Group 30

Resources

Check out our content relating to all things connectivity, security and performance in critical industries 

Featured content 

Group 30
IT OT Webinar
Screenshot 2024-09-11 154317

The Crucial Role of Data and IT Feedback in OT Systems

Join us for an insightful and practical webinar exploring cases of integrating IT and OT systems.

Screenshot 2024-08-19 120843

Threat Intelligence and Mitigation for CCTV Systems

Research on threats to CCTV systems and strategies to mitigate risks, common vulnerabilities and attacks.


Screenshot 2024-08-19 120912

Voices from the frontline of industrial OT: David Ariens 

Join our webinar to explore emerging security trends and innovations in the defense sector. 

Filter resources

Group 30
ant-rozetsky-SLIFI67jv5k-unsplash
Article

10 Steps to Secure Industrial Environments

This article is a 10-step strategy, designed to guide industrial companies to enhance cybersecurity measures

 
saketh-P4w7ErpthZ4-unsplash (1)
Article

11 New Controls in ISO/IEC 27001:2022

Discover and implement the 11 new ISO 27001 controls from October 2022 before your next audit!
IT OT Webinar  (1) (1)
Expert Interview

Bridging the Gap: The Crucial Role of Data and IT Feedback in OT Systems

Key takeaways from this insightful session, offering guidance on how to navigate the complexities of IT/OT integration
1.1
Guide

Cybersecurity Checklist for Manufacturing

A checklist tool to help manufacturing leaders assess cybersecurity, ensure compliance, and reduce risks across IT and OT environments
pexels-pixabay-236705
Webinar Webinar - On Demand

Cybersecurity Fundamentals: Protection For Manufacturers

Discover practical strategies to protect manufacturing operations from evolving cyber threats
pexels-pixabay-236705-1 (1)
Article

Decoding OT Micro-segmentation

Increase security and value in industrial environments with OT micro-segmentation.

ipad_with_cover_transparent
Whitepaper

DLAN: A New Approach to Industrial Security 

Analysis of traditional security approaches, new DLAN concept, core principles, implementation strategies
Edge Computing to Secure Restricted Environments
Webinar - On Demand Webinar

Edge Computing to Secure Restricted Environments

Join our webinar to explore emerging security trends and compliance in the defense sector.

18 controls from CIS (4)
Article

Everything you need to know about CIS Controls V8

Explore the CIS Controls V8 guide with detailed analyses of the latest updates and all 18 controls for robust cybersecurity.
the-four-step-security-incident-response-1
Article

Four-Step Security Incident Response Process

Learn the 4-Step Security Incident Response Process: detect, analyze, contain, and eradicate threats.
Group 297
Guide

Frostygoop Malware Report: A Comparative Analysis

This guide offers a comparative analysis of the FrostyGoop malware scripts, reviewing findings from prominent ICS reports 
pexels-tiger-lily-4481534-1 (1)
Article

Harnessing the power of PLC Data

In the interconnected world of industrial automation the importance of PLC data is paramount and should be leverage !
sql-lite
Article

Hello SQLite !

We decided to open source one of our internal libraries to the world: the driver we use for data persistence.
cybersecurity-playbooks
Article

How to implement the CIS Controls 8 “Audit Log Management”

Get detailed analyses of the latest updates and all 18 controls for robust cybersecurity.

 
log-analytics
Article

How to perform Log Analysis ?

Discover log analytics: streamline troubleshooting, enhance security, optimize performance, and make data-driven decisions.
ot-security-manufacturing
Article

Importance of OT Security in Manufacturing Industry

Explore OT security strategies to protect your manufacturing sites from cybersecurity threats with best practices.

 
christopher-burns-Kj2SaNHG-hg-unsplash (1)
Article

ISO 27001:2022 Annex A Controls - Latest Updates

Detailed look at ISO 27001:2022 changes: 11 new controls, 4 categories (down from 14), and 5 new features introduced.
Group 256
Expert Interview

Navigating Cybersecurity Compliance in the Defense Sector

Key insights from a recent webinar hosted by Trout, featuring a panel of cybersecurity experts in the defense sector
thisisengineering-raeng-ZPeXrWxOjRQ-unsplash (1)
Article

OT Automation's Rise and IT/OT Convergence

Complete guide to OT Automation: How IT/OT convergence drives development and simplifies automation with new tools.
cis 8 controls
Article

OT Compliance : Navigating Regulations and Standards

All you need to know about OT Compliance : ISA/IEC 62443, NIST SP 800-82, CIS Controls…

 
ot-monitoring-2
Article

OT Monitoring: Key to Modern Industrial Success

Monitoring OT systems is becoming a crucial pillar of modern industrial management.
Group 256 (1)
Expert Interview

Practical Strategies for Securing Industrial Environments

Key takeaways from this insightful session, exploring the top strategies and practical advice for securing industrial environment
Tree Nodes
Article

Rx, the UI Framework from Trout

This framework offers a faster, more efficient development experience for front-end development.
pexels-pixabay-256297-1
Webinar - Live Webinar

Simplify Your Path to CMMC Level 1 & 2 Compliance

Learn from registered CMMC practitioners how an enclave approach can simplify CMMC Level 1 and 2 compliance
Strategies for Securing Industrial Environments
Webinar - On Demand Webinar

Strategies for Securing Industrial Environments

Join us for a practical webinar about network performance and cybersecurity solutions for the industrial world
A.Whitepaper 10Steps (1)
Whitepaper

Strategies to Strengthen Industrial Resilience

Explore 10 fundamental cybersecurity strategies and proactive measures for industrial contexts.
pexels-tiger-lily-4481534
Article

The Complete Guide about OT Security

An analysis of the OT security concept, highlighting the unique challenges of protecting industrial systems.
IT OT Webinar
Webinar - On Demand Webinar

The Role of Data and IT Feedback in OT Systems

Join us for an insightful and practical webinar exploring cases of integrating IT and OT systems.

Threat Intelligence and Mitigation for CCTV Systems
Whitepaper

Threat Intelligence and Mitigation for CCTV Systems

Research on threats to CCTV systems and strategies to mitigate risks, common vulnerabilities and attacks.
CCTV Threat Intel
Guide

Threat Intelligence and Mitigation for CCTV Systems

Research on threats to CCTV systems, strategies to mitigate risks, common vulnerabilities and recent cyber-attacks.
Group 271
Expert Interview

Threat landscape for Operational Technology (OT)

Industry leaders discuss the evolving OT cybersecurity challenges facing industrial organizations
jefferson-santos-9SoCnyQmkzI-unsplash (1)
Article

Understanding Playbooks in Cyber Security

Learn what a cybersecurity playbook is, its functions, and the different types. Discover the essentials now!
ATIM
Expert Interview

Voices from the frontline of OT: Caitriona Modran

Insights from Caitriona Modran on strategies for SMEs to adopt advanced technologies and the importance of connectivity to industrial companies.
IT OT DAVID ARIENS
Expert Interview

Voices from the frontline of OT: David Ariens

Insights from David Ariens on the IT/OT convergence and how the two can be leveraged to improve productivity

Rectangle 28
Expert Interview

Voices from the frontline of OT: Enda Cafferky

Insights from Enda Cafferky on digitalisation efforts within Merit Medical in the Life Science Sector

 
Florian Doumenc
Expert Interview

Voices from the frontline of OT: Florian Doumenc

Florian Doumenc discusses digital transformation, security, and future trends in industries
Rectangle 26
Expert Interview

Voices from the frontline of OT: John Coffey

John Coffey emphasizes the importance of integrating security into a company’s strategic and operational planning

 
Rectangle 27
Expert Interview

Voices from the frontline of OT: Paul Sheedy

Insights from Paul on the digitisation within smart buildings to enhance sustainability and productivity

 
plc-data
Article

What are the ISO 27001 Logging Requirement ?

Control 8.15: Produce, store, protect, and analyze logs of activities, exceptions, faults, and relevant events.
what is a plc
Article

What is a PLC & How does it works ?

A Programmable Logic Controller (PLC) is a digital computer used in industrial automation to monitor and control processes.
ot-security-assessment
Article

Why and how to conduct an OT security assessment ?

This guide details all the critical step to conduct an effective OT security assessment. Leveraging the ISA 63443 Standard the methodology.

 
ot-security
Article

Why securing OT ICS Systems is critical ?

Explore 10 essential steps for effectively securing ICS/OT systems, addressing their unique challenges in this detailed guide.

07 Secure 1-1

Market Insights Straight to Your Inbox

Get content relating to all things connectivity, security and performance in critical industries 

Accelerate and secure your industrial sites

At Trout, we help our customers build agile and secure industrial networks, giving them a strong foundation for their digitalization efforts.