Guides & White Papers
Get the latest educational content from our experts who have decades of hands-on OT engineering and security experience.
- Implementation Guide: The 20 CIS Controls for ICS Cybersecurity
- Compliance Guide: Aligning to the Cybersecurity Capability Maturity Model (C2M2)
- OT Compliance Guide: NIST Cybersecurity Framework
- NERC-CIP Compliance Report Templates for Industrial Defender ASM
- NIST Compliance Report Templates for Industrial Defender ASM
- Generating Compliance Reports for the NIS Directive
- Cybersecurity for Combined Cycle Power Plants
- Cybersecurity for Multinational Gas & Electrical Distribution
- Industrial Cybersecurity in the Oil & Gas Industry
- Challenges and Solutions in Securing Critical Infrastructure for Utilities
The 20 CIS Controls are about getting cybersecurity done. This framework considers the factors of people, process and technology, and uses straightforward language to reflect that philosophy. Although these controls were originally developed by the Center for Internet Security (CIS) to guide enterprise IT cybersecurity and data protection, adoption among critical infrastructure companies is rapidly increasing because of increased cyber threats to industrial control systems (ICS).
The Cybersecurity Capability Maturity Model (C2M2) is a voluntary standard published by the U.S. Department of Energy (DOE) that helps organizations in the energy industry measure the maturity of their cybersecurity capabilities in a consistent manner. The C2M2 is comprised of 10 domains, which are all closely aligned with categories used by other industry cybersecurity standards, like the NIST Cybersecurity Framework.
The NIST Cybersecurity Framework is one of the most widely adopted voluntary standards in use today. Learn how to apply it in OT environments.
Learn how Industrial Defender can use the MITRE ATT&CK for ICS framework using a combination of agent, agentless or passive detection methods.
See 40+ NERC-CIP compliance report templates included by default with Industrial Defender ASM’s custom reporting module.
Learn how Industrial Defender ASM uses its out of the box reporting package to automate compliance reports for the European NIS Directive.
Learn how Industrial Defender worked with the plant commissioning team for a combined cycle power plant to provide complete cybersecurity asset monitoring and NERC-CIP compliance for a complex control system with dozens of vendors.
Learn how Industrial Defender’s ASM enabled a large electric and gas utility to unify their OT architecture for enhanced security monitoring and put in place network intrusion detection in order to monitor suspicious network activity.
The oil and gas industry has always carried a unique set of risks. Unlike most other sectors where protecting intellectual property (IP) takes a prominent role within the corporate risk management framework, the dangers associated with oil and gas places the security of people and the environment at the forefront of their risk policies. Download this white paper to learn how Industrial Defender helps contain OT-related risks for this critical industry.
Managing and protecting both the physical and cyber assets of any large organization is always a challenging proposition. Within the utilities industry, there are several factors that make this vital process even more demanding. Download the white paper to learn why Industrial Defender ASM® has become the de facto tool for security and compliance monitoring for utilities.