ICS Security Company Valuation and Value Investing

ICS Security Company Valuation and Value Investing

Frank, non-flattering admission ... I am terrible at determining how much an ICS security company is worth, it's valuation. While I believe that I can analyze the market, identify the product and service trends, evaluate company strategies, and identify the winners...

read more

Women In ICS Security

Kelly Jackson Higgins of Dark Reading joins Dale Peterson to co-host this episode of the Unsolicited Response Show. https://youtu.be/Q97-f5yeVg4 The topic is Women In ICS Security, and all the guests are Women In ICS Security: - Kristin Demoranville - MJ Emanuel -...

read more
My Recollection of the F**g Salmon Dinner

My Recollection of the F**g Salmon Dinner

Chapter 2 of Nicole Perlroth's book This Is How They Tell Me The World Ends is all about S4x13 and particularly about a dinner I hosted that she called The F**king Salmon dinner. We were all in Miami to attend the same bizarre conference - an annual invite-only...

read more
Consequence and INL’s CCE

Consequence and INL’s CCE

The long awaited detail of INL's Consequence-driven, Cyber-informed Engineering (CCE) methodology is now available in the Andy Bochman / Sarah Freemen book Countering Cyber Sabotage. I had the opportunity to interview the authors for an hour in this week's Unsolicited...

read more
An Operator Turing Test

An Operator Turing Test

Proposal: A small group in the ICS world develop a test to determine if a "machine" can be trained from only historian data to perform as good (indistinguishable) or better than a representative Operator. In 1950 Alan Turing wrote an article on what he called...

read more
Are Your ICS Security Patching Plans Realistic?

Are Your ICS Security Patching Plans Realistic?

An interesting and potentially important technical paper was published near the year end holidays and didn't get the attention it deserved: Vulnerability Forecasting: In Theory and Practice by Éireann Leverett, Matilda Rhode and Adam Wedgbury of Airbus. The...

read more
How To Be An OT Visionary

How To Be An OT Visionary

It really is quite simple to be an OT Visionary. Look at what is happening and working in IT / the enterprisePredict that this same technology and approach will be used in OTBe prepared to be called crazy and told it will never work in OT / ICSFive years later have it...

read more
ICS Breaches Will Happen

ICS Breaches Will Happen

Focus on Recovery and Resilience in 2021 We, the ICS security community and asset owners, need to grow up in 2021. There is near hysteria whenever there is an actual, potential or mythical breach of an ICS, regardless of the impact. And this is in an environment where...

read more

Podcast: December Month In Review

Eric Byres, CEO of aDolus and of Tofino fame, and I discuss the top three stories from December 2020 and give a Win, Fail and Prediction. https://traffic.libsyn.com/secure/unsolicitedresponse/21-1_December.mp3 Topics: The Solarwinds hackDragos raising $110M in venture...

read more
2020 Predictions – Right, Wrong & Pending

2020 Predictions – Right, Wrong & Pending

I made a number of predictions in 2020, some overlapping, in both my coverage of the detection market and as a feature of the monthly ICS security month in review episodes of the Unsolicited Response podcast. The predictions help with my analysis and hopefully...

read more

UPCOMING EVENTS

Accenture Operation: Next Closing Keynote ... March 24th

Dale will speak on Creating The Future of OT and ICS Security

S4x22 ... 25-27 Jan 2022 in Miami South Beach

Save the date. Big comeback event after one year off!

2021/2020 Past Events

ICS CYBERSEC 2021 Israel ... February 11th

Dale spoke on the topic of Less

Fortinet Secure OT 2020 Virtual 

Dale's keynote on Innovation Through Disruption.

Hack The Capitol Virtual

Led panel discussion on VC for ICS Security companies

OT-ISAC Virtual Keynote

ICSJWG Virtual Meeting

The Future of ICS Security Products (video)

S4x20 in Miami South Beach

See the videos from the event.