Defense In Depth: Common Cybersecurity Threats
Learn about the most common cybersecurity threats to manufacturing and critical infrastructure facilities, what they are attempting to steal from you with each type of attack, and how you can mitigate the attacks from causing you massive headaches.
Defense in Depth: Reducing the Human Risks in Cybersecurity
With smart phones in everyone's pocket and email tied to nearly every employee at every company attackers are more capable than ever of exploiting the weakest link in your cybersecurity infrastructure, people. Learn how to detect phishing attacks before you become the victim of one, how to handle them when they occur, and how to train your people to be security minded in the first place.
Defense in Depth: Using MQTT to Reduce Cybersecurity Risks
Learn how you can use the built-in security features of MQTT to help secure your IT and OT systems. Using tools like username/password authentication, certificates, and Access Control Lists will add an automatic layer of security. Using these with MQTT in conjunction with other cybersecurity best practices will keep your data and systems as safe as possible.
Defense in Depth: Securing Databases
Learn how to take a proactive approach to securing your databases against cybersecurity threats. Understand user authentication and roles to lock access to your databases down, protect your databases from integration threats like SQL Injection Attacks and Buffer Overflows, and learn how to manage backups and data encryption for the most secure system possible.
Defense in Depth: OT and IT Network Security
Learn how you can take a proactive approach to significantly reduce your cybersecurity risks by taking advantage of modern network security. This includes network segmentation, access and security controls, and asset management. A properly implemented network is an incredibly strong line of defense against attacks from the outside world.
Defense in Depth: PLC Security for Manufacturing and Critical Infrastructure
Learn how to secure your PLC and automation systems from cybersecurity threats. Discover best practices like leaving PLCs in RUN mode instead of REMOTE. Use version control systems to manage your PLC programs and ensure no changes are made without your knowledge, and ensure proper network segmentation
Defense in Depth: Version Control, Backups, and Disaster Recovery
Leverage version control systems, backups, and disaster recovery planning to reduce the risk of catastrophic cybersecurity attacks for your manufacturing facility and critical infrastructure projects.
Defense in Depth: SCADA Security for Manufacturing and Critical Infrastructure
Approach your IT/OT Infrastructure from a security focused mindset. With identity providers and two factor authentication to better secure access to your systems, limit access to your hardware to local threats, and risk from vendors deploying new code and projects to your systems.