loader from loading.io

Cyber Hygiene?

Unsolicited Response Podcast

Release Date: 05/15/2018

Insurance Exclusions show art Insurance Exclusions

Unsolicited Response Podcast

Dale's weekly article dives into the Merck / Ace American case on NotPetya damages covereage.

info_outline
Interview With Andy Greenberg On Sandworm show art Interview With Andy Greenberg On Sandworm

Unsolicited Response Podcast

With the recent cyber activities and near hostilities in Ukraine I thought it would be a good time to replay my S4x20 Main Stage interview with Andy Greenberg, author of . : April 19-21 in Miami South Beach

info_outline
Per Endpoint Risk Calculation show art Per Endpoint Risk Calculation

Unsolicited Response Podcast

Dale's weekly article looks at a new feature in Industrial Defender that measures risk per endpoint. Right direction, and the calculation needs to be more than a cyber hygiene measure.

info_outline
Interview with Pascal Ackerman - Author of Industrial Cybersecurity Volumes 1 and 2 show art Interview with Pascal Ackerman - Author of Industrial Cybersecurity Volumes 1 and 2

Unsolicited Response Podcast

Industrial Cybersecurity, listed as 2nd Edition but actually a completely new Volume 2 is 1027 pages on Security Monitoring, Threat Hunting and Security Assessments and Intel. In this episode, Dale Peterson talks with its author Pascal Ackerman. Links

info_outline
How Much Will It Reduce Fragility show art How Much Will It Reduce Fragility

Unsolicited Response Podcast

Dale's weekly article looks back at the dichotomy of must never go down and don't touch it or it might go down. And how a reduction of fragility can be a good metric of your next cyber risk reduction expenditure in ICS.

info_outline
What I'm Watching In ICS Security In 2022 show art What I'm Watching In ICS Security In 2022

Unsolicited Response Podcast

The first live episode of the year covered the top three things Dale Peterson will be watching in 2022. Not predictions. More areas  that could go in many different directions. The three are: - CISA Activities and Metrics - SW/FW/SBOM Product & Service Business Models - Cyber Insurance The episode included two guests who    talked about what they will be watching in 2022.

info_outline
2022 ... The Year Of show art 2022 ... The Year Of

Unsolicited Response Podcast

The Year Of descriptors are done retrospectively and looking forward. This episode looks at three ideas of what 2021 was the year of, and six ideas of what 2022 might be the year of. Related to OT and ICS Security, of course. Subscribe to  

info_outline
OT Security 2021: Perspective & Progress show art OT Security 2021: Perspective & Progress

Unsolicited Response Podcast

The final podcast episode of 2021 includes two articles that summarize the year. The first is on Perspective and the second is Progress. Enjoy the holidays and thanks for your support of the show.

info_outline
Predictions Analyzed show art Predictions Analyzed

Unsolicited Response Podcast

At the end of the ICS Security Month In Reviews episodes my guest and I give a win, fail and prediction. In this episode we replay those predictions and assess if we were right, wrong or the answer is still pending.

info_outline
Two Articles show art Two Articles

Unsolicited Response Podcast

Dale Peterson's articles from Dec 7th and 14th. - Failing Business (Home) Continuity Plans - VC's, OT Security and Criticality

info_outline
 
More Episodes

The buzzwords "cyber hygiene" is being said and written by many of the guru's in the ICS security community. It's hard to argue that basic hygiene is bad, but what is and isn't cyber hygiene?

I recorded a 3-person pod with Marty Edwards of the Automation Federation and Michael Toecker of Context Industrial Security. They were selected because they used the term, and all three of us had different views on what cyber hygiene means and the usefulness of the term. For example is applying security patches cyber hygiene? Is there a difference between cyber hygiene and cyber maintenance.

Amazingly, for three experienced and opinionated people, we all ended up changing our viewpoint and reached a basic agreement. Take a listen and see if you agree with where we ended up.

----

This episode was sponsored by CyberX. Founded by military cyber experts with nation-state expertise defending critical infrastructure, CyberX has developed an end-to-end platform for continuous ICS threat monitoring and risk mitigation.

Check out the CyberX Global ICS and IIoT Risk Report and my podcast from last year on the report with Phil Neray.