A big challenge facing any team trying to deal with OT and ICS cyber risk is getting executive leadership and the Board of Directors support and leadership on this issue. The problems that arise tend to be related to communication styles, understanding of what is...read more
Sergio began his career doing threat intelligence in the US Government's NSA and now is the VP of Threat Intel at Dragos. We focus in this episode on where the data for threat intel is obtained, how the threat intel product is created, and how it should be used by an...read more
In this episode Dale Peterson interviews Sandworm author and Wired Senior Writer Andy Greenberg on the S4x20 Main Stage. They focus on the ICS issues in the story. http://traffic.libsyn.com/unsolicitedresponse/20-5_Andy_Greenberg.mp3 The discussion includes: What led...read more
Note: This week has been full of depressing events, and our main hope is for everyone to get through this safely. The future will be brighter, and let's use some of this time of isolation to figure out what we want and start creating it. Making Six S4x20 Ideas Happen...read more
My most vivid early experience with 'it won't work in ICS' was in 2006. We had received a DHS research contract to develop Snort intrusion detection signatures and preprocessors for ICS protocols (originally Modbus and DNP3). I was presenting the working solution at a...read more
The tables are turned in this episode of the Unsolicited Response podcast with Kelly Jackson Higgins of Dark Reading interviewing Dale in the S4x20 Green Room. Kelly has been coming to S4 and covering the ICS security space for over seven years, and this experience...read more
Seth Godin wrote this in a recent daily blog post: You Can't Say You Can't Play. Lenny Levine was a great kindergarten teacher. And he ran his class by this one rule. It means that if another kid comes along, you need to include them in your game. That's it. This is...read more
I spoke with two Digital Bond alumni and Lord Remorin at the S4x20 Cabana Sessions about a wide ranging set of technical topics. http://traffic.libsyn.com/unsolicitedresponse/2020-3_Cabana_Sessions.mp3 Reid Wightman, Principal Vulnerability Analyst at Dragos What he...read more
I've made three predictions to date in my analysis of the ICS detection market, and now I'm adding a fourth. The first three are: The 'we only do passive, active is dangerous' mantra will be replaced as asset owners realize adding legitimate ICS active requests...read more
Technology Is Available ... Is The Will There? Bryan Owen of OSIsoft defined, and perhaps coined, ICS cloud services as being open loop or closed loop. Securing open loop cloud services is simple. Just push the data out to the cloud for predictive maintenance,...read more
Article Archive By Year
Article Archive By Category
Everything 2020 is on COVID-19 hold
S4x21 ... Jan 26-28 in Miami South Beach
Save the date. CFP open June 1st - Aug 15th.
2019 PAST EVENTS
S4x20 ... Jan 21 - 23 in Miami South Beach
Make sure you mark your calendar for the largest and most advanced OT / ICS Security event. And you can catch up on past S4 on the S4xEvents YouTube Channel.
Sept 19-20 in Sochi, Russia
I'll give a keynote at the Kaspersky Industrial Cybersecurity Conference 2019. I spoke at this event in 2017, and Kaspersky is always a tremendous host.
Sept 12 in Phoenix
I spoke at a private company event.
April 11th in Cebu
A private event where I'll discuss the future of attacks on and defense of Level 1 devices (PLC's). A lot changed in 2018, and this is just a hint as to what is coming.