May 2024 Industrial IoT & ICS Cybersecurity Events

May 2024 Industrial IoT & ICS Cybersecurity Events

Welcome to the May 2024 roundup of IIoT and ICS cybersecurity events. This month promises an array of conferences, summits, and expos dedicated to exploring the latest advancements, challenges, and best practices in securing critical infrastructure…

Understanding the Convergence of Cybersecurity Drivers

Understanding the Convergence of Cybersecurity Drivers

In the ever-evolving landscape of cybersecurity, the concept of convergence plays a pivotal role in shaping the priorities and challenges faced by organizations today. As Ian from Black & Veatch aptly describes, it’s not just about…

Defend Your Industrial Assets: How to Safely Use Removable Media in ICS

Defend Your Industrial Assets: How to Safely Use Removable Media in ICS

Industrial Control Systems (ICS) form the backbone of essential infrastructures across various industries today, including power generation, water treatment, and oil and gas production. And because these systems monitor and control industrial processes, they are becoming…

Should You Worry About Cyber Insurance?

Should You Worry About Cyber Insurance?

Today, we’re exploring a question many business leaders have been working to navigate: “Is cybersecurity insurance worth the investment?”The first cyber insurance policy came into existence in 1997.It was pretty humble, designed to help retailers insulate…

Cybersecurity threats pose a major risk to production targets

Cybersecurity threats pose a major risk to production targets

Ransomware against industrial entities increased by 500 percent from 2018 to 2020, a trend that is likely to continue into the future. External threats range from foreign nations to financially motivated cybercrime, and both look increasingly…

A Good Plan Links Asset Visibility and Threat Detection

A Good Plan Links Asset Visibility and Threat Detection

The escalating reliance on technology and connectivity in industrial critical infrastructure has brought about efficiency and convenience. However, this efficiency and convenience exposes critical infrastructure to numerous cyberthreats and approaches, making robust cyber defense measures more…