Cybersecurity IAM in Operational Technology: How and Where to Make it Work Eli HajjarJustin TurnerDerek Dunkel-JahanTighFebruary 7, 2024
Consumer Products and ServicesCybersecurity How Will Upcoming Transportation Security Administration Regulations Impact the Aviation Industry? Derek Dunkel-JahanTighHeather GrissomApril 19, 2023
Cybersecurity Rail Strike Averted! But How Will Upcoming Transportation Security Administration Regulations Impact the Railroad Industry? Derek Dunkel-JahanTighHeather GrissomDecember 6, 2022
Security Maximizing OT Security and Resiliency Through a Risk-Based Framework Derek Dunkel-JahanTighJune 23, 2022
CybersecurityEnergy and Utilities FAQs for Interpreting the PIPEDREAM Malware Derek Dunkel-JahanTighMay 19, 2022
Cybersecurity Ransomware Resiliency Road Map: Lessons Learned From the Colonial Pipeline Attack and Recent TSA Directives Tyler ChaseDerek Dunkel-JahanTighNovember 3, 2021
CISO NextCybersecurityPrivacy Tech Leaders Rephrase the Conversation to Proactively Detect Sensitive Data and Apply Controls Chip WolfordJonathan TrillosDerek Dunkel-JahanTighMarch 31, 2021
CybersecurityRisk and ComplianceSecurity Three Steps to Build an Effective Industrial Control Systems Security Program Terry JostJustin TurnerDerek Dunkel-JahanTighJanuary 4, 2021