Remote access and technical support for the OT environment
How to resolve this and what to consider?

Click on the graphics and get access this whitepaper

Many manufacturing companies rely on the support and assistance of specialized suppliers to maintain and update critical parts of equipment in the manufacturing environment – such as PLCs, HMI, SCADA applications, switches, etc.

This means that a “connection” must be made from a support technician with his own PC to the OT infrastructure. This article discusses security controls and aspects to consider in different scenarios.

The document contains references to aspects and controls that should be carried out in relation to div. standards such as NIST SP800-53 and IEC62443 3-3.

The effective CISO in manufacturing companies
Where should the focus be and how is it approached?

Click on the graphics and get access this whitepaper

Many CISOs and security managers in manufacturing companies are given responsibility for the OT infrastructure – along with IT and information security.

OT security has several differences from IT security that the CISO must be aware of when conducting risk assessments and formulating policies.

This whitepaper provides good advice and recommendations to the CISO on how to work effectively with OT security.

Securing industrial robots in an OT environment
How is this resolved and what to consider?

Click on the graphics and get access this whitepaper

Many manufacturing companies rely on robots in production.

This white paper helps you deal with cyber threats and risks so you can secure your industrial robot deployments against cyber attacks.

The white paper is written from an end-user perspective, and sees you (the reader) as an owner of robots.