How much do we really know about how to reduce outages due to a cyber attack? We have over 1,000 of the worlds’ foremost experts on defining and implementing OT security good practice in this room. If we had 1000 of the foremost doctors from 300 years ago...
The ICS security community often has instances were very talented, hardworking people spend days arguing about high level terminology. Passionate, well thought out, and well written or spoken content on why one term is better than another. This happens on a variety of...
It happened again in the comments … IEC 62443 covers this topic. Last week I wrote about vendors providing patch compatibility information as a first step down the SBOM path of automating the providing, importing and use of information. Vendors are testing patch...
Daniel Ehrenreich posited in a LinkedIn comment that the number of ICS-OT directed attacks in a year is in the two digits range (10 – 99). My definition, not Daniel’s, of an ICS-OT directed attack is an attack that is designed to compromise the...
Awareness and activity increased in 2022 on OT vulnerability management, and it will likely increase even more in 2023. OT detection products’ key selling proposition is asset inventory, vuln management and increasingly mapping this information to risk scores. Same...
Much of the OT and ICS security community’s efforts and focus in recent years have been placed on creating and maintaining an OT cyber asset inventory. Now we are hearing it is not enough to know basic information such as vendor, OS, application, version...
The hand wringing about cyber insurance rate increases, effectiveness and even future viability have come in a steady stream the last two year. I don’t claim to be an insurance expert, but I have come across some helpful numbers in a Moody’s Investor...
I had Jim Hempstead of Moody’s Investors Service on a recent episode of the Unsolicited Response Show. There are two items related to Moody’s reports this fall that are worth a deeper look. This week’s article is on the Moody’s Cyber Risk Cyber...
First, I’m excited to announce that Idaho National Laboratory (INL) will be running the SBOM Challenge at S4x23 next Feb 14-16 in Miami South Beach. Virginia Wright and Ethan Huffman will be leading the team there. We learned from our two OT Detection Challenges that...
I frequently pound CISA for not having metrics. What are they trying to do and how will we know if it’s working or not? So, #walkthetalk. We have goals and associated metrics to measure the success of S4. For example, one goal and metric related to our Create...