ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Dragos

  • Industrial Cybersecurity for Executives

    90% of organizations had extremely limited to no visibility into their OT environments, including ICS networks, assets, and flow of information between them, according to Dragos Year in Review. OT security and IT security are different by nature. Download Dragos’ executive guide to industrial cybersecurity to learn about 7 key concepts.

  • Understanding the Challenges of OT Vulnerability Management and How to Tackle Them

    As threats increasing target OT assets, it’s essential to address vulnerability management best practices and understand how OT differs from IT environments. Download the whitepaper to learn about 10 ways to get started.

  • Examining ICS/OT Exploits: Findings From More Than a Decade of Data

    Public exploits affect every level of an industrial environment, providing adversaries pre-packaged tools capable of infiltrating and spreading through an ICS/OT network.Open this white paper to learn how to enable operators to remediate ICS/OT vulnerabilities more effectively.

  • CISO Customer Panel: Protecting Your OT Environment with Dragos

    In this webinar, hear directly from 3 Dragos customer CISOs about the challenges of protecting operational technologies and how they’re addressing them. Tune in to learn how Dragos approach to vulnerability management using severity scoring and prioritization.

  • MITRE Engenuity ATT&CK® Evaluations for ICS Retrospective

    Tune into this webinar to see how Dragos performed in a recent MITRE ATT&CK Evaluation and discover how the ICS community can benefit from these independent insights. Watch now to hear highlights from the Dragos team that participated.

  • YiR: ICS Threat Activity Group Report

    In this year’s annual Dragos Year in Review report, security analysts break down some of the most pervasive cyberthreats, vulnerabilities and trends related to Industrial Control Systems (ICS)/Operational Technology (OT). Read on to unlock the executive summary from the 2020 report.

  • SolarWinds Compromise and ICS/OT Networks Webinar Recording

    Watch this webinar to join a panel of cybersecurity experts at Dragos as they discuss the facts, impacts and remediation recommendations surrounding the SolarWinds compromise.

  • Preparing for Incident Handling and Response in ICS White Paper

    Whether or not it’s formally required, incident response plans (IRPs) play a critical role in preparing for and addressing security incidents. This white paper provides a comprehensive guide of considerations and advice for building an IRP in the industrial sector – read on to get started.

  • Ransomware in ICS Environments White Paper

    Ransomware has steadily become one of the most prevalent and destructive cyberthreats, especially across the industrial sector. Read this research report to dive deeper into ransomware observations, research findings, common attack patterns, predictions, and more.

  • 10 Ways Asset Visibility Builds the Foundation for OT Cybersecurity White Paper

    When it comes to streamlining operational technology (OT) strategies and uncovering new threats, continuous asset visibility is critical. Read this white paper to unlock 10 ways asset visibility builds the foundation for OT cybersecurity and explore how and why this should be done.

  • Mapping Industrial Cybersecurity Threats to MITRE ATT&CK White Paper

    Industrial control systems (ICS) are being targeted by sophisticated cyberthreats. The MITRE ATT&CK for ICS is a framework designed to aggregate known patterns about these threats in order to help organizations identify and mitigate them. Read this e-guide to learn more about MITRE ATT&CK for ICS.

  • Webinar Recording: IT and OT a Bridge Too Far?

    Watch this webinar to join Dmitri Alperovitch and Rob Lee as they discuss the unique challenges that IT and OT environments face, and how to streamline the tools, processes, and people to improve your overall security posture.

  • Bridging the IT and OT Cybersecurity Divide White Paper

    Historically, IT an OT cybersecurity efforts have been separate – but given today’s requirements, it makes the most sense to combine efforts. Read this e-guide to learn more about the differences between IT and OT security needs and discover how to bridge the IT/OT cybersecurity divide.

  • Industrial Cyber Risk Management White Paper

    Industrial cyber risk has emerged as organizations become increasingly reliant on digital communications channels. This comprehensive e-guide dives head-first into the world of industrial cyber risk management – offering guidance, insights, best practices, and more. Read on to get started.

  • Open Source Intelligence White Paper

    In this white paper, learn more about Dragos’ Open Source Intelligence (OSINT) collection risk framework – designed to help defenders better identify and restrict data from adversaries. Read on of a deep dive into the world of OSINT.

  • Cyber Threat Perspective Manufacturing Sector

    Dragos is a cybersecurity firm focused on protecting the manufacturing sector, particularly from industrial control system (ICS) threats. They publicly track 5 activity groups targeting ICS as well as various ransomware. Read Dragos’s Cyberthreat Perspective to learn more about these threats and what you can do to defend against them.

  • Manufacturing Threat Perspective

    Industrial control systems (ICS) are coming under greater threat in the manufacturing sector. Dragos is an industrial cybersecurity firm that protects IDS and operational technology (OT), reducing risk for manufacturers. View this webinar, presented by Dragos, covering the most prominent ICS threats in the sector.

  • YiR Webinar Recording: Threat Activity Groups

    Hear directly from 3 report authors of the Dragos 2020 Year in Review about the current ICS threat landscape. You’ll learn about the increase in ICS-focused threats, new threat groups that have emerged, industries most targeted in 2020, and more.

  • Dragos Platform and Neighborhood Watch Case Study: Trinity River

    In this case study, discover how Trinity River Authority, a water utilities provider in Texas, was able to partner with Dragos to address cybersecurity challenges they were facing related to a lack of visibility, personnel and insights – read on for the full story.

  • Dragos Securing The Critical Environment That Runs Data Centers

    In this case study, learn how engagement with Dragos’ Professional Services Team helped this major technology and services provider gain an increased understanding of ICS threats and how they impacted the firm’s data center cyber readiness.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences