2019 Articles

Can We Share Information? (Log4j and CODESYS)

It started with Bryan Owen’s reply to a tweet. https://twitter.com/bryansowen/status/1523406471551094784?s=20&t=jFo6yRWaUeVYwCE2hAme6w Why after all these years of CODESYS security fails, although one could contend they are no worse than their peers, do so...

read more

Hope In The ICS Security Workforce

We had the pleasure of hosting ~800 ICS security professionals in Miami South Beach last week at S4x22. While the record number of attendees was a good sign of the growing attention being paid to ICS security, it was the composition of the attendees that is even more...

read more
Sprinting To Secure The US Power Grid

Sprinting To Secure The US Power Grid

Last week a Bloomberg article covered the Biden Administration's plan for a 100-day sprint to secure the power grid. I'll comment on the three focus areas the article lays out and more broadly on 100-day efforts. Monitoring The Grid And Sending Data To The USG the...

read more
Securing Closed Loop ICS Cloud Services

Securing Closed Loop ICS Cloud Services

Technology Is Available ... Is The Will There? Bryan Owen of OSIsoft defined, and perhaps coined, ICS cloud services as being open loop or closed loop. Securing open loop cloud services is simple. Just push the data out to the cloud for predictive maintenance,...

read more

The Future of the ICS Product Market

Most of the activity in the ICS security product market has been around passive solutions that create asset inventories and detect cyber incidents. It is a bit astounding that the market and solutions will look almost completely different in two to five years than...

read more
Podcast: Interview with Marina Krotofil

Podcast: Interview with Marina Krotofil

http://traffic.libsyn.com/unsolicitedresponse/2019-14_Marina_Krotofil.mp3 Marina Krotofil has been able to view the ICS security world from a number of perspectives. Beginning as an academic; working for an ICS vendor (Honeywell); working for an ICS security products...

read more

Podcast: Sean McBride and ICS Cybersecurity Education

http://traffic.libsyn.com/unsolicitedresponse/2019-13_Sean_McBride.mp3 In this episode Dale interviews Sean McBride. Sean was on some of the earliest Unsolicited Response episodes when he was a Founder and Analyst with Critical Intelligence, the first ICS Threat Intel...

read more

Podcast: An Interview with Patrick Miller

http://traffic.libsyn.com/unsolicitedresponse/2019-12_Miller.mp3 I took the opportunity to interview Patrick Miller while we were both in Sochi speaking at the Kaspersky KICS event. Patrick is a Founder and Managing Partner of Archer International, and he has been a...

read more
Podcast: S4x19 Closing Panel

Podcast: S4x19 Closing Panel

http://traffic.libsyn.com/unsolicitedresponse/2019-11_Closing_Panel.mp3 The S4 Closing Panel is always a candid discussion on where the community is in securing ICS, where we are succeeding and where need to do better. This year I was joined by Rob Lee of Dragos and...

read more
Book Review: Security PHA Review

Book Review: Security PHA Review

Rating: ★★★★☆ Tweet Length Review: Short and effective description of a process to add intentional cyber attacks to a Process Hazards Analysis (PHA). Includes basic process engineering examples that are highly useful for readers with an IT or IT security background....

read more

Podcast: Rockwell Automation Cybersecurity

In this episode of the Unsolicited Response Podcast I interview Megan Samford and Rick Cherney of Rockwell Automation. http://traffic.libsyn.com/unsolicitedresponse/2019-10_Rockwell_Automation.mp3 We cover two main topics. First, we discuss how they are dealing with...

read more

Forescout’s Strategy Post SecurityMatters Acquisition

An Interview With Brian Proctor http://traffic.libsyn.com/unsolicitedresponse/2019-9_Forescout.mp3 Forescout's acquisition of SecurityMatters for $113M in cash was the first major exit from the OT Detection Space (or broader passive monitoring market as you will hear...

read more
Podcast: An Interview With Jonathan Homer of DHS

Podcast: An Interview With Jonathan Homer of DHS

In this episode, I interview Jonathan Homer, the Chief of the Industrial Control Systems Group / Hunt and Incident Response Team at DHS. http://traffic.libsyn.com/unsolicitedresponse/2019-8_DHS.mp3 We discuss: What changes will asset owners see with the creation of...

read more

Podcast: ICS Firewall Market & Scoring SW/FW

An Interview with Eric Byres http://traffic.libsyn.com/unsolicitedresponse/2019-7_Eric_Byres.mp3 The ICS Detection Market has achieved almost all of the funding and attention the last two years, including my analysis. Last month Bayshore Networks announced and got...

read more

ICS Detection Endgame

Hypothesis: The current ICS cyber incident detection solutions will not exist in three years. They are interim solutions, and competitors in the market need to identify and implement an endgame strategy as they continue to run very fast with the current solution. In a...

read more
Podcast: Truth or Consequences

Podcast: Truth or Consequences

Consequence Based Techniques for ICS Risk Management http://traffic.libsyn.com/unsolicitedresponse/2019-6_Truth_or_Consequence.mp3 This recording is from a panel discussion on understanding and reducing the consequence side of the risk equation (risk = consequence *...

read more

Podcast: Maritime Cybersecurity

In a recent article a researcher proclaimed it's "not hard for a hacker to capsize a ship at sea". This was quickly followed by the Viking Sky cruise ship having its engines shut off due to a sensor reading. Episode 2019-5: Maritime Cybersecurity Not knowing much...

read more
Book Review: Secure Operations Technology

Book Review: Secure Operations Technology

Summary: Andrew Ginter makes a plainspoken case for his view of what Secure Operations Technology (SEC-OT) means. The key point that diverges from the mainstream of ICS security thought is: Forbid firewalls as connection from ICS to IT networks – permit only...

read more
Podcast: RSA Conference / ICS Village Report

Podcast: RSA Conference / ICS Village Report

  I went back to the RSA Conference for the first time in over a decade. Here is my 25-minute report on the event for those considering attending or participating in the future. http://traffic.libsyn.com/unsolicitedresponse/RSA_2019-4.mp3   Includes: the...

read more

Analysis of Dragos Platform Strategy … The Real Difference

What is Dragos? They have a diagram on their site that shows three business areas: Threat Intelligence Threat Operations Center (which are consulting services including incident response) Platform (their detection and response product) Dragos currently dominates...

read more
An Interview with Robert Graham

An Interview with Robert Graham

I interviewed Robert Graham on the S4x19 Main Stage. Robert has an illustrious career in cyber security products including the creator of BlackIce and the first network IPS. We brought him to the S4 Stage for his contrarian views....

read more

Organization and Expectations for ICS Detection

The cases being made in ICS owner / operator companies for the "best" organizational structure for ICS detection, and response, are heartfelt, well considered and often at great variance with one another. The case for Operational Technology (OT) SOC vs. Enterprise SOC...

read more

ICS Security Patching: Never, Next, Now

This week we published the S4x19 video on three proposed revisions to the Common Vulnerability Scoring System (CVSS) for ICS vulnerabilities. It's worth a watch and hopefully it will be one more trigger for ICS-CERT to earn the "ICS" in their title and add ICS...

read more

Is The Purdue Model Dead?

This episode of the Unsolicited Response Podcast features a discussion on the S4x19 Main Stage with Brad Hegrat, Joel Langill and Dale Peterson. The question: Is the Purdue Model Dead? http://traffic.libsyn.com/unsolicitedresponse/2019-2-Final-2-Purdue.mp3   The...

read more
Post Game Analysis: S4 ICS Detection Challenge

Post Game Analysis: S4 ICS Detection Challenge

How do you pick between 20+ ICS Detection and Asset Inventory solutions who are all claiming to be the best? The ICS Detection Challenge was designed to provide asset owner / potential customers with an unbiased technical comparison. S4x19 ICS Detection Challenge As...

read more

20 Years of Digital Bond

In October 2018, Digital Bond turned 20. I thought before moving on to 2019 and starting our 21st year I’d reminisce a bit and thank the many employees over the past 20 years (see the list at the end of the article). Roger Collins and I started Digital Bond with $75K...

read more

UPCOMING EVENTS

S4x24 ... 4 - 7 March 2024 in Miami South Beach

Save the date. For the biggest and most future focused on ICS Security Event.

 

 

2019 Articles

by | Jul 12, 2019