Dams Sector Cybersecurity Program Guidance

May 1, 2019

This document was developed with input, advice, and assistance from the Dams Sector Cybersecurity Working Group and council members of the Dams Government Coordinating Council (GCC) and Sector Coordinating Council (SCC), which included representatives from the public and private sector. The Dams Sector Cybersecurity Program Guidance consolidates effective industry practices into a framework for owners and operators to develop and/or improve a cybersecurity program. The document is primarily intended as a resource to small and medium-sized owners and operators with varying levels of cybersecurity knowledge. However, the information may be useful to all Dams Sector owners and operators, regardless of size.

Spotlight

Ursus, Inc Talent, Services & Solutions

Ursus, Inc. is a privately held leader in providing business and technology staffing consulting services. Our professionals bring bold, fresh thinking combined with technology, business, and industry expertise to help fuel transformation and growth for our clients and their customers. We place the highest priority on understanding unique client needs first, ensuring mutual, best-fit success and integration of people, service, and solutions.

OTHER WHITEPAPERS
news image

The Trusted Data Security Solution for Cyber Recovery

whitePaper | December 30, 2022

Digital transformation has brought significant benefits to organizations, including increased agility and flexibility, but it has also led to a rise in cyber attack vectors. 66% of organizations were hit with ransomware within the last year, according to a 2022 Sophos survey. The widespread adoption of cloud services and Software-as-aService (SaaS) applications has expanded the attack surface, making it more challenging to manage and secure data. Additionally, the increased use of mobile devices and remote work have made it easier for cybercriminals to launch attacks from anywhere, at any time.

Read More
news image

Password Safe Cloud 22.2 Security Whitepaper

whitePaper | August 5, 2022

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to their organization. BeyondTrust can help your support organization stay secure and compliant, while improving the efficiency and success of your organization with a better end-user support experience.

Read More
news image

Project Blackfin: Automated Breach Detection Using Intelligent Agents

whitePaper | December 4, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes communication and replication of learned states between these models.

Read More
news image

5 Top Residential Security Trends to Watch in 2023

whitePaper | February 24, 2023

The security industry has gained millions of households due to the explosion of DIY offerings and COVID-19. Households sought stability and safety during COVID and were able to find low-cost solutions. In 2022 though, home security system adoption slowed with home security ownership dropping from 2021 levels. The industry’s top players, however, are achieving record revenue in 2022 and that shows no signs of slowing. The rebound of professional installation since 2020 and recent solar system and service offerings have generated robust revenue growth.

Read More
news image

INDUSTRIAL CYBER RISK MANAGEMENT

whitePaper | May 21, 2021

Critical infrastructure owners and operators have managed industrial risk for hundreds of years. This risk is usually measured in impact to health, safety, and reliability. As these industrial systems become increasingly digitized, so does the risk. What were once seen as isolated, manual processes have become reliant on communication networks and digital devices.

Read More
news image

Navigating the Changing Cyber Landscape in Australia

whitePaper | April 13, 2023

Those high profile data breaches led to a swift response from the Government with the penalties for serious or repeated privacy breaches increased from $2.22 million to a minimum of $50 million at the end of December. Since then, the Government has released the Privacy Act Review Report and the 2023-2030 Australian Cyber Security Strategy that signpost a significant shift for Australia’s cyber landscape. Critical infrastructure; personal information; cyber security; dealing with ransomware attacks – all are likely to be shaken up.

Read More

Spotlight

Ursus, Inc Talent, Services & Solutions

Ursus, Inc. is a privately held leader in providing business and technology staffing consulting services. Our professionals bring bold, fresh thinking combined with technology, business, and industry expertise to help fuel transformation and growth for our clients and their customers. We place the highest priority on understanding unique client needs first, ensuring mutual, best-fit success and integration of people, service, and solutions.

Events