Search Results

1,045 Results
Type
Resource Type
Industries
Partners
Products & Services
Threat Group
Topics
There are 1,045 results that match your search.
  • Deborah C. Hopkins is an accomplished C-suite executive and board member with extensive experience in finance, technology, cybersecurity, and innovation across multiple industries. She serves on the boards of Union Pacific, Marsh McLennan, and Bridge Investment Group.
  • Philip Jones is currently President of Phil Jones Consulting LLC based in Seattle, Washington, that provides expert advice and consulting services for organizations in the fields of energy and utility regulation, communications regulation, and cybersecurity compliance and regulation. He is continuing to work in the fields of market development and potential independent system operators (ISO’s) in the Western States, as well as in EV (electric vehicle) infrastructure and distributed energy resources
  • Jeff Williams is currently at Bain Capital Ventures as an Operating Partner in the Bay Area, where he focuses on infrastructure software and security. He has more than 25 years of operating experience helping early-stage enterprise software companies to scale and grow into market leaders.
  • Tom Lounibos is a six time successful Silicon Valley entrepreneur, investor, board member, and advisor to corporations and technology startups in the United States and Europe. Most recently, Tom co-founded SOASTA in 2006 and served as CEO until Akamai acquired the company in 2017. When it was acquired, SOASTA had become the Leading Performance Analytics Platform in the digital world.
  • Over her career, Ambika Gadre has led product innovation from inception to market leadership at companies like Bracket Computing (a pioneer in Cloud Workload Protection) and IronPort Systems (acquired by Cisco in 2007 for $830M), as well as $1.2B portfolio across three business units building Cisco’s Network Security, Content Security and Identity Management products and $1B+ mid-range workstation product line at Silicon Graphics.
  • Protect mining operations from cyber threats with Dragos’s industry-specific OT security platform. Ensure safety, compliance, and operational continuity across global mining sites.
  • Guide
    Use Dragos’ pre-deployment checklist to plan sensor deployments, improve OT collaboration, secure critical assets, and ensure efficient, successful Dragos Platform implementation
  • Guide
    Use Dragos’ checklist to verify Cisco SPAN configuration for OT traffic, including packet capture, analysis, and topology review before connecting Dragos Sensors.
  • Guide
    Start OT cybersecurity simply with Dragos’ guide on default passwords and internet-connected devices to reduce risk and secure critical systems step by step
  • Guide
    Download Dragos’ executive guide to understand OT systems, growing cybersecurity risks, and how to secure industrial operations amid digital transformation.
  • Guide
    Dragos protects global industrial infrastructure with purpose-built ICS/OT cybersecurity technology and services, backed by expert threat intelligence and industry knowledge.
  • Solution Brief
    The Dragos Platform helps federal agencies meet CISA Binding Operational Directive requirements for asset discovery, vulnerability detection, and reporting, strengthening overall OT/ICS security.
  • Solution Brief
    Dragos helps ICS/OT asset owners meet CMMC 2.0 requirements, minimize compliance barriers, and accelerate cyber maturity to protect DoD-sensitive operations from evolving threats
  • Protect your smart building infrastructure with industry-leading OT cybersecurity solutions designed specifically for building automation systems (BAS).
  • Solution Brief
    Learn how Dragos helps implement the UK NCSC Cyber Assessment Framework (CAF) 4.0, supporting IT and OT cybersecurity across critical infrastructure and public sector organizations.
  • Solution Brief
    Dragos and AWS combine on-prem Sensors with cloud-hosted Dragos Platform to provide scalable, flexible OT cybersecurity, managing risk across expanding ICS/OT environments
  • Solution Brief
    This solution brief outlines how these tools support risk management, threat detection, and incident response in the energy sector.
  • Uses LOTL techniques for reconnaissance, enumeration, lateral movement, and long-term persistent access.
  • Uses third-party connections from telecom providers for network access to industrial organizations.
  • Development of ICS malware to disrupt, degrate, and destroy industrial environments and processes.
  • Deep ICS environment information gathering, including operator credentials and industrial processes.
  • Credential capture and LOTL techniques employed for initial access, reconnaissance C2.
  • Spearphishing, exploiting SOHO routers, and leveraging custom capabilities to enable ELECTRUM operations.
  • Watering-hole and phishing attacks leading to ICS reconnaissance and screenshot collection.
  • Impersonates victims, exploits vulnerabilities, targets internet-exposed endpoints, and exfiltrates data.