Resource Center
Filter
Education & Training
AI
Handbook
SBOMS
Webinar
Video
Zero trust for OT
IoT/IIoT
IT/OT
Product, Solutions & Services
Market Updates
Industry Focus
Vendor
Threats and vulnerabilities
Guides & frameworks
Govt & Regulations
Clear Filters
Guides & frameworks
Zero Trust Outcomes Using ISA/IEC 62443 Standards
The concept of zero trust “always trust, never verify” premise has become a widely accepted strategy, with the idea that risk is internally and externally inherent. This evolution has led to the development of new architectures, models, concepts, paradigms and solutions in the implementation of zero trust, all of which are crucial for security practitioners and professionals in operational technology (OT) and industrial control systems (ICS).
Guides & frameworks
Nozomi Networks
Nozomi Networks – A Buyer’s Guide to OT & IoT Asset Management SolutionsNozomi Networks –
This guide explores how OT asset management solutions enable better risk management, streamlined compliance and operational efficiency.
Govt & Regulations
Nozomi Networks
ISA/IEC 62443 Standards Compliance with the Nozomi Networks Platform
In this mapping guide we will discuss the ISA/IEC 62443 cybersecurity standards, including what they are and their importance for the cybersecurity of IACS.
Govt & Regulations
Nozomi Networks
European Network and Information Security (NIS2) Compliance with Nozomi Networks’ Solution
Nozomi Networks accelerates digital transformation by protecting the world’s critical infrastructure, industrial and government organizations from cyber threats.
Govt & Regulations
Nozomi Networks
NIST Cybersecurity Framework 2.0: Voluntary Guidance for Cybersecurity Risk Management
This mapping guide will align the Nozomi Networks platform to the six voluntary NIST CSF 2.0 functions, providing more explicit detail relating to operational technology, industrial control systems, and process automation environments.
Education & Training
National Cyber Workforce and Education Strategy – Implementation (The White House)
Demand for cyber workers exceeds the current capacity of workforce development and education systems, exacerbated by the dynamic national security environment and rapid global crises. The NCWES aims to broaden the appeal of cyber careers, transition to skills-based hiring, and develop cyber workforce ecosystems. These goals drive efforts to fill open cyber positions, improve workforce data, and adopt skills-based hiring and development.
Guides & frameworks
2023 Cyber Survey – Chemical firms step up cyber risk preparedness as new rules loom (Moody’s)
Awareness of cybersecurity vulnerabilities is rising in the chemicals industry, according to a survey of the chemical firms we rate around the globe1. Our 2023 cyber survey shows chemical companies have increased their cyber budgets after an escalating number of incidents and as new regulations loom. The chemical industry is at high risk in the event of a cyberattack because the impact can ripple downstream, affecting the supply of key inputs for industries including auto, construction, medical applications, and water purification.
Govt & Regulations
Critical 5 Approaches to Critical Infrastructure Security and Resilience
This document updates the evolving risks to critical infrastructure and discusses how Critical 5 nations are modernizing their protection strategies. It highlights common methods to enhance domestic security and resilience while emphasizing the need for international collaboration due to the interconnected nature of these systems.
Guides & frameworks
Cybersecurity for the Water and Wastewater Sector: Build Architecture (NIST)
This note describes the product-agnostic remote access security architectures and the example solutions the NCCoE plans to demonstrate as part of the Cybersecurity for the Water and Wastewater Sector: A Practical Reference Design for Mitigating Cyber Risk in Water and Wastewater Systems project. These security architectures were developed in collaboration with technology vendors, water utilities, and other experts.