Get acquainted with a methodology to proactively develop a security strategy, tailored to your organization.
In today’s society it’s become common practice to work and follow up business from home or a remote location. The flexibility which some employees have…
The latest ‘RSA Cybersecurity Poverty Index’ – an annual maturity self-assessment completed by a variety of organisations all over the world – shows that 67%…
Threat modeling is as a discipline that fits really well in ICS and OT environments, to design and secure connected systems in a way that…
Part of training people into becoming ICS security specialists is providing them the opportunity to test or train certain things in a ‘safe’ environment. Which…
After attending the fifth Cyber and SCADA Security for Oil & Gas Industry conference, it became apparent lots of companies are having a hard time…
The energy clusters Flux50 (Flanders) and TWEED (Wallonia) organize the Belgian Pavilion at European Utility Week in Paris from 12 until 14 November 2019.
We compiled a list of 5 essential cybersecurity practices that you absolutely must implement to get the basics of cybersecurity right.