Well, We’ve Got A Change Control Program

Because NERC CIP is the regulatory force for cyber security in the electric sector, I tend to do a lot of work with clients on how to best to implement the various technical and administrative requirements. CIP-003-3 R6 requires that owners establish and document a...

Friday News and Notes

Hugo Teso of n.runs had a detailed presentation on aircraft communications and systems and how to hack them at Hack-In-The-Box Amsterdam. Aviation companies were quick to disagree with Teso’s contentions. Outside our area of expertise so we can’t comment...

First Post

I am excited to announce that I have started working at Digital Bond. I have a bachelors degree in Computer Science from Southern Illinois University – Carbondale. Before joining Digital Bond I worked at the Tennessee Valley Authority for over 6 years. In that time I...

NERC CIP Version 5 – Part Four: Where To Go From Here

Chris Jager is a freelance security consultant who is always looking for interesting projects related to NERC CIP or ICS cybersecurity. In this four-part guest post series, he goes over changes to the NERC CIP standards and challenges facing the industry as they...

Opportunity From XP’s Demise

In one year, April 9th, 2014, Windows XP is at End of Support, meaning that no new updates, security patches, or technical assistance will be available from Microsoft. Ever. If you are a responsible automation vendor, you’ve made plans to get your products...

Part 3 – NERC CIP V5 – Scope and Flaws

Chris Jager is a freelance security consultant who is always looking for interesting projects related to NERC CIP or ICS cybersecurity. In this four-part guest post series, he goes over changes to the NERC CIP standards and challenges facing the industry as they...

Value, Risk, and Patch Testing Services

For a bit of history that we all know, ICS wasn’t originally built to be patched and updated on a regular basis. In an automation world that demanded static systems that could perform their function day after day with limited intervention, this wasn’t...

Friday News & Notes

A NATO research team of experts has determined that Stuxnet was an act of war. “Acts that kill or injure persons or destroy or damage objects are unambiguously uses of force.” The use of force is only allowed in self-defense. Want to weigh in on how government...

S4x13: Calculating Risk Scores For RTU’s

We added some brief, 15-minute sessions to S4x13, and Chris Sistrunk of Entergy briefly describes how they calculated the risk of each RTU in their system. They calculate the probability of compromise/failure based on the vendor/model, considering items like the age...

Part 2 – NERC CIP Version 5 – Threat Landscape Alignment

Chris Jager is a freelance security consultant who is always looking for interesting projects related to NERC CIP or ICS cybersecurity. In this four-part guest post series, he goes over changes to the NERC CIP standards and challenges facing the industry as they...