Living With Dirty Cyber Assets

Living With Dirty Cyber Assets

The theme for S4x22 was No Limits. In my 10-minute opening of the event, I suggested one way to break free from limits is to take conventional wisdom and flip it. Look at the world as if the opposite were true. I gave three examples, and my favorite was: flipping...

read more
The ICS Dichotomy of Surface Area

The ICS Dichotomy of Surface Area

I finished up Volume 3 of The Great Mental Models and the model, or concept, that has me thinking is Surface Area. Where we need to reduce it and where we need to expand it. The application to security is obvious and used in the chapter. We want to minimize the attack...

read more
Will CISA Recommend Securing ICS?

Will CISA Recommend Securing ICS?

Hold on - - - hasn’t CISA since its birth and DHS before that recommended securing ICS? No, not really. The recommendations have been keep the attackers out, perform cyber hygiene, and detect attacks, but they have rarely recommended the monitoring and controlling of...

read more
Shields Up For ICS

Shields Up For ICS

The US CISA put out a Shields Up advisory in conjunction with Russia’s invasion of Ukraine. It's probably necessary, as they would have been disparaged if they didn’t, and not terribly useful. The recommendations were primarily the same as they have been recommending...

read more
Let’s Talk: Level 0 and Risk Management

Let’s Talk: Level 0 and Risk Management

Three topics for this week's article: Importance, Risk Management, and Level 0 Risk Reduction. Importance Joe Weiss, who I call the Paul Revere of ICS security for his yeoman's work raising the alarm in the 2000 - 2010 decade, was not a fan of my article last week and...

read more
Pivot To Process Variable Anomaly Detection

Pivot To Process Variable Anomaly Detection

Summary: Vendors who are focused on compromise of Level 0 to Level 1 communications should pivot to process variable anomaly detection. There are a handful of vendors (Siga being the most active, Mission Secure, Fortiphyd, … and a couple I likely missed) who focus on...

read more
OT Security Product Market Winners = No Changes

OT Security Product Market Winners = No Changes

The first OT Security product segment to have a company, actually multiple companies, valued over $1B is OT Detection. The next OT security product segment that is seeing multiple early stage investments and has the same look of fast market cap growth in the next 1-3...

read more
Would My Cyber Insurance Policy Cover NotPetya?

Would My Cyber Insurance Policy Cover NotPetya?

Would my cyber insurance policy cover losses due to NotPetya? It’s one important type of question to ask your insurance provider each time before renewal. The answer from the New Jersey Superior Court for Merck was yes. The War or Hostile Acts exclusion in their...

read more
Per Endpoint Risk Calculation

Per Endpoint Risk Calculation

Industrial Defender version 7.4 was announced last week. One feature caught my attention: Per Endpoint Risk Calculations: Allows customization of risk profiles on a per asset basis using threat vectors such as unpatched vulnerabilities, security events and health...

read more
2022: The Year Of?

2022: The Year Of?

The Year Of descriptors are done retrospectively and looking forward. 2021 from an OT and ICS Security standpoint was ... The year when a cyber incident (Colonial Pipeline) finally had a significant impact on US critical infrastructure?The year of the ICS Security...

read more

GET DALE'S ICS SECURITY NEWS & NOTES EMAIL EVERY FRIDAY

UPCOMING EVENTS

OTCEP Forum ... July 12-13 in Singapore

Dale will give his Security Truth or Consequences keynote and participate in panels.

S4x23 ... 13-16 Feb 2023 in Miami South Beach

Save the date. For the biggest and most future focused on ICS Security Event.