Support
Let’s chat

Contact Us

Other ways to contact us:

+1 (877) 943-3363 (Toll Free)
+1 (617) 675-4206
info@industrialdefender.com
225 Foxborough Blvd
Suite 202
Foxborough, MA 02035
United States of America

What’s happening at Industrial Defender

Podcast: Episode #33 - Josh Varghese: Holistic, Scalable OT Network Design
Read More
Podcast: Episode #32 - Fred Gordy: Protecting the Safety and Resilience of the Buildings We Live and Work In
Read More
Podcast: Episode #31 - Matthew Scott: Protecting Legacy OT in Mass Transit
Read More
Podcast: Episode #30 - Clint Bodungen: Cybersecurity Simulation As A Video Game, With AI Adversaries
Read More
Podcast: Episode #29 - Ian Frist: Beyond Buzzwords, Building Effective Programs in OT Security
Read More
Podcast: Episode #28 - Michael Weigand - From Planes to Power Plants, Protecting The Intersection of Physical and Digital
Read More
Podcast: Episode #27 - Daniel Bardenstein:  Transparency and Trust With SBOM
Read More
The Latest with Australia’s Security of Critical Infrastructure Act (SOCI Act) and Critical Infrastructure Risk Management (CIRMP)
Read More
Getting Active The Right Way (In OT Security): Going Beyond the Passive Approach
Read More
Podcast: Episode #26 - Terence Gill & Roger Simmons: Bringing Texas Utilities Together to Strengthen The Grid Through Collaboration
Read More
The Philosophy and History Behind Compliance, And Its Necessity for Protecting Critical Infrastructure
Read More
Podcast: Episode #24 - Pete Mauro: Designing System Security Before ‘Cyber’ Became Part of Everyday Vocabulary.
Read More
Podcast: Episode #23 - Danielle Jablanski: Navigating the Multitude of OT Technologies Considering Interoperability, Reliability, and Centralization
Read More
Podcast: Episode #25 - Mollie Breen: Accelerating OT Security, Reliability and Efficiency
Read More
Podcast: Episode #21 - Michael Welch: Tying Resilience, Availability, Compliance and Cybersecurity Together Into a GRC Program
Read More
Taking the Tedious out of Compliance & Governance with Automated, Centralized OT Asset Data
Read More
The Distinction Between Asset Management and Asset Inventory in Operational Technology and Their Roles in Cybersecurity
Read More
Podcast: Episode #22 - Joy Ditto: The Evolution of Utility Cybersecurity with NERC CIP
Read More
Podcast: Episode #19 - Eric Olden: Navigating Identity Management, Security, and Resilience in Multi-Cloud Ecosystems
Read More
Podcast: Episode #17 - Roya Gordon: OT/IoT Security Research Evangelist
Read More
Podcast: Episode #18 - Phoenix: OT Security for Smaller Plants and Factories
Read More
Podcast: Episode #20 - Matt Wyckhouse: Behind the Cyber Shield: OT Security and the Importance of SBOM
Read More
Podcast: Episode #16 - Duane Laflotte: Simulating Real-World Attacks on OT with Red Teaming
Read More
Podcast: Episode #15 - Bryson Bort: Contextualizing Cyber Risks To Prioritize Security Efforts
Read More
Podcast: Episode #14 - Emilio Salabarria: Building Organizational Resilience through Cyber Assessments
Read More
Podcast: Episode #13 - Dan Gunter - How our Growing Ability to Process Data Affects Cybersecurity
Read More
Podcast: Episode #12 - Slade Griffin: Securing the Industrial World
Read More
Podcast: Episode #11 - Kurt Sanger
Read More
Podcast: Episode #10 - Tony Sager: Practicality Over Perfection and Simplifying Security Standards
Read More
Podcast: Episode #9 - Keeping People Safe is the Heart of Cybersecurity – A Conversation with Vice Admiral TJ White
Read More
Podcast: Episode #8 - Debbie Gordon: Practicing Cyber Safety Through Simulated Environments
Read More
Podcast: Episode #7 - Patrick Miller: Discussing the New INSM Requirements for NERC-CIP
Read More
Podcast: Episode #6 - Sean Plankey: Protecting Critical Systems Within the IT/OT Convergence
Read More
Podcast: Episode #5 - Lucian Niemeyer: Making Cyber Safety A Part Of Culture
Read More
FERC and NERC Look to Strengthen CIP Standards for Bulk Electric Systems
Read More
Podcast: Episode #4 - A Roundtable Discussion with Industrial Defender Leaders
Read More
Podcast: Episode #3 – Greg Valentine: You’re Compliant. Now Prove it.
Read More
Podcast: Episode #2 - Dennis Murphy: The Challenges With IT and OT Convergence
Read More
Podcast: Episode #1 - Welcome to PrOTect OT Cybersecurity Podcast
Read More
$858 Billion Defense Bill: The Critical Infrastructure & Industrial Cybersecurity Considerations
Read More
Hacked for the Holidays: Securing OT Infrastructure Against a Season of Increased Risk
Read More
Solving Cybersecurity Challenges in the Oil and Gas Industry
Read More
SIEM and Data Lakes in OT: New Challenges Bring New Choices
Read More
Modernizing Maritime OT Cybersecurity: Unique Obstacles and Opportunities
Read More
Don’t Give Compliance a Bad Name
Read More
A Guide to Configuration and Change Management in OT
Read More
A Breakdown of TSA’s Security Directive 1580-21-01A to Enhance Railroad Cybersecurity
Read More
One Destination, Multiple Paths: The 4 Data Collection Methods Needed for True OT Asset Management
Read More
What Is Shadow OT and Why Is It Important?
Read More
OT Asset Management Means Going Beyond OT Asset Visibility
Read More
3 Key Takeaways from Our 2022 State of OT Cybersecurity Research
Read More
TSA Issues Revised Security Directive Requirements for US Pipelines
Read More
China Is Targeting America’s Critical Infrastructure. Here’s What You Can Do About It.
Read More
How Quality Data Builds the Foundation for Machine Learning in Cybersecurity
Read More
How to Overcome Vulnerability & Patch Management Challenges in Your OT Environment
Read More
FBI’s Internet Crime Report Discloses 3,700+ Ransomware Attacks in 2021
Read More
Massive DDoS Attack Hits Israel
Read More
Cyber Incident Reporting for Critical Infrastructure Act Signed Into Law
Read More
Biden Administration Announces Plan for Electric System Cybersecurity
Read More
NIST Releases Draft of Cybersecurity Framework Profile for Ransomware Risk Management
Read More
An Overview of the Proposed Revisions to NERC CIP-004 and CIP-011
Read More
Meat Packing Giant JBS Hit with Cyberattack
Read More
DHS Issues Pipeline Cybersecurity Directive
Read More
An Overview of CISA’s ICSA-21-056-03 Advisory for Rockwell Automation Logix Controllers
Read More
Biden Extends Huawei Ban and Issues New Guidance on Improving Cybersecurity
Read More
Florida Water Treatment Plant Hit With Cyber Attack
Read More
How to Create an EDR/MDR Alternative for OT Systems
Read More
Managing Cybersecurity for Renewable Energy Resources
Read More
Summary of NERC CIP Requirements
Read More
Using the NIST CSF Security Controls to Prevent and Recover from Ransomware
Read More
What Is NERC CIP: The Ultimate Guide
Read More
7 Questions to Ask When Choosing an OT Cybersecurity Solution
Read More
OT Cybersecurity: The Ultimate Guide
Read More
Satellite Cybersecurity Act of 2022 Highlights Growing Importance of Satellite Networks in Critical Infrastructure
Read More
How to Centralize OT Security Data in a SIEM
Read More
What Impact Will the Proposed SEC Cybersecurity Rules Have on Public Companies?
Read More
OT Vulnerability Management: A Deep Dive
Read More
Asset Visibility vs. Asset Management
Read More
Understanding the Importance of Operational Technology Security in the Maritime Industry
Read More
NERC CIP Checklist for Identification and Categorization of BES Cyber Assets
Read More
Defending the Industrial Internet of Things
Read More
NERC CIP-007 R2: Why Is Patch Management So Hard & What Can We Do About It
Read More
Russia Has 400,000 Software Developers – What Does That Mean for the West?
Read More
Why Do Ransomware Gangs Target Private Equity Portfolio Companies?
Read More
Colonial Testimony Highlights Importance of Asset Awareness
Read More
A Risk-Based Approach to Cybersecurity Without Cyber Hygiene Is a Fool’s Errand
Read More
Addressing Pipeline Cybersecurity Regulations: Lessons from NERC CIP
Read More
Why Passive Network Monitoring Isn’t Truly “Passive”
Read More
Creating a Threat-Informed Defense with the MITRE ATT&CK for ICS Matrix
Read More
How a Security by Design Approach Might Have Stopped the Florida Water Facility HMI Attack
Read More
What Does the SolarWinds’ Sunburst Backdoor Mean for ICS?
Read More
A Guide to Preventative and Detective Controls for NERC CIP-013 Compliance
Read More
CodeMeter Vulns: Why Complete Software Inventory Data Is Critical for ICS
Read More
Establishing OT Cybersecurity Fundamentals with the CIS Controls
Read More
Making Smarter Risk Management Decisions with OT Endpoint Data
Read More
CVE-2020-1350 "Wormable" Flaw in Microsoft Windows Server Could Cause Major Issues for ICS/OT World
Read More
CVE-2021-44228 - Industrial Defender update on log4j
Read More
Video: Monitoring Building Management Systems with Industrial Defender and Splunk
Read More
Feature Focus: Building Management System (BMS) Security and Risk Monitoring
Read More
4 Benefits of Implementing a Cybersecurity Solution for Building Management Systems
Read More
ManuSec USA 2023
Event Details
Webinar: Surviving the Wave of Cyber Threats and Regulations: The Information Industrial Operators Need
Event Details
GridSecCon 2023
Event Details
Industrial Control Systems (ICS) Cyber Security Conference
Event Details
18th Annual API Cybersecurity Conference & Expo for the Oil and Natural Gas Industry
Event Details
Industrial Defender Appoints Power Industry Luminary Joy Ditto as Strategic Advisor
The Future of Asset Management in Operational Technology
Industrial Defender Launches Phoenix: A Quick-Start OT Visibility & Security Solution for Small to Medium Sized Operations
Industrial Defender Launches 7.5 Platform: A Unified Source for Operational Asset Data
Industrial Defender Partners with Nozomi Networks to Extend Endpoint Security Capabilities in Industrial Environments
Industrial Defender Appoints Gabe Authier as Chief Product Officer
Industrial Defender Appoints Aaron Crow as Chief Technology Officer
Industrial Defender Releases Inaugural State of OT Cybersecurity Research Survey Report
Industrial Defender Appoints Jay Williams as Chief Executive Officer
Rising threats spark US scramble for cyber workers
Forbes Expert Panel - 13 Tech Areas, Functions And Laws Facing New Or Potential Government Oversight
Colonial Pipeline was cyber wake-up call; Ukraine war is escalator
Industrial Defender Unveils New OT Vulnerability Management Solution, Immunity by ID™
Industrial Defender and GrayMatter Team Up to Equip Energy and Water Companies with Holistic Cybersecurity Defenses
Oil and gas industry scrutinized for weak cyber defenses
Need for critical infrastructure sector to shore up cyber defenses, amid geopolitical tensions
Industrial Defender Opens European Office in the Netherlands to Meet Increasing Global Demand for OT Cybersecurity
4 Tips to Secure the OT Cybersecurity Budget You Require
Why Cyber Due Diligence Is Essential to the M&A Process
Security leaders on how to cope with stress of Log4j
Industrial Defender Wins Gold Award for Best ICS/SCADA Security Product in the 2022 Cybersecurity Excellence Awards
Industrial Defender 7.4 Centralizes Data Collection, Offers Customized Risk Calculations to Secure OT Environments
Watch: Industrial Defender Featured in Congressional Transportation Committee Hearing
Industrial Defender and BridgeWare Partner to Bring Operational Technology Cybersecurity to Korea
Video: Digital Anarchist Interviews CEO Jim Crowley On National Security Directive
Podcast: CS2AI Becoming an Effective Leader in Technology Control Systems
Industrial Defender Delivers Industry-First OT Machine Learning Engine Using Both Network and Endpoint Data
Industrial Defender and Fetch Automation Partner to Deliver Operational Technology Cybersecurity and Compliance Solutions for Australia
Executive Q&A: Cyberattack Warnings and Trends
The Need to Protect Digital Infrastructure Highlights This ETF
Don't Let Cybercriminals Ruin your Merger or Acquisition–Follow This Expert's Advice
Russia, China, Cyber War, and Letters of Marque and Reprisal
Industrial Defender Partners with Diverse Solutions Engineering to Bridge the Gap Between Cybersecurity and Safety for Oil, Gas and Petrochemical Organizations
Industrial Defender CEO Jim Crowley Quoted on ToolboxTech.com
Industrial Defender Named Hot Company in OT Vulnerability Management by Cyber Defense Magazine in the Global InfoSec Awards
Industrial Defender ASM for Splunk App Delivers Deeper Contextual Data for Faster Response to Security Events
Industrial Defender Wins Gold Award for Best ICS/SCADA Security Product in the 2021 Cybersecurity Excellence Awards
Industrial Defender and aeCyberSolutions Join Forces to Elevate OT Cybersecurity Assessments for Energy and Maritime Companies
Rand McNally Selects Industrial Defender to Secure Its Industrial Internet of Things
Industrial Defender and Technomak Partner to Secure Critical Infrastructure in the Middle East
Industrial Defender Launches CopilOT Service™ to Address Cybersecurity Talent Shortage for Critical Infrastructure Companies
Industrial Defender Establishes IT-OT Integration Lab to Virtually Research, Develop and Evaluate ICS Cybersecurity Technologies
Industrial Defender and aDolus Partner to Secure ICS Supply Chain with Independent File Validation
Industrial Defender and FoxGuard Solutions Team Up to Transform Patch and Vulnerability Management for OT Security Teams
Industrial Defender and Waterfall Security Solutions Partner to Safely Transmit Cybersecurity Data in Operational Technology Environments
Industrial Defender Strengthens OT Asset Anomaly Detection Platform and Assisted Passive Network Monitoring Engine to Automate Risk Quantification and Reporting
Teleo Capital Completes Acquisition of Industrial Defender from CapGemini America
Webinar: Surviving the Wave of Cyber Threats and Regulations: The Information Industrial Operators Need
Watch Webinar
Webinar: Revisiting the Fundamental Mission of NERC-CIP: Improving Reliability & Security - with Special Guest Speaker: Joy Ditto
Watch Webinar
Webinar: Practical Strategies for Remote Access Security in Bulk Electric Systems: Tackling New NERC CIP-003-9 Requirements
Watch Webinar
Webinar: NIS2 Compliance for OT Operators - What You Should Be Doing Today
Watch Webinar
Webinar: Preparing for NERC-CIP's INSM Requirements
Watch Webinar
Breaking Down TSA’s Revised Security Directive: What Pipeline Operators Need to Know
Watch Webinar
Webinar: Shadow OT — Keeping the World’s Lights on With the OT Security Add-on for Splunk
Watch Webinar
Webinar: Managing OT Data
Watch Webinar
Webinar: Prepare and Prevent: Using the AESCSF to Prepare for the SLACIP Bill 2022
Watch Webinar
Webinar: Why Do Ransomware Gangs Target Private Equity Portfolio Companies?
Watch Webinar
Webinar: Predicting ICS and OT Cybersecurity Trends in 2022 & Beyond
Watch Webinar
OT Security 101 Training: How to Get Started
Watch Webinar
Webinar: Why Hasn't SOAR Taken Off in OT?
Watch Webinar
Webinar: How to Navigate Operational Technology (OT) Cybersecurity in Port Environments
Watch Webinar
Webinar - Breaking Down TSA’s Cybersecurity Requirements for Pipeline Operators: What to Do Now
Watch Webinar
Webinar - Squashing Spreadsheets: How to Orchestrate OEM Patch & Vulnerability Management
Watch Webinar
Webinar: What’s Hiding in Your Software? How SBOMs Reduce Supply Chain Risk
Watch Webinar
Webinar: Are You Using MITRE ATT&CK for ICS Correctly?
Watch Webinar
Webinar: How to Build a Cybersecurity Strategy for Your Building Management System
Watch Webinar