Security Rating Services, an essential tool for IT risk management

Get acquainted with a methodology to proactively develop a security strategy, tailored to your organization.

Implementing remote working in ICS environments

In today’s society it’s become common practice to work and follow up business from home or a remote location. The flexibility which some employees have…

The latest ‘RSA Cybersecurity Poverty Index’ – an annual maturity self-assessment completed by a variety of organisations all over the world – shows that 67%…

Threat modeling is as a discipline that fits really well in ICS and OT environments, to design and secure connected systems in a way that…

Part of training people into becoming ICS security specialists is providing them the opportunity to test or train certain things in a ‘safe’ environment. Which…

After attending the fifth Cyber and SCADA Security for Oil & Gas Industry conference, it became apparent lots of companies are having a hard time…

Toreon joins the Belgian Pavilion at European Utility Week in Paris

The energy clusters Flux50 (Flanders) and TWEED (Wallonia) organize the Belgian Pavilion at European Utility Week in Paris from 12 until 14 November 2019.

We compiled a list of 5 essential cybersecurity practices that you absolutely must implement to get the basics of cybersecurity right.

Start typing and press Enter to search

Shopping Cart