Protect What You Don’t Know

Protect What You Don’t Know

Much of the OT and ICS security community’s efforts and focus in recent years have been placed on creating and maintaining an OT cyber asset inventory. Now we are hearing it is not enough to know basic information such as vendor, OS, application, version...
Don’t Cry For The Cyber Insurance Industry

Don’t Cry For The Cyber Insurance Industry

The hand wringing about cyber insurance rate increases, effectiveness and even future viability have come in a steady stream the last two year. I don’t claim to be an insurance expert, but I have come across some helpful numbers in a Moody’s Investor...
Moody’s Cyber Risk Heat Map

Moody’s Cyber Risk Heat Map

I had Jim Hempstead of Moody’s Investors Service on a recent episode of the Unsolicited Response Show. There are two items related to Moody’s reports this fall that are worth a deeper look. This week’s article is on the Moody’s Cyber Risk Cyber...
The S4 SBOM Challenge

The S4 SBOM Challenge

First, I’m excited to announce that Idaho National Laboratory (INL) will be running the SBOM Challenge at S4x23 next Feb 14-16 in Miami South Beach. Virginia Wright and Ethan Huffman will be leading the team there. We learned from our two OT Detection Challenges that...
Project: DFIR for PLCs (and other OT Embedded Systems)

Project: DFIR for PLCs (and other OT Embedded Systems)

I frequently pound CISA for not having metrics. What are they trying to do and how will we know if it’s working or not? So, #walkthetalk. We have goals and associated metrics to measure the success of S4. For example, one goal and metric related to our Create...
OT Cyber Security Regulation (if I were omnipotent)

OT Cyber Security Regulation (if I were omnipotent)

Since the early days of NERC CIP I have been unable to identify what I would do for OT Critical Infrastructure Cyber Security Regulations if I were omnipotent and could specify and enforce whatever I thought would work. After spending a week in Singapore this July...
What Will Determine Near Term SBOM Winners (Part 2)

What Will Determine Near Term SBOM Winners (Part 2)

As I wrote two weeks ago, in the medium to long term the winners in the OT SBOM market will be those who can effectively play the SBOM/VEXie middleman between vendors and asset owners. The ability to create SBOMs won’t be a determining factor. But competitors need to...
What Will Determine Near Term SBOM Vendor Wins? (Part 1)

What Will Determine Near Term SBOM Vendor Wins? (Part 1)

Last week’s article covered analysis on how the SBOM market winners will be determined by who can best play the role of middleman between the large number of ICS vendors and the even larger number of ICS asset owners. This week let’s look at what will lead to...
ICS SBOM Market Winners

ICS SBOM Market Winners

The image in this article is what I believe will determine winners and losers in the SBOM marketplace. Who will develop and implement the best business model of mediating the need for vendors to provide and asset owners to access SBOMs with VEXies. Here is my...
SBOM In OT: Near Term Wins & Long Term Work

SBOM In OT: Near Term Wins & Long Term Work

Based on the early stage venture funding, the SBOM, or software / firmware visibility and risk analysis, product segment appears to be potentially the next big thing in the OT security category. It’s in a similar place as the OT detection and visibility product...