Join us April 6th following up on Robert M. Lee's testimony during the Senate Committee on Energy and National Resources Hearing.

Skip to main content

Catch ICS Attackers by Shifting to Kill Chain

Tracking the activity of nefarious groups affords defenders a deeper level of understanding that can be useful in not only understanding different types of threats but also in building defenses to withstand a cyber-attack.

Discover More Resources Using Keyword Tags
Threat Groups

Discover more resources.

Explore more resources to support you on your ICS cybersecurity journey.


They’re on the lookout for malware that can kill


Right Arrow

Ready to put your insights into action?

Take the next steps and contact our team today.