Podcast: ICS Threat Intel with Sergio Caltagirone

Sergio began his career doing threat intelligence in the US Government’s NSA and now is the VP of Threat Intel at Dragos. We focus in this episode on where the data for threat intel is obtained, how the threat intel product is created, and how it should be used...

Solarium Report Eclipsed By Pandemic

And This Is A Good Thing The long awaited U.S. Cyberspace Solarium Commission Report came out and received very little attention given more pressing pandemic events. And this is a good thing. I’ll provide some critique and then, to be fair, provide my...
Create The Future Of OT & ICS Security

Create The Future Of OT & ICS Security

Note: This week has been full of depressing events, and our main hope is for everyone to get through this safely. The future will be brighter, and let’s use some of this time of isolation to figure out what we want and start creating it. Making Six S4x20 Ideas...

It Won’t Work In ICS … Until It Does

My most vivid early experience with ‘it won’t work in ICS’ was in 2006. We had received a DHS research contract to develop Snort intrusion detection signatures and preprocessors for ICS protocols (originally Modbus and DNP3). I was presenting the...
Kelly Jackson Higgins Interviews Dale

Kelly Jackson Higgins Interviews Dale

The tables are turned in this episode of the Unsolicited Response podcast with Kelly Jackson Higgins of Dark Reading interviewing Dale in the S4x20 Green Room. Kelly has been coming to S4 and covering the ICS security space for over seven years, and this experience...

Everyone Can Play In OT / ICS Security

Seth Godin wrote this in a recent daily blog post: You Can’t Say You Can’t Play. Lenny Levine was a great kindergarten teacher. And he ran his class by this one rule. It means that if another kid comes along, you need to include them in your game....
Securing Closed Loop ICS Cloud Services

Securing Closed Loop ICS Cloud Services

Technology Is Available … Is The Will There? Bryan Owen of OSIsoft defined, and perhaps coined, ICS cloud services as being open loop or closed loop. Securing open loop cloud services is simple. Just push the data out to the cloud for predictive maintenance,...