Explore … S4x23 Intro

Explore … S4x23 Intro

How much do we really know about how to reduce outages due to a cyber attack?  We have over 1,000 of the worlds’ foremost experts on defining and implementing OT security good practice in this room. If we had 1000 of the foremost doctors from 300 years ago...
What’s In A Name

What’s In A Name

The ICS security community often has instances were very talented, hardworking people spend days arguing about high level terminology. Passionate, well thought out, and well written or spoken content on why one term is better than another. This happens on a variety of...
IEC 62443’s Future … Encyclopedia Brittanica and AI

IEC 62443’s Future … Encyclopedia Brittanica and AI

It happened again in the comments … IEC 62443 covers this topic. Last week I wrote about vendors providing patch compatibility information as a first step down the SBOM path of automating the providing, importing and use of information. Vendors are testing patch...
How Many ICS-OT Directed Attacks In 2022?

How Many ICS-OT Directed Attacks In 2022?

Daniel Ehrenreich posited in a LinkedIn comment that the number of ICS-OT directed attacks in a year is in the two digits range (10 – 99). My definition, not Daniel’s, of an ICS-OT directed attack is an attack that is designed to compromise the...
Protect What You Don’t Know

Protect What You Don’t Know

Much of the OT and ICS security community’s efforts and focus in recent years have been placed on creating and maintaining an OT cyber asset inventory. Now we are hearing it is not enough to know basic information such as vendor, OS, application, version...
Don’t Cry For The Cyber Insurance Industry

Don’t Cry For The Cyber Insurance Industry

The hand wringing about cyber insurance rate increases, effectiveness and even future viability have come in a steady stream the last two year. I don’t claim to be an insurance expert, but I have come across some helpful numbers in a Moody’s Investor...
Moody’s Cyber Risk Heat Map

Moody’s Cyber Risk Heat Map

I had Jim Hempstead of Moody’s Investors Service on a recent episode of the Unsolicited Response Show. There are two items related to Moody’s reports this fall that are worth a deeper look. This week’s article is on the Moody’s Cyber Risk Cyber...
The S4 SBOM Challenge

The S4 SBOM Challenge

First, I’m excited to announce that Idaho National Laboratory (INL) will be running the SBOM Challenge at S4x23 next Feb 14-16 in Miami South Beach. Virginia Wright and Ethan Huffman will be leading the team there. We learned from our two OT Detection Challenges that...
Project: DFIR for PLCs (and other OT Embedded Systems)

Project: DFIR for PLCs (and other OT Embedded Systems)

I frequently pound CISA for not having metrics. What are they trying to do and how will we know if it’s working or not? So, #walkthetalk. We have goals and associated metrics to measure the success of S4. For example, one goal and metric related to our Create...
Record Your Question