loader from loading.io

Cyber Hygiene?

Unsolicited Response Podcast

Release Date: 05/15/2018

Tenable's OT Strategy with Marty Edwards show art Tenable's OT Strategy with Marty Edwards

Unsolicited Response Podcast

Marty Edwards has worked for an ICS asset owner, INL, DHS, ISA and late last year he made the move to a security product vendor, Tenable. This happened at the same time that Tenable acquired Indegy for $78M, indicating they are serious about OT security space. I talk with Marty a bit about his past career and then focus on why he moved to Tenable and what Tenable's strategy is for the OT space.

info_outline
Board of Directors Role in ICS Security with Thomas Parenty show art Board of Directors Role in ICS Security with Thomas Parenty

Unsolicited Response Podcast

A big challenge facing any team trying to deal with OT and ICS cyber risk is getting executive leadership and the Board of Directors support and leadership on this issue. The problems that arise tend to be related to communication styles, understanding of what is truly important to the company, and reducing business risk as determined by the executives and Board.

info_outline
ICS Threat Intel with Sergio Caltagirone show art ICS Threat Intel with Sergio Caltagirone

Unsolicited Response Podcast

Sergio began his career doing threat intelligence in the US Government's NSA and now is the VP of Threat Intel at Dragos. We focus in this episode on where the data for threat intel is obtained, how the threat intel product is created, and how it should be used by an ICS asset owner.

info_outline
An Interview with Andy Greenberg - Author of Sandworm show art An Interview with Andy Greenberg - Author of Sandworm

Unsolicited Response Podcast

In this episode Dale Peterson interviews Sandworm author and Wired Senior Writer Andy Greenberg on the S4x20 Main Stage. They focus on the ICS issues in the story. Who is Sandworm? What did Sandworm do? How was the West's response to these attacks? and much more.

info_outline
Kelly Jackson Higgins Interviews Dale show art Kelly Jackson Higgins Interviews Dale

Unsolicited Response Podcast

The tables are turned in this episode of the Unsolicited Response podcast with Kelly Jackson Higgins of Dark Reading interviewing Dale in the S4x20 Green Room. Kelly has been coming to S4 and covering the ICS security space for over seven years, and this experience lets her write and edit articles with important information and minimal hype.

info_outline
The Cabana Sessions show art The Cabana Sessions

Unsolicited Response Podcast

I spoke with two Digital Bond alumni and Lord Remorin at the S4x20 Cabana Sessions about a wide ranging set of technical topics. First Reid Wightman and I speak about CTFs, Pwn2Own, and his basement. Then I talk with Stephen Hilt and Lord Remorin about their ICS Factory Honeynet. How they built it and what they saw.

info_outline
Megan Samford on ICS4ICS show art Megan Samford on ICS4ICS

Unsolicited Response Podcast

Dale Peterson interviews Megan Samford of Rockwell Automation in the S4x20 Green Room.

info_outline
Interview with DHS CISA Director Chris Krebs show art Interview with DHS CISA Director Chris Krebs

Unsolicited Response Podcast

This episode is my ~30 minute interview with DHS CISA Director Chris Krebs in the S4x20 Green Room.

info_outline
An Interview with Marina Krotofil show art An Interview with Marina Krotofil

Unsolicited Response Podcast

Marina Krotofil has been able to view the ICS security world from a number of perspectives. Beginning as an academic; working for an ICS vendor (Honeywell); working for an ICS security products and services company (FireEye); and now working for a large European petrochemical company.

info_outline
Sean McBride on ICS Security Education and Degree Programs show art Sean McBride on ICS Security Education and Degree Programs

Unsolicited Response Podcast

Sean McBride was on some of the earliest Unsolicited Response episodes when he was a Founder and Analyst with Critical Intelligence, the first ICS Threat Intel company. The first 10 minutes of the interview discuss the state of ICS threat intel today.

info_outline
 
More Episodes

The buzzwords "cyber hygiene" is being said and written by many of the guru's in the ICS security community. It's hard to argue that basic hygiene is bad, but what is and isn't cyber hygiene?

I recorded a 3-person pod with Marty Edwards of the Automation Federation and Michael Toecker of Context Industrial Security. They were selected because they used the term, and all three of us had different views on what cyber hygiene means and the usefulness of the term. For example is applying security patches cyber hygiene? Is there a difference between cyber hygiene and cyber maintenance.

Amazingly, for three experienced and opinionated people, we all ended up changing our viewpoint and reached a basic agreement. Take a listen and see if you agree with where we ended up.

----

This episode was sponsored by CyberX. Founded by military cyber experts with nation-state expertise defending critical infrastructure, CyberX has developed an end-to-end platform for continuous ICS threat monitoring and risk mitigation.

Check out the CyberX Global ICS and IIoT Risk Report and my podcast from last year on the report with Phil Neray.