Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

New Dragos OT-CERT Provides Free Industrial Cybersecurity Resources

Industrial cybersecurity firm Dragos on Tuesday announced the launch of OT-CERT, a new initiative whose goal is to provide free cybersecurity resources for industrial asset owners and operators.

Industrial cybersecurity firm Dragos on Tuesday announced the launch of OT-CERT, a new initiative whose goal is to provide free cybersecurity resources for industrial asset owners and operators.

The OT-CERT (Operational Technology Cyber Emergency Readiness Team) aims to help members improve their cybersecurity posture, create cybersecurity programs, and reduce risk.

Dragos says the goal is to address “a serious gap in securing industrial infrastructure: the lack of OT-specific resources readily available to the industrial infrastructure community.”

Organizations of all sizes can become members of the new Dragos OT-CERT. Using the OT-CERT portal, members will have access to OT security best practices, security maturity assessments, webinars, workshops, and tabletop exercises.

The cybersecurity firm will also use the OT-CERT to inform vendors about vulnerabilities and other threats discovered by its researchers.

The initiative was launched in cooperation with the National Association of Manufacturers. Other initial partners include Rockwell Automation, Emerson and several information sharing and analysis centers (ISACs).

“Our goal for Dragos OT-CERT is to be a useful, relevant, and actionable community resource for industrial asset owners and operators by aligning them with the resources, training, partnerships, and community needed to make securing their OT environments possible,” said Dawn Cappelli, the director of OT-CERT.

Advertisement. Scroll to continue reading.

Related: New Open Source Tool Helps Identify EtherNet/IP Stacks for ICS Research, Analysis

Related: U.S. Warns Sophisticated ICS/SCADA Malware Can Damage Critical Infrastructure

Related: NIST Releases ICS Cybersecurity Guidance for Manufacturers

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...