Security Rating Services, an essential tool for IT risk management

Get acquainted with a methodology to proactively develop a security strategy, tailored to your organization.

Implementing remote working in ICS environments

In today’s society it’s become common practice to work and follow up business from home or a remote location. The flexibility which some employees have…

The NIST Cybersecurity Framework: what it is and why you should use it

The latest ‘RSA Cybersecurity Poverty Index’ – an annual maturity self-assessment completed by a variety of organisations all over the world – shows that 67%…

Threat Modeling in an ICS environment

Threat modeling is as a discipline that fits really well in ICS and OT environments, to design and secure connected systems in a way that…

How do you build a (modest) ICS testing & training lab?

Part of training people into becoming ICS security specialists is providing them the opportunity to test or train certain things in a ‘safe’ environment. Which…

Why the IT-OT Convergence is all about knowledge sharing

After attending the fifth Cyber and SCADA Security for Oil & Gas Industry conference, it became apparent lots of companies are having a hard time…

Toreon joins the Belgian Pavilion at European Utility Week in Paris

The energy clusters Flux50 (Flanders) and TWEED (Wallonia) organize the Belgian Pavilion at European Utility Week in Paris from 12 until 14 November 2019.

Is your organisation NIS compliant?

We compiled a list of 5 essential cybersecurity practices that you absolutely must implement to get the basics of cybersecurity right.

Start typing and press Enter to search

Shopping Cart