Management & Strategy

Industrial management and strategic planning focus on creating and managing industrial systems and processes that incorporate people, materials, and energy in productive ways. Industrial cyber management works on measuring, handling, tracking, and communicating the potential impacts of cybersecurity events for OT environments.

With appropriate assessment, organizations are better positioned to allocate resources for their ICS security programs, including an expansive workforce and enhanced tools to support cyber protections and detection capabilities. Furthermore, management can provide actionable guidance, manage highly distributed operational environments, meet on-demand audit requests, report compliance for industrial networks, and conduct mergers and acquisitions (M&A) due diligence across third-party domains.

Strengthening ICS/OT Cyber Resilience: Learning from 2023’s Cybersecurity Incidents from Dragos’ Report
Strengthening ICS/OT Cyber Resilience: Learning from 2023’s Cybersecurity Incidents from Dragos’ Report
Emerging Trends and Securing the Future of Smart Manufacturing
Emerging Trends and Securing the Future of Smart Manufacturing
Cybersecurity Strategies and Best Practices for Manufacturing
Cybersecurity Strategies and Best Practices for Manufacturing
Global security agencies update secure by design principles and guidance for technology providers
New US CISA Recommendations on Security by Design
Process Safety and OT Security - A Symbiotic Relationship
Process Safety and OT Security – A Symbiotic Relationship

Industrial Cyber Experts

Rodrigo Mendes Augusto
Strengthening ICS/OT Cyber Resilience: Learning from 2023’s Cybersecurity Incidents from Dragos’ Report
Introduction: Understanding the Evolving Threat Landscape in Industrial Cybersecurity 2023 has been a watershed moment for industrial cybersecurity,... Read full story
Jonathon Gordon
Emerging Trends and Securing the Future of Smart Manufacturing
Welcome to the ninth and final article of our series on manufacturing cybersecurity. This installment marks the culmination... Read full story
Sarah Fluchs
New US CISA Recommendations on Security by Design
The answers are not perfect, but the questions are good: What do users need to know about security?... Read full story
Sinclair Koelemij
Process Safety and OT Security – A Symbiotic Relationship
In my previous article about the security triad, I briefly mentioned process safety. Some of the readers of... Read full story