loader from loading.io

Cyber Hygiene?

Unsolicited Response Podcast

Release Date: 05/15/2018

Maturing Past Maturity-Based To Risk-Based show art Maturing Past Maturity-Based To Risk-Based

Unsolicited Response Podcast

My article from 2 March 2021. I recently stumbled upon a McKinsey article from October 2019 that more elegantly, in McKinsey speak, made the argument against "cyber hygiene" than I do.

info_outline
VC's View Of The ICS Security Market show art VC's View Of The ICS Security Market

Unsolicited Response Podcast

This was a very revealing panel on how the VC world is viewing the ICS security space. Many strong statements and feelings about where we are and what the future will be. 

info_outline
ICS Security Company Valuation and Value Investing show art ICS Security Company Valuation and Value Investing

Unsolicited Response Podcast

Dale's weekly article published on 23 Feb 2022. He dives into why it is so difficult to value these companies, and the disconnect between any value investing analysis and the actual, what someone will pay, market valuation.

info_outline
Fiction Book Review: Total Power show art Fiction Book Review: Total Power

Unsolicited Response Podcast

Total Power by Kyle Mills is a story about a successful cyber/physical attack on the US electric grid, the impact of a prolonged outage, and the effort to bring the power back and catch the bad guys. It pulled some key facts out of the mountain of grid-hacking FUD so that it was much more plausible than a typical work of fiction.

info_outline
Women In ICS Security show art Women In ICS Security

Unsolicited Response Podcast

Kelly Jackson Higgins of Dark Reading joins Dale Peterson to co-host this episode of the Unsolicited Response Show. All of the guests are Women In ICS Security:

info_outline
My Recollection of the F**g Salmon Dinner show art My Recollection of the F**g Salmon Dinner

Unsolicited Response Podcast

Chapter 2 of Nicole Perlroth's new book was a dinner at S4x13 that I hosted. This article is my recollection of that dinner.

info_outline
Bayshore Networks' CEO Kevin Senator show art Bayshore Networks' CEO Kevin Senator

Unsolicited Response Podcast

The ICS security product vendors tend to focus on a product segment, firewall, data-diode, detection, ..., Bayshore Networks is unique in that they have the closest thing to a full line of ICS security products. This is being grown further with their recent acquisition of GE's OpShield technology.

info_outline
Countering Cyber Sabotage - CCE show art Countering Cyber Sabotage - CCE

Unsolicited Response Podcast

Dale Peterson interviews authors Andrew Bochman and Sarah Freemen of Idaho National Laboratory (INL) about their just published book Countering Cyber Sabotage - Introducing Consequence-driven, Cyber-informed Engineering (CCE).

info_outline
Operator Turing Test / Consequence & INL's CCE show art Operator Turing Test / Consequence & INL's CCE

Unsolicited Response Podcast

I missed recording my weekly article last week so this episode includes the articles from Jan 28th and Feb 4th.

info_outline
An Interview With Eddie Habibi of PAS show art An Interview With Eddie Habibi of PAS

Unsolicited Response Podcast

One of my favorite interviews is with founders who have persevered to build companies over decades. This one is with Eddie Habibi, the founder of PAS. 

info_outline
 
More Episodes

The buzzwords "cyber hygiene" is being said and written by many of the guru's in the ICS security community. It's hard to argue that basic hygiene is bad, but what is and isn't cyber hygiene?

I recorded a 3-person pod with Marty Edwards of the Automation Federation and Michael Toecker of Context Industrial Security. They were selected because they used the term, and all three of us had different views on what cyber hygiene means and the usefulness of the term. For example is applying security patches cyber hygiene? Is there a difference between cyber hygiene and cyber maintenance.

Amazingly, for three experienced and opinionated people, we all ended up changing our viewpoint and reached a basic agreement. Take a listen and see if you agree with where we ended up.

----

This episode was sponsored by CyberX. Founded by military cyber experts with nation-state expertise defending critical infrastructure, CyberX has developed an end-to-end platform for continuous ICS threat monitoring and risk mitigation.

Check out the CyberX Global ICS and IIoT Risk Report and my podcast from last year on the report with Phil Neray.