ICS/OT Regulation, Part 2 - Jim Gilsinn - SCW #64
Recorded March 9, 2021Industrial Control Systems (ICS) and Operational Technology (OT) have risks and consequences in the real world, such as
ICS/OT Regulation, Part 1 - Jim Gilsinn - SCW #64
Recorded on March 9, 2021Industrial Control Systems (ICS) and Operational Technology (OT) have risks and consequences in the real world, such
Meeting NIST Requirements while using SaaS Software.
December 31, 2017, Organizations who process, store, and transmit Controlled Unclassified Information (CUI) need to comply with NIST Special Publication 800-171. The question organizations need to consider is what
“WannaCrypt (a.k.a. WannaCry) is the name of a malware used in the May 2017 global ransomware attack targeting Microsoft Windows operating systems via known vulnerabilities leaked by The Shadow Brokers.
Through
Healthcare Providers
As healthcare providers rely more and more on evolving technologies to store and transmit their data, compliance has become an increasingly complex landscape to navigate. Managing the security requirements
Welcome to Red Lion. Our doors are open!
Today marks the first day that Red Lion is officially open for business. We welcome all companies that need solutions to their security
Translate »
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.