Premature Consensus In OT Security Made Worse With AI

Premature Consensus In OT Security Made Worse With AI

We know very little about what security controls and consequence reduction actions reduce the number and impact of incidents that includes an OT cyber component. Read that again. We have hypotheses. I have hypotheses, and wrote a book on the topic A Year In OT...

Week 49: Evaluate And Verify Backups

ICS in OT have achieved very high availability due to redundancy. This high availability decreases the frequency that backups are needed for recovery, and this often leads to less rigor in the backup process. This week’s task is to verify you can answer yes to the...

Week 48: Review Or Create Your Cyber Narrative

Your company has had a cyber incident that impacts OT and Operations. You may need to communicate with your customers, investors, media, regulators, government agencies and others. While the details of the cyber incident will affect what is said, your company should...

Week 47: Identify The OT Incident Response Team

Regardless of your OT incident response plan status, non-existent to mature and tested, this week’s task is to identify the OT incident response team members. If you had an OT cyber incident, who would you involve in the response? List them and their roles / area of...

Week 46: Validate Detection And Call Outs

Does your detection work? Will it identify aspects of a cyber attack as designed? Will it present the events / alerts / information to the appropriate role? Does that role understand their Call Outs? This week you will test each detection source and each Call Out...

Week 45: Create Cybersecurity Call Outs

Call outs are common in Operations. If this happens, contact this person, take this action, watch this reading, order this maintenance, … Your task this week is to create OT detection call outs, the beginning of response. These call outs are actions assigned to roles....
Two OT Security Debates

Two OT Security Debates

We’ve had some great debates on the S4 stage. One of my favorites was a debate I had with Eric Byres entitled Is Eric Byres a SCADA Apologist or a SCADA Realist?. The key to a good debate is to find an issue where a 10% – 25% minority of the audience has a...

Week 43: OT Security Log Management

Security logs are essential in incident response and after incident investigations. Do you know: What OT security related logs you have? where they are? where they’re archived?  who is responsible for the log?  would the log still be available after a cyber incident? ...