enough to protect both digital and physical assets.Ahead of the ICS Cyber Security conference, we recently surveyed more than 350...

The Top 10 Cyber Trends Affecting the CNI Sector

Anthony Leather, Senior Consultant for Aerospace, Defense and Security at Frost & Sullivan, presents the top 10 cyber threats facing critical national infrastructure based on detailed analysis of the most recent incidents. According to Leather, the cyber threat will be the number one risk for the next 20 years. Governments...