Securing Closed Loop ICS Cloud Services

Securing Closed Loop ICS Cloud Services

Technology Is Available … Is The Will There? Bryan Owen of OSIsoft defined, and perhaps coined, ICS cloud services as being open loop or closed loop. Securing open loop cloud services is simple. Just push the data out to the cloud for predictive maintenance,...
Megan Samford – ICS4ICS

Megan Samford – ICS4ICS

Dale Peterson interviews Megan Samford of Rockwell Automation in the S4x20 Green Room. The main topic is Megan’s idea of an Incident Command System for Industrial Control Systems (ICS4ICS). While working for the State of Virginia, Megan was active with and saw...

2019 – What Changed in ICS Security?

Increase In Community Size/Talent and “The Dip” In December I was preparing my 15-minute mini-keynote to kick off for S4x20 in January, and I was having a hard time finding anything truly unique or significant change in ICS security in 2019. So I asked...
Interview with CISA Director Krebs

Interview with CISA Director Krebs

We created a lot of great content at S4x20, including a number of interviews that we will be releasing in the podcast. This episode is my ~30 minute interview with DHS CISA Director Chris Krebs in the S4x20 Green Room....

The Future of the ICS Product Market

Most of the activity in the ICS security product market has been around passive solutions that create asset inventories and detect cyber incidents. It is a bit astounding that the market and solutions will look almost completely different in two to five years than...
Podcast: Interview with Marina Krotofil

Podcast: Interview with Marina Krotofil

http://traffic.libsyn.com/unsolicitedresponse/2019-14_Marina_Krotofil.mp3 Marina Krotofil has been able to view the ICS security world from a number of perspectives. Beginning as an academic; working for an ICS vendor (Honeywell); working for an ICS security products...

Podcast: Sean McBride and ICS Cybersecurity Education

http://traffic.libsyn.com/unsolicitedresponse/2019-13_Sean_McBride.mp3 In this episode Dale interviews Sean McBride. Sean was on some of the earliest Unsolicited Response episodes when he was a Founder and Analyst with Critical Intelligence, the first ICS Threat Intel...

Podcast: An Interview with Patrick Miller

http://traffic.libsyn.com/unsolicitedresponse/2019-12_Miller.mp3 I took the opportunity to interview Patrick Miller while we were both in Sochi speaking at the Kaspersky KICS event. Patrick is a Founder and Managing Partner of Archer International, and he has been a...
Podcast: S4x19 Closing Panel

Podcast: S4x19 Closing Panel

http://traffic.libsyn.com/unsolicitedresponse/2019-11_Closing_Panel.mp3 The S4 Closing Panel is always a candid discussion on where the community is in securing ICS, where we are succeeding and where need to do better. This year I was joined by Rob Lee of Dragos and...
Book Review: Security PHA Review

Book Review: Security PHA Review

Rating: ★★★★☆ Tweet Length Review: Short and effective description of a process to add intentional cyber attacks to a Process Hazards Analysis (PHA). Includes basic process engineering examples that are highly useful for readers with an IT or IT security background....