April 7, 2026
Becoming an OT security specialist still means bridging cybersecurity and industrial operations. What has changed is that the field is now more mature, with clearer training paths, stronger standards such as IEC 62443, …
April 3, 2026
Many vendors already apply good cybersecurity practices, but often in an ad hoc manner. By using vendor validation services internally, they can align their terms and conditions with reality, formalize existing practice…
Feb. 15, 2025
When the NIS2 EU Directive came into effect, I wondered what the implications would be for security testing in industrial environments. After all, a large part of the NIS2 directive focuses on supply chain and network s…
Jan. 14, 2025
Within NIS2, one of the items to take into account in reaching compliance, is Supply Chain security.First of all of course is to make sure you know your risks through performing risks assessments, a tool to do so can be…
Dec. 30, 2024
While listening to one of the talks at the ISC-CPH conference back in 2022, I realized that nobody is talking about the practical side of performing cyber security tests in a FAT/SAT testing approach. It is not only per…
Dec. 30, 2024
This year it was the 3rd time visiting the ISC-CPH conference for me, one of the better ICS focused security conferences within Europe. This year again as attendee compared to last year being a presenter (Last year's ta…
Dec. 30, 2024
Overview of ISC-CPH November 2024 - Day 1...
Currently there are a lot of good developments within OT Security, on better and more useful than the other, yet this is up to you to decide what is bes…
Dec. 30, 2024
Overview of ISC-CPH November 2024 - Day 2
A good network monitoring will be able to verify if the network segmentation is done pr…
April 30, 2024
Hardening is one of the many ways to protect your systems and environment from attack. Be it remote or insider threats that you are protecting against. However, with the increasing connectivity between different IT and…
Nov. 22, 2023
While preparing for a talk on Industrial Security Controls earlier this year for students of an Executive Master in CyberSecurity, I reflected on these controls and their presence within the different OT environments I…