loader from loading.io

Cyber Hygiene?

Unsolicited Response Podcast

Release Date: 05/15/2018

Peter Singer - Author of Burn In: A Novel About The Real Robotic Revolution show art Peter Singer - Author of Burn In: A Novel About The Real Robotic Revolution

Unsolicited Response Podcast

P.W. Singer and August Cole recently published their second work of fiction - Burn In: A Novel About The Real Robotic Revolution. While it is a fiction, it uses over 300 examples of what might happen as robotics and revolution change the world over the next two decades.

info_outline
June - ICS Security Month In Review show art June - ICS Security Month In Review

Unsolicited Response Podcast

Michael Toecker joins Dale to discuss the 3 big stories of the month, and then the give their Win and Fail for the month, and finish with a bold prediction.

info_outline
Building & Using Digital Twins show art Building & Using Digital Twins

Unsolicited Response Podcast

The concept and utility of a digital twin is easy to grasp, but how do you build a digital twin? How much does it cost? How long does it take? Are we going to see digital twins in all sectors? Are all digital twins the same. I ask Mike Aylott of KBC these and other digital twin questions.

info_outline
Matt Wyckhouse: Testing ICS Firmware Security & Supply Chains show art Matt Wyckhouse: Testing ICS Firmware Security & Supply Chains

Unsolicited Response Podcast

This week's episode is my interview with Matt Wyckhouse, founder and CEO of Finite State. We talk about testing ICS firmware, what asset owners do with the results, and business models for providing this info. Plus startup life, raising money and working with VC's.

info_outline
May: ICS Security Month In Review show art May: ICS Security Month In Review

Unsolicited Response Podcast

I begin with a brief discussion of the George Floyd murder and not enough. While not ICS security, it is impossible to review the month of May without discussing this. Then at 7:15 Patrick Miller joins me to discuss the Executive Order, the rumored supply chain manipulation of a transformer, COVID impact on the ICS security community, and ICS ATT&CK evaluations. We finish with Wins and Fails from the month and a Bold Prediction.

info_outline
COVID-19 Impact In ICS Security show art COVID-19 Impact In ICS Security

Unsolicited Response Podcast

This is a shorter solo-sode rather than the typical interview format. I wanted to hold off on making any COVID-19 analysis or comments until the rawness and shock of the event had subsided somewhat. In this episode I discuss how COVID-19 affects:

info_outline
S4x20 Closing Panel show art S4x20 Closing Panel

Unsolicited Response Podcast

Ralph Langner of Langner, Inc. and Zach Tudor of INL join me on the S4x20 Closing Panel. This is always one of the most fun and highly rated session at S4.

info_outline
Interview with Inventor & Legend Ed Schweitzer show art Interview with Inventor & Legend Ed Schweitzer

Unsolicited Response Podcast

This podcast is the audio from my S4x20 Main Stage interview with electric sector and ICS legend Ed Schweitzer. He was the perfect person to interview related to the event theme: Create The Future in OT and ICS security. It's a wide ranging and fun interview. (Ed has a great sense of humor).

info_outline
Interview with Bryan Owen of OSIsoft show art Interview with Bryan Owen of OSIsoft

Unsolicited Response Podcast

Bryan and I were scheduled to go skiing prior to ICSJWG in Park City. With that squashed we decided to record a podcast instead. Bryan and I begin with what winning the Michael J. Assante Lifetime Achievement award meant to him. Then we discuss the challenge and methods in which an ICS product vendor tries to develop and deploy a secure solution.

info_outline
Tenable's OT Strategy with Marty Edwards show art Tenable's OT Strategy with Marty Edwards

Unsolicited Response Podcast

Marty Edwards has worked for an ICS asset owner, INL, DHS, ISA and late last year he made the move to a security product vendor, Tenable. This happened at the same time that Tenable acquired Indegy for $78M, indicating they are serious about OT security space. I talk with Marty a bit about his past career and then focus on why he moved to Tenable and what Tenable's strategy is for the OT space.

info_outline
 
More Episodes

The buzzwords "cyber hygiene" is being said and written by many of the guru's in the ICS security community. It's hard to argue that basic hygiene is bad, but what is and isn't cyber hygiene?

I recorded a 3-person pod with Marty Edwards of the Automation Federation and Michael Toecker of Context Industrial Security. They were selected because they used the term, and all three of us had different views on what cyber hygiene means and the usefulness of the term. For example is applying security patches cyber hygiene? Is there a difference between cyber hygiene and cyber maintenance.

Amazingly, for three experienced and opinionated people, we all ended up changing our viewpoint and reached a basic agreement. Take a listen and see if you agree with where we ended up.

----

This episode was sponsored by CyberX. Founded by military cyber experts with nation-state expertise defending critical infrastructure, CyberX has developed an end-to-end platform for continuous ICS threat monitoring and risk mitigation.

Check out the CyberX Global ICS and IIoT Risk Report and my podcast from last year on the report with Phil Neray.