Dams Sector Cybersecurity Program Guidance

May 1, 2019

This document was developed with input, advice, and assistance from the Dams Sector Cybersecurity Working Group and council members of the Dams Government Coordinating Council (GCC) and Sector Coordinating Council (SCC), which included representatives from the public and private sector. The Dams Sector Cybersecurity Program Guidance consolidates effective industry practices into a framework for owners and operators to develop and/or improve a cybersecurity program. The document is primarily intended as a resource to small and medium-sized owners and operators with varying levels of cybersecurity knowledge. However, the information may be useful to all Dams Sector owners and operators, regardless of size.

Spotlight

TEKWISSEN

Founded in 2009 and headquartered in Ann Arbor, MI, TEKWISSEN ® provides a unique portfolio of innovative capabilities that seamlessly combines clients insights, strategy, design, software engineering and systems integration. Our tightly integrated offerings are tailored to each client’s requirements and span the services spectrum from Application Development/Maintenance, testing, Technology Consulting & staffing.

OTHER WHITEPAPERS
news image

The State of Zero Trust Security 2022

whitePaper | September 27, 2022

The philosophy of Zero Trust security—“never trust; always verify”—has certainly struck a chord. It took decades for organizations to move past the basic castle andmoat security mindset, and to accept that in a cloud world, there is no perimeter to defend, and intruders are always on our networks.

Read More
news image

Security Challenges for the Energy Industry on the Industrial Internet of Things

whitePaper | November 4, 2022

The Industrial Internet of Things (IIoT) is a relatively new computing paradigm that combines machine learning (ML), artificial intelligence (AI), remote sensors, and device-control applications (or “apps”) to help businesses and industry achieve more efficient and reliable operations. In the oil and gas field, IIoT is used for a variety of purposes—from fully autonomous pump and valve control to remote sensing of security breaches at isolated wellsites.

Read More
news image

Cisco Secure and the NIST Cybersecurity Framework

whitePaper | December 6, 2022

Cybersecurity can seem overwhelming, and there’s plenty of long to-do lists. The Center for Internet Security (CIS) has the Critical Security Controls, the International Organization for Standardization (ISO) has its 27000-series publications, and ISACA manages its COBIT 5 framework. Layer those atop compliance mandates like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach Bliley Act (GLBA) — and it’s often hard to know where to start.

Read More
news image

Autodesk® Fusion 360 Security Whitepaper

whitePaper | October 27, 2022

Autodesk® Fusion 360™ is the first 3D CAD, CAM, and CAE tool of its kind. It connects your product development process in a single cloud-based platform that works on both Mac and PC. The Fusion 360 tools enable fast and easy exploration of design ideas with a secure and integrated concept-to-fabrication toolset that extends to include web browsers and mobile devices.

Read More
news image

The ‘Zero Trust’ Model in Cybersecurity: Towards understanding and deployment

whitePaper | August 24, 2022

In the last couple of years, “zero trust” has gained significant traction in the cybersecurity realm as a means to protect networks and increase security across organizations. In part, the growing popularity of this security model can be attributed to the shift to hybrid working practices that call for a more secure work environment whether on- or off-premises.

Read More
news image

Fujitsu PRIMERGY Server Security Overview

whitePaper | May 22, 2023

During the last few years server security has become a key building block for end-to-end security. We see strongly increasing cyber-attacks on server infrastructure, which results in an intense need for server security. This whitepaper presents an overview of the security features which are available for PRIMERGY server.

Read More

Spotlight

TEKWISSEN

Founded in 2009 and headquartered in Ann Arbor, MI, TEKWISSEN ® provides a unique portfolio of innovative capabilities that seamlessly combines clients insights, strategy, design, software engineering and systems integration. Our tightly integrated offerings are tailored to each client’s requirements and span the services spectrum from Application Development/Maintenance, testing, Technology Consulting & staffing.

Events