Patch management for ICS

Get acquainted with a methodology to proactively develop a security strategy, tailored to your organization.

Fluvius

Toreon simply manages to put the right expert in the right place

Develop a clear security vision and plan (webinar)

Get acquainted with a methodology to proactively develop a security strategy, tailored to your organization.

Security Rating Services, an essential tool for IT risk management

Get acquainted with a methodology to proactively develop a security strategy, tailored to your organization.

Implementing remote working in ICS environments

In today’s society it’s become common practice to work and follow up business from home or a remote location. The flexibility which some employees have…

The NIST Cybersecurity Framework: what it is and why you should use it

The latest ‘RSA Cybersecurity Poverty Index’ – an annual maturity self-assessment completed by a variety of organisations all over the world – shows that 67%…

Threat Modeling in an ICS environment

Threat modeling is as a discipline that fits really well in ICS and OT environments, to design and secure connected systems in a way that…

How do you build a (modest) ICS testing & training lab?

Part of training people into becoming ICS security specialists is providing them the opportunity to test or train certain things in a ‘safe’ environment. Which…

Why the IT-OT Convergence is all about knowledge sharing

After attending the fifth Cyber and SCADA Security for Oil & Gas Industry conference, it became apparent lots of companies are having a hard time…

Start typing and press Enter to search

Shopping Cart