Week 39: Review OT User Accounts

Week 35 addressed user accounts for cyber assets at unmanned sites. This week you will perform a user account review on all OT systems as part of your OT cyber maintenance. Identify all OT applications, systems, and devices that have user accounts. These could be...
My OT Security Vendor Was Aquired … What Should I Do?

My OT Security Vendor Was Aquired … What Should I Do?

Here is an anonymized question I received after the Mitsubishi Electronics acquisition of Nozomi Networks. I have a project ongoing right now to select an asset inventory/detection product. This news hit right before our proof of concept phase, and obviously I...

Week 38: Get Your S4x26 Ticket And Hotel Room

S4x26 tickets go on sale on Sept 15th at 12:01 AM EDT (New York). We hold the best price, the ticket 1 – 100 price, for the first 36 hours. We were at ticket block 501 – 750 after the first 36 hours of S4x25 ticket sales. You saved $550 if you bought a ticket in those...
We Won, We Lost (Part 2)

We Won, We Lost (Part 2)

Check out Part 1 here. We Won: An OT Security Community There is a thriving OT security community in 2025. This is a huge win. We started S4 in 2007 because there was no place where one of our researchers could present the first publicly disclosed OT vulnerabilities...
We Won, We Lost (Part 1)

We Won, We Lost (Part 1)

It’s been 24 years since the 9/11 attacks, and the beginning of serious OT security concerns. It’s been 15 years since Stuxnet was discovered. The results are an odd dichotomy. We Won – The Impact Of OT Cyber Incidents Has Been Minimal Experts have...
USG Reset … What About Private Industry?

USG Reset … What About Private Industry?

I had a number of public comments and private “yes, and” conversations after last week’s US Government (USG) Reset article similar to: just as government needs to show results, so does industry. Outside of entrenched, IT specific security providers,...

Week 35: Cyber Security At Unmanned Sites

Good security practice requires user authentication on all systems and applications. It also requires users to logout or be locked out when they physically leave the area or leave the cyber asset idle for too long. Many OT environments and cyber assets don’t follow...
US Government Reset On OT Security Is An Opportunity

US Government Reset On OT Security Is An Opportunity

CISA and other US government departments have accomplished little in OT cyber security and risk management over the past two decades. There has been an increase in funding and activity, not results. While the loss of talent and capability this year in the USG is...