A Guide to Your Certification Journey in ICS/OT Cybersecurity

A Guide to Your Certification Journey in ICS/OT Cybersecurity CAREER & LEARNING Certifications will not make you an OT cybersecurity expert. But the right sequence will accelerate the journey dramatically. Here is the ordered path I recommend, and what each certificate actually qualifies you to do on the job. Certifications will not make you an […]

You Don’t Always Need Tools to Protect Your OT Environment

You Don’t Always Need Tools to Protect Your OT Environment OT SECURITY FUNDAMENTALS Tools and technology add a real layer of security, but they are not an absolute prerequisite to improving your OT security posture. Before you buy anything, there are six things you can do that cost nothing and often matter more. Every OT […]

Rising Threats in OT Cybersecurity: Why the Risk Landscape Is Changing Faster Than Your Controls

Rising Threats in OT Cybersecurity: Why the Risk Landscape Is Changing Faster Than Your Controls THREAT LANDSCAPE The risk landscape for Operational Technology is increasing every day, and traditional controls are falling behind. Ransomware groups now specifically target manufacturing. Nation-state actors probe critical infrastructure. Your 15-year-old PLC was never designed for any of this. The […]

Cyber Governance in ICS/OT: Where Most Programs Quietly Fail

Cyber Governance in ICS/OT: Where Most Programs Quietly Fail GOVERNANCE Most OT security programs fail for the same reason: not missing technology, not missing tools, missing governance. A disciplined team with weak governance loses to an average team with strong governance every single time. Most OT security programs do not fail because the technology is […]

What Makes an OT Network Perfectly Air-Gapped? (And Why Yours Probably Isn’t)

What Makes an OT Network Perfectly Air-Gapped? (And Why Yours Probably Isn’t) OT SECURITY FUNDAMENTALS For the last few days I have watched debates over networks “not being air-gapped” even where everyone assumed they were. It got me thinking. What would an ideal air-gapped OT network actually look like? Here are the five hard criteria, […]

ICS/OT Incident Response: Why Your IT Runbook Won’t Save the Plant

ICS/OT Incident Response: Why Your IT Runbook Won’t Save the Plant INCIDENT RESPONSE Your IT incident response playbook says “isolate the affected host.” On a plant floor, isolating the wrong host shuts down production or trips a safety system. OT incident response is not a flavour of IT IR. It is a different discipline. Your […]

IEC 62443 Zones and Conduits Explained (Without the Standard’s Language)

IEC 62443 Zones and Conduits Explained (Without the Standard’s Language) STANDARDS If you have tried to read IEC 62443 directly, you know it is written in standards language: precise, thorough, and almost impenetrable on first read. Here is the zone-and-conduit model explained the way I explain it to engineers on their first day. If you […]

The EU Cyber Resilience Act (CRA): What Product Manufacturers Need to Know

The EU Cyber Resilience Act (CRA): What Product Manufacturers Need to Know REGULATION If your product has a digital component and you sell it into the EU, the Cyber Resilience Act applies to you, even if you are based in India, Taiwan, or the US. The deadlines are closer than most manufacturers realise, and “we’ll […]