Are you over 18 and want to see adult content?
6
More Annotations
4
A complete backup of dorsetwildlifetrust.org.uk
dorsetwildlifetrust.org.uk
Are you over 18 and want to see adult content?
3
Favourite Annotations
A complete backup of xdlatino.blogspot.com
xdlatino.blogspot.com
Are you over 18 and want to see adult content?
2
A complete backup of explicithistoire.wordpress.com
explicithistoire.wordpress.com
Are you over 18 and want to see adult content?
4
Text
HOME - DALE PETERSON: ICS SECURITY CATALYSTBLOGCONSULTINGHIRE DALE TO SPEAKPODCASTS4 EVENTSCONTACT He has pioneered numerous ICS security tools and techniques, such as the first intrusion detection signatures for ICS that are now in every commercial product. In 2007 Dale created the S4 Events to showcase the best offensive and defensive work in ICS security and build a community. S4 is now the largest and most advanced ICS event in the * Twitter
world.
ICS DETECTION MARKET UPDATE See previous analysis on my ICS Detection Market page. We Have A Winner The ICS Detection Market is the clear ICS security market winner of 2021 to date. Even before the Colonial Pipeline incident it was clear that well funded and relentless marketing by vendors in this segment has achieved dominant mindshare. Visibility and detection 3 INCIDENT RESPONSE PLAYBOOKS FOR OT Playbook 1 – Enterprise Network Compromised. Pending additional details (this is written Monday afternoon) this may be the playbook needed for the Colonial Pipeline incident. Scenario: The enterprise network has been compromised, and there is currently no evidence of a related compromise in OT. For almost two decades many OT systems havehad
ICS DETECTION MARKET ANALYSIS ICS Detection Market Analysis - Dale Peterson: ICS Security Catalyst. Here are my thoughts on the the ICS Detection Market in reverse chronological order (most recent on top): From ICSJWG session on 9 June 2020 – The Future of ICS Security Products . A lot has changed even since June. YouTube. ICS DETECTION MARKET ANALYSIS detect attacks using a combination of signatures, anomaly detection and behavioral analysis. The vendors were mostly startups with a few exception, such as GE and Kaspersky. It was a simple matter of analyzing similar offerings across product, sales and marketing, headcount, finances and installed base. ICS BREACHES WILL HAPPEN Focus on Recovery and Resilience in 2021 We, the ICS security community and asset owners, need to grow up in 2021. There is near hysteria whenever there is an actual, potential or mythical breach of an ICS, regardless of the impact. And this is in an environment where the number and consequences of successful attacks ICS DETECTION MARKET ICS Detection Market – Part 1. 10 Dec 2020 | 2020, Detect. Part 1 looks at some of the major changes in the competitors focused primarily on the ICS detection market since the May update. Part 2 comes out next Tuesday and will map out where the competitors stand relative to each other and be a major change to the Tiers approach inthe May update.
CONSEQUENCE AND INL'S CCE The long awaited detail of INL’s Consequence-driven, Cyber-informed Engineering (CCE) methodology is now available in the Andy Bochman / Sarah Freemen book Countering Cyber Sabotage. I had the opportunity to interview the authors for an hour in this week’s Unsolicited Response episode that you can see below. There is a lot to like aboutthe
ARE YOUR ICS SECURITY PATCHING PLANS REALISTIC? An interesting and potentially important technical paper was published near the year end holidays and didn’t get the attention it deserved: Vulnerability Forecasting: In Theory and Practice by Éireann Leverett, Matilda Rhode and Adam Wedgbury of Airbus. The authors make the bold claim that is possible to predict the number of CVE’s fromthe NVD a year
ICS-PATCH
ICS-Patch What To Patch When In ICS? A Decision Tree Approach Version 0.5 – 13 Sept 2020 Introduction Applying security patches is part of a cybersecurity program, which HOME - DALE PETERSON: ICS SECURITY CATALYSTBLOGCONSULTINGHIRE DALE TO SPEAKPODCASTS4 EVENTSCONTACT He has pioneered numerous ICS security tools and techniques, such as the first intrusion detection signatures for ICS that are now in every commercial product. In 2007 Dale created the S4 Events to showcase the best offensive and defensive work in ICS security and build a community. S4 is now the largest and most advanced ICS event in theworld.
ICS DETECTION MARKET UPDATE See previous analysis on my ICS Detection Market page. We Have A Winner The ICS Detection Market is the clear ICS security market winner of 2021 to date. Even before the Colonial Pipeline incident it was clear that well funded and relentless marketing by vendors in this segment has achieved dominant mindshare. Visibility and detection 3 INCIDENT RESPONSE PLAYBOOKS FOR OT Playbook 1 – Enterprise Network Compromised. Pending additional details (this is written Monday afternoon) this may be the playbook needed for the Colonial Pipeline incident. Scenario: The enterprise network has been compromised, and there is currently no evidence of a related compromise in OT. For almost two decades many OT systems havehad
ICS DETECTION MARKET ANALYSIS detect attacks using a combination of signatures, anomaly detection and behavioral analysis. The vendors were mostly startups with a few exception, such as GE and Kaspersky. It was a simple matter of analyzing similar offerings across product, sales and marketing, headcount, finances and installed base. ICS DETECTION MARKET ANALYSIS ICS Detection Market Analysis - Dale Peterson: ICS Security Catalyst. Here are my thoughts on the the ICS Detection Market in reverse chronological order (most recent on top): From ICSJWG session on 9 June 2020 – The Future of ICS Security Products . A lot has changed even since June. YouTube. ICS BREACHES WILL HAPPEN Focus on Recovery and Resilience in 2021 We, the ICS security community and asset owners, need to grow up in 2021. There is near hysteria whenever there is an actual, potential or mythical breach of an ICS, regardless of the impact. And this is in an environment where the number and consequences of successful attacks ICS DETECTION MARKET ICS Detection Market – Part 1. 10 Dec 2020 | 2020, Detect. Part 1 looks at some of the major changes in the competitors focused primarily on the ICS detection market since the May update. Part 2 comes out next Tuesday and will map out where the competitors stand relative to each other and be a major change to the Tiers approach inthe May update.
CONSEQUENCE AND INL'S CCE The long awaited detail of INL’s Consequence-driven, Cyber-informed Engineering (CCE) methodology is now available in the Andy Bochman / Sarah Freemen book Countering Cyber Sabotage. I had the opportunity to interview the authors for an hour in this week’s Unsolicited Response episode that you can see below. There is a lot to like aboutthe
ARE YOUR ICS SECURITY PATCHING PLANS REALISTIC? An interesting and potentially important technical paper was published near the year end holidays and didn’t get the attention it deserved: Vulnerability Forecasting: In Theory and Practice by Éireann Leverett, Matilda Rhode and Adam Wedgbury of Airbus. The authors make the bold claim that is possible to predict the number of CVE’s fromthe NVD a year
ICS-PATCH
ICS-Patch What To Patch When In ICS? A Decision Tree Approach Version 0.5 – 13 Sept 2020 Introduction Applying security patches is part of a cybersecurity program, which2021 ARCHIVES
6 Apr 2021 | 2021. Three answers. 1. Women Women represent 51% of the population and 57% of the college graduates in the US. They comprise less than 10% of the OT Security workforce. Solving the problem could be as simple as adding women to the OT Security workforce until they ICS DETECTION MARKET ANALYSIS ICS Detection Market Analysis - Dale Peterson: ICS Security Catalyst. Here are my thoughts on the the ICS Detection Market in reverse chronological order (most recent on top): From ICSJWG session on 9 June 2020 – The Future of ICS Security Products . A lot has changed even since June. YouTube. ICS DETECTION MARKET ICS Detection Market – Part 1. 10 Dec 2020 | 2020, Detect. Part 1 looks at some of the major changes in the competitors focused primarily on the ICS detection market since the May update. Part 2 comes out next Tuesday and will map out where the competitors stand relative to each other and be a major change to the Tiers approach inthe May update.
THE BACK DOOR IS IRRELEVANT IF THE FRONT DOOR IS OPEN The Secretary of Energy is authorized to create ‘a criteria’ for equipment to be pre-qualified. Even a very basic four point criteria to address insecure by design would be a big step forward, such as: signed firmware with secure boot. encrypted and authenticated management protocols. authenticated ICS protocols for control andmonitoring.
ICS DETECTION MARKET Q2 UPDATE Part 2: Acquirers, Enterprise Vendors and Tier 3 See Part 1: COVID 19 Impact, Tier 2 and Tier 1 Analysis, and Valuation First the updated chart and then the analysis below. You will see big changes in Tiers 2 & 3. Funding data comes from Crunchbase. Acquirers and Enterprise Vendors When an ICS detection company SECURITY OUTCOMES IN ICS In broad terms it is to help the company reduce ICS cyber related risk to an acceptable level. This study measures the impact of security strategies on a set of eleven Security Program Outcomes across three categories. Enabling The Business examples: 1. keeping up HOW DO WE SOLVE THE OT CYBERSECURITY STAFFING CHALLENGES Three answers. 1. Women Women represent 51% of the population and 57% of the college graduates in the US. They comprise less than 10% of the OT Security workforce. Solving the problem could be as simple as adding women to the OT Security workforce until they reach close to their population percentage. Encouraging and recruiting WHY DID MICROSOFT ACQUIRE CYBERX? The rumors started in February and became reality this week. Microsoft acquired CyberX. The price is not a material event for Microsoft. It will never be officially released. A recent article claimed the price was $165M, and I predicted it would be substantially less if it occurred based on the acquisition prices of fellow Tier 2 vendorsIndegy
PROPERLY PRIORITIZING LEVEL 0 AND LEVEL 1 SECURITY The PLC, RTU, Controller or other device at Level 1 typically communicates with many sensors and actuators. It can be a perimeter security device that stops or limits attacks from reaching the Level 0 device from untrusted networks. Falsified or bad ICS SECURITY PATCHING: NEVER, NEXT, NOW The two things I like about Art’s approach are 1) It ties security patching to risk and 2) It is a simplified three tiered approach. Art presented a flowchart (see above) that asset owners use to determine if a patch should be applied Never, Next or Now. My guidance for the past five years has been a similar three-tiered approach. HOME - DALE PETERSON: ICS SECURITY CATALYSTBLOGCONSULTINGHIRE DALE TO SPEAKPODCASTS4 EVENTSCONTACT He has pioneered numerous ICS security tools and techniques, such as the first intrusion detection signatures for ICS that are now in every commercial product. In 2007 Dale created the S4 Events to showcase the best offensive and defensive work in ICS security and build a community. S4 is now the largest and most advanced ICS event in theworld.
ICS DETECTION MARKET UPDATE See previous analysis on my ICS Detection Market page. We Have A Winner The ICS Detection Market is the clear ICS security market winner of 2021 to date. Even before the Colonial Pipeline incident it was clear that well funded and relentless marketing by vendors in this segment has achieved dominant mindshare. Visibility and detection 3 INCIDENT RESPONSE PLAYBOOKS FOR OT Playbook 1 – Enterprise Network Compromised. Pending additional details (this is written Monday afternoon) this may be the playbook needed for the Colonial Pipeline incident. Scenario: The enterprise network has been compromised, and there is currently no evidence of a related compromise in OT. For almost two decades many OT systems havehad
ICS DETECTION MARKET ANALYSIS ICS Detection Market Analysis - Dale Peterson: ICS Security Catalyst. Here are my thoughts on the the ICS Detection Market in reverse chronological order (most recent on top): From ICSJWG session on 9 June 2020 – The Future of ICS Security Products . A lot has changed even since June. YouTube. ICS DETECTION MARKET ANALYSIS detect attacks using a combination of signatures, anomaly detection and behavioral analysis. The vendors were mostly startups with a few exception, such as GE and Kaspersky. It was a simple matter of analyzing similar offerings across product, sales and marketing, headcount, finances and installed base. ICS BREACHES WILL HAPPEN Focus on Recovery and Resilience in 2021 We, the ICS security community and asset owners, need to grow up in 2021. There is near hysteria whenever there is an actual, potential or mythical breach of an ICS, regardless of the impact. And this is in an environment where the number and consequences of successful attacks ICS DETECTION MARKET ICS Detection Market – Part 1. 10 Dec 2020 | 2020, Detect. Part 1 looks at some of the major changes in the competitors focused primarily on the ICS detection market since the May update. Part 2 comes out next Tuesday and will map out where the competitors stand relative to each other and be a major change to the Tiers approach inthe May update.
CONSEQUENCE AND INL'S CCE The long awaited detail of INL’s Consequence-driven, Cyber-informed Engineering (CCE) methodology is now available in the Andy Bochman / Sarah Freemen book Countering Cyber Sabotage. I had the opportunity to interview the authors for an hour in this week’s Unsolicited Response episode that you can see below. There is a lot to like aboutthe
ARE YOUR ICS SECURITY PATCHING PLANS REALISTIC? An interesting and potentially important technical paper was published near the year end holidays and didn’t get the attention it deserved: Vulnerability Forecasting: In Theory and Practice by Éireann Leverett, Matilda Rhode and Adam Wedgbury of Airbus. The authors make the bold claim that is possible to predict the number of CVE’s fromthe NVD a year
ICS-PATCH
ICS-Patch What To Patch When In ICS? A Decision Tree Approach Version 0.5 – 13 Sept 2020 Introduction Applying security patches is part of a cybersecurity program, which HOME - DALE PETERSON: ICS SECURITY CATALYSTBLOGCONSULTINGHIRE DALE TO SPEAKPODCASTS4 EVENTSCONTACT He has pioneered numerous ICS security tools and techniques, such as the first intrusion detection signatures for ICS that are now in every commercial product. In 2007 Dale created the S4 Events to showcase the best offensive and defensive work in ICS security and build a community. S4 is now the largest and most advanced ICS event in theworld.
ICS DETECTION MARKET UPDATE See previous analysis on my ICS Detection Market page. We Have A Winner The ICS Detection Market is the clear ICS security market winner of 2021 to date. Even before the Colonial Pipeline incident it was clear that well funded and relentless marketing by vendors in this segment has achieved dominant mindshare. Visibility and detection 3 INCIDENT RESPONSE PLAYBOOKS FOR OT Playbook 1 – Enterprise Network Compromised. Pending additional details (this is written Monday afternoon) this may be the playbook needed for the Colonial Pipeline incident. Scenario: The enterprise network has been compromised, and there is currently no evidence of a related compromise in OT. For almost two decades many OT systems havehad
ICS DETECTION MARKET ANALYSIS ICS Detection Market Analysis - Dale Peterson: ICS Security Catalyst. Here are my thoughts on the the ICS Detection Market in reverse chronological order (most recent on top): From ICSJWG session on 9 June 2020 – The Future of ICS Security Products . A lot has changed even since June. YouTube. ICS DETECTION MARKET ANALYSIS detect attacks using a combination of signatures, anomaly detection and behavioral analysis. The vendors were mostly startups with a few exception, such as GE and Kaspersky. It was a simple matter of analyzing similar offerings across product, sales and marketing, headcount, finances and installed base. ICS BREACHES WILL HAPPEN Focus on Recovery and Resilience in 2021 We, the ICS security community and asset owners, need to grow up in 2021. There is near hysteria whenever there is an actual, potential or mythical breach of an ICS, regardless of the impact. And this is in an environment where the number and consequences of successful attacks ICS DETECTION MARKET ICS Detection Market – Part 1. 10 Dec 2020 | 2020, Detect. Part 1 looks at some of the major changes in the competitors focused primarily on the ICS detection market since the May update. Part 2 comes out next Tuesday and will map out where the competitors stand relative to each other and be a major change to the Tiers approach inthe May update.
CONSEQUENCE AND INL'S CCE The long awaited detail of INL’s Consequence-driven, Cyber-informed Engineering (CCE) methodology is now available in the Andy Bochman / Sarah Freemen book Countering Cyber Sabotage. I had the opportunity to interview the authors for an hour in this week’s Unsolicited Response episode that you can see below. There is a lot to like aboutthe
ARE YOUR ICS SECURITY PATCHING PLANS REALISTIC? An interesting and potentially important technical paper was published near the year end holidays and didn’t get the attention it deserved: Vulnerability Forecasting: In Theory and Practice by Éireann Leverett, Matilda Rhode and Adam Wedgbury of Airbus. The authors make the bold claim that is possible to predict the number of CVE’s fromthe NVD a year
ICS-PATCH
ICS-Patch What To Patch When In ICS? A Decision Tree Approach Version 0.5 – 13 Sept 2020 Introduction Applying security patches is part of a cybersecurity program, which2021 ARCHIVES
6 Apr 2021 | 2021. Three answers. 1. Women Women represent 51% of the population and 57% of the college graduates in the US. They comprise less than 10% of the OT Security workforce. Solving the problem could be as simple as adding women to the OT Security workforce until they ICS DETECTION MARKET ANALYSIS ICS Detection Market Analysis - Dale Peterson: ICS Security Catalyst. Here are my thoughts on the the ICS Detection Market in reverse chronological order (most recent on top): From ICSJWG session on 9 June 2020 – The Future of ICS Security Products . A lot has changed even since June. YouTube. ICS DETECTION MARKET ICS Detection Market – Part 1. 10 Dec 2020 | 2020, Detect. Part 1 looks at some of the major changes in the competitors focused primarily on the ICS detection market since the May update. Part 2 comes out next Tuesday and will map out where the competitors stand relative to each other and be a major change to the Tiers approach inthe May update.
THE BACK DOOR IS IRRELEVANT IF THE FRONT DOOR IS OPEN The Secretary of Energy is authorized to create ‘a criteria’ for equipment to be pre-qualified. Even a very basic four point criteria to address insecure by design would be a big step forward, such as: signed firmware with secure boot. encrypted and authenticated management protocols. authenticated ICS protocols for control andmonitoring.
ICS DETECTION MARKET Q2 UPDATE Part 2: Acquirers, Enterprise Vendors and Tier 3 See Part 1: COVID 19 Impact, Tier 2 and Tier 1 Analysis, and Valuation First the updated chart and then the analysis below. You will see big changes in Tiers 2 & 3. Funding data comes from Crunchbase. Acquirers and Enterprise Vendors When an ICS detection company SECURITY OUTCOMES IN ICS In broad terms it is to help the company reduce ICS cyber related risk to an acceptable level. This study measures the impact of security strategies on a set of eleven Security Program Outcomes across three categories. Enabling The Business examples: 1. keeping up HOW DO WE SOLVE THE OT CYBERSECURITY STAFFING CHALLENGES Three answers. 1. Women Women represent 51% of the population and 57% of the college graduates in the US. They comprise less than 10% of the OT Security workforce. Solving the problem could be as simple as adding women to the OT Security workforce until they reach close to their population percentage. Encouraging and recruiting WHY DID MICROSOFT ACQUIRE CYBERX? The rumors started in February and became reality this week. Microsoft acquired CyberX. The price is not a material event for Microsoft. It will never be officially released. A recent article claimed the price was $165M, and I predicted it would be substantially less if it occurred based on the acquisition prices of fellow Tier 2 vendorsIndegy
PROPERLY PRIORITIZING LEVEL 0 AND LEVEL 1 SECURITY The PLC, RTU, Controller or other device at Level 1 typically communicates with many sensors and actuators. It can be a perimeter security device that stops or limits attacks from reaching the Level 0 device from untrusted networks. Falsified or bad ICS SECURITY PATCHING: NEVER, NEXT, NOW The two things I like about Art’s approach are 1) It ties security patching to risk and 2) It is a simplified three tiered approach. Art presented a flowchart (see above) that asset owners use to determine if a patch should be applied Never, Next or Now. My guidance for the past five years has been a similar three-tiered approach. HOME - DALE PETERSON: ICS SECURITY CATALYSTBLOGCONSULTINGHIRE DALE TO SPEAKPODCASTS4 EVENTSCONTACT An Operator Turing Test. Proposal: A small group in the ICS world develop a test to determine if a “machine” can be trained from only historian data to perform as good (indistinguishable) or better than a representative Operator. ICS DETECTION MARKET UPDATE See previous analysis on my ICS Detection Market page. We Have A Winner The ICS Detection Market is the clear ICS security market winner of 2021 to date. Even before the Colonial Pipeline incident it was clear that well funded and relentless marketing by vendors in this segment has achieved dominant mindshare. Visibility and detection 3 INCIDENT RESPONSE PLAYBOOKS FOR OT If you will forgive yet another article inspired by the Colonial Pipeline incident it does represent the oldest of the three must have OT Incident Response Playbooks. ICS BREACHES WILL HAPPEN Focus on Recovery and Resilience in 2021 We, the ICS security community and asset owners, need to grow up in 2021. There is near hysteria whenever there is an actual, potential or mythical breach of an ICS, regardless of the impact. And this is in an environment where the number and consequences of successful attacks ICS DETECTION MARKET ANALYSIS Article: ICS Detection Market Analysis – Part 2 (Dec 2020) Article: ICS Detection Market Analysis – Part 1 (Dec 2020) Article: Explanations Wanted On ICS Risk Scores Article: Automated Risk Metrics: The Next Battleground For ICS Security Products Article: Why Did Microsoft Acquire CyberX? Article: ICS Detection Market Update Q2 2020 – Part 1: COVID 19 Impact, Tier 2 and Tier 1 Analysis ARE YOUR ICS SECURITY PATCHING PLANS REALISTIC? An interesting and potentially important technical paper was published near the year end holidays and didn’t get the attention it deserved: Vulnerability Forecasting: In Theory and Practice by Éireann Leverett, Matilda Rhode and Adam Wedgbury of Airbus. The authors make the bold claim that is possible to predict the number of CVE’s fromthe NVD a year
ICS DETECTION MARKET ANALYSIS Since I began seriously covering the ICS Detection Space in 2016, the products were quite similar. They passively listened on switch span ports and taps to: create an asset inventory (and provide vulnerability management but not asset management) detect attacks using a combination of signatures, anomaly detection and behavioral analysis The vendors were mostly startups with ICS DETECTION MARKET Part 1 looks at some of the major changes in the competitors focused primarily on the ICS detection market since the May update. Part 2 comes out next Tuesday and will map out where the competitors stand relative to each other and be a major change to the Tiers approach inthe May update. I
ICS-PATCH
ICS-Patch What To Patch When In ICS? A Decision Tree Approach Version 0.5 – 13 Sept 2020 Introduction Applying security patches is part of a cybersecurity program, which THE BACK DOOR IS IRRELEVANT IF THE FRONT DOOR IS OPEN No Insecure By Design ICS Should Be Pre-Qualified On May 1st President Trump issued an Executive Order On Securing the United States Bulk-Power System. This Executive Order could create a list of pre-qualified ICS equipment and vendors, as noted in the excerpt below: The Secretary may establish and publish criteria for recognizing particular equipment and HOME - DALE PETERSON: ICS SECURITY CATALYSTBLOGCONSULTINGHIRE DALE TO SPEAKPODCASTS4 EVENTSCONTACT An Operator Turing Test. Proposal: A small group in the ICS world develop a test to determine if a “machine” can be trained from only historian data to perform as good (indistinguishable) or better than a representative Operator. ICS DETECTION MARKET UPDATE See previous analysis on my ICS Detection Market page. We Have A Winner The ICS Detection Market is the clear ICS security market winner of 2021 to date. Even before the Colonial Pipeline incident it was clear that well funded and relentless marketing by vendors in this segment has achieved dominant mindshare. Visibility and detection 3 INCIDENT RESPONSE PLAYBOOKS FOR OT If you will forgive yet another article inspired by the Colonial Pipeline incident it does represent the oldest of the three must have OT Incident Response Playbooks. ICS BREACHES WILL HAPPEN Focus on Recovery and Resilience in 2021 We, the ICS security community and asset owners, need to grow up in 2021. There is near hysteria whenever there is an actual, potential or mythical breach of an ICS, regardless of the impact. And this is in an environment where the number and consequences of successful attacks ICS DETECTION MARKET ANALYSIS Article: ICS Detection Market Analysis – Part 2 (Dec 2020) Article: ICS Detection Market Analysis – Part 1 (Dec 2020) Article: Explanations Wanted On ICS Risk Scores Article: Automated Risk Metrics: The Next Battleground For ICS Security Products Article: Why Did Microsoft Acquire CyberX? Article: ICS Detection Market Update Q2 2020 – Part 1: COVID 19 Impact, Tier 2 and Tier 1 Analysis ARE YOUR ICS SECURITY PATCHING PLANS REALISTIC? An interesting and potentially important technical paper was published near the year end holidays and didn’t get the attention it deserved: Vulnerability Forecasting: In Theory and Practice by Éireann Leverett, Matilda Rhode and Adam Wedgbury of Airbus. The authors make the bold claim that is possible to predict the number of CVE’s fromthe NVD a year
ICS DETECTION MARKET ANALYSIS Since I began seriously covering the ICS Detection Space in 2016, the products were quite similar. They passively listened on switch span ports and taps to: create an asset inventory (and provide vulnerability management but not asset management) detect attacks using a combination of signatures, anomaly detection and behavioral analysis The vendors were mostly startups with ICS DETECTION MARKET Part 1 looks at some of the major changes in the competitors focused primarily on the ICS detection market since the May update. Part 2 comes out next Tuesday and will map out where the competitors stand relative to each other and be a major change to the Tiers approach inthe May update. I
ICS-PATCH
ICS-Patch What To Patch When In ICS? A Decision Tree Approach Version 0.5 – 13 Sept 2020 Introduction Applying security patches is part of a cybersecurity program, which THE BACK DOOR IS IRRELEVANT IF THE FRONT DOOR IS OPEN No Insecure By Design ICS Should Be Pre-Qualified On May 1st President Trump issued an Executive Order On Securing the United States Bulk-Power System. This Executive Order could create a list of pre-qualified ICS equipment and vendors, as noted in the excerpt below: The Secretary may establish and publish criteria for recognizing particular equipment and ICS BREACHES WILL HAPPEN Focus on Recovery and Resilience in 2021 We, the ICS security community and asset owners, need to grow up in 2021. There is near hysteria whenever there is an actual, potential or mythical breach of an ICS, regardless of the impact. And this is in an environment where the number and consequences of successful attacks2020-ARTICLES
I made a number of predictions in 2020, some overlapping, in both my coverage of the detection market and as a feature of the monthly ICS security month in review episodes of the Unsolicited Response podcast. ICS DETECTION MARKET ANALYSIS Article: ICS Detection Market Analysis – Part 2 (Dec 2020) Article: ICS Detection Market Analysis – Part 1 (Dec 2020) Article: Explanations Wanted On ICS Risk Scores Article: Automated Risk Metrics: The Next Battleground For ICS Security Products Article: Why Did Microsoft Acquire CyberX? Article: ICS Detection Market Update Q2 2020 – Part 1: COVID 19 Impact, Tier 2 and Tier 1 Analysis CONSEQUENCE AND INL'S CCE The long awaited detail of INL’s Consequence-driven, Cyber-informed Engineering (CCE) methodology is now available in the Andy Bochman / Sarah Freemen book Countering Cyber Sabotage. I had the opportunity to interview the authors for an hour in this week’s Unsolicited Response episode that you can see below. There is a lot to like aboutthe
LEGACY SYSTEM PROBLEM KEEPS GROWING If you find yourself in a hole, stop digging. Will Rogers The large amount of insecure legacy ICS and long ICS lifetimes mean we will need to live with this security risk for years / decades. We can argue about how long it should take to replace the deployed insecure-by-design ICS, but there is no BLOG - DALE PETERSON: ICS SECURITY CATALYST The World Economic Forum (WEF) recently published Cyber Resilience in the Oil and Gas Industry: Playbook for Boards and Corporate Officers. This is timely coming weeks after the Colonial Pipeline incident, which was a resilience failure not an OT security failure. ICS DETECTION MARKET Part 1 looks at some of the major changes in the competitors focused primarily on the ICS detection market since the May update.Part 2 comes out next Tuesday and will map out where the competitors stand relative to each other and be a major change to the Tiers approach inthe May update.
ANALYSIS OF DRAGOS PLATFORM STRATEGY THE REAL What is Dragos? They have a diagram on their site that shows three business areas: Threat Intelligence Threat Operations Center (which are consulting services including incident response) Platform (their detection and response product) Dragos currently dominates whatever market exists in ICS Threat Intelligence and Incident Response capabilities (and potentially in other areas of ICS security ICS DETECTION MARKET Q2 UPDATE Part 2: Acquirers, Enterprise Vendors and Tier 3 See Part 1: COVID 19 Impact, Tier 2 and Tier 1 Analysis, and Valuation First the updated chart and then the analysis below. You will see big changes in Tiers 2 & 3. Funding data comes from Crunchbase. Acquirers and Enterprise Vendors When an ICS detection company WHY DID MICROSOFT ACQUIRE CYBERX? The rumors started in February and became reality this week. Microsoft acquired CyberX. The price is not a material event for Microsoft. It will never be officially released. A recent article claimed the price was $165M, and I predicted it would be substantially less if it occurred based on the acquisition prices of fellow Tier 2 vendorsIndegy
HOME - DALE PETERSON: ICS SECURITY CATALYSTBLOGCONSULTINGHIRE DALE TO SPEAKPODCASTS4 EVENTSCONTACT He has pioneered numerous ICS security tools and techniques, such as the first intrusion detection signatures for ICS that are now in every commercial product. In 2007 Dale created the S4 Events to showcase the best offensive and defensive work in ICS security and build a community. S4 is now the largest and most advanced ICS event in theworld.
ICS DETECTION MARKET UPDATE See previous analysis on my ICS Detection Market page. We Have A Winner The ICS Detection Market is the clear ICS security market winner of 2021 to date. Even before the Colonial Pipeline incident it was clear that well funded and relentless marketing by vendors in this segment has achieved dominant mindshare. Visibility and detection 3 INCIDENT RESPONSE PLAYBOOKS FOR OT Playbook 1 – Enterprise Network Compromised. Pending additional details (this is written Monday afternoon) this may be the playbook needed for the Colonial Pipeline incident. Scenario: The enterprise network has been compromised, and there is currently no evidence of a related compromise in OT. For almost two decades many OT systems havehad
ICS DETECTION MARKET ANALYSIS ICS Detection Market Analysis - Dale Peterson: ICS Security Catalyst. Here are my thoughts on the the ICS Detection Market in reverse chronological order (most recent on top): From ICSJWG session on 9 June 2020 – The Future of ICS Security Products . A lot has changed even since June. YouTube. ICS DETECTION MARKET ANALYSIS detect attacks using a combination of signatures, anomaly detection and behavioral analysis. The vendors were mostly startups with a few exception, such as GE and Kaspersky. It was a simple matter of analyzing similar offerings across product, sales and marketing, headcount, finances and installed base. ICS BREACHES WILL HAPPEN Focus on Recovery and Resilience in 2021 We, the ICS security community and asset owners, need to grow up in 2021. There is near hysteria whenever there is an actual, potential or mythical breach of an ICS, regardless of the impact. And this is in an environment where the number and consequences of successful attacks ARE YOUR ICS SECURITY PATCHING PLANS REALISTIC? An interesting and potentially important technical paper was published near the year end holidays and didn’t get the attention it deserved: Vulnerability Forecasting: In Theory and Practice by Éireann Leverett, Matilda Rhode and Adam Wedgbury of Airbus. The authors make the bold claim that is possible to predict the number of CVE’s fromthe NVD a year
THE BACK DOOR IS IRRELEVANT IF THE FRONT DOOR IS OPEN The Secretary of Energy is authorized to create ‘a criteria’ for equipment to be pre-qualified. Even a very basic four point criteria to address insecure by design would be a big step forward, such as: signed firmware with secure boot. encrypted and authenticated management protocols. authenticated ICS protocols for control andmonitoring.
ICS-PATCH
ICS-Patch What To Patch When In ICS? A Decision Tree Approach Version 0.5 – 13 Sept 2020 Introduction Applying security patches is part of a cybersecurity program, which ICS SECURITY PATCHING: NEVER, NEXT, NOW The two things I like about Art’s approach are 1) It ties security patching to risk and 2) It is a simplified three tiered approach. Art presented a flowchart (see above) that asset owners use to determine if a patch should be applied Never, Next or Now. My guidance for the past five years has been a similar three-tiered approach. HOME - DALE PETERSON: ICS SECURITY CATALYSTBLOGCONSULTINGHIRE DALE TO SPEAKPODCASTS4 EVENTSCONTACT He has pioneered numerous ICS security tools and techniques, such as the first intrusion detection signatures for ICS that are now in every commercial product. In 2007 Dale created the S4 Events to showcase the best offensive and defensive work in ICS security and build a community. S4 is now the largest and most advanced ICS event in theworld.
ICS DETECTION MARKET UPDATE See previous analysis on my ICS Detection Market page. We Have A Winner The ICS Detection Market is the clear ICS security market winner of 2021 to date. Even before the Colonial Pipeline incident it was clear that well funded and relentless marketing by vendors in this segment has achieved dominant mindshare. Visibility and detection 3 INCIDENT RESPONSE PLAYBOOKS FOR OT Playbook 1 – Enterprise Network Compromised. Pending additional details (this is written Monday afternoon) this may be the playbook needed for the Colonial Pipeline incident. Scenario: The enterprise network has been compromised, and there is currently no evidence of a related compromise in OT. For almost two decades many OT systems havehad
ICS DETECTION MARKET ANALYSIS ICS Detection Market Analysis - Dale Peterson: ICS Security Catalyst. Here are my thoughts on the the ICS Detection Market in reverse chronological order (most recent on top): From ICSJWG session on 9 June 2020 – The Future of ICS Security Products . A lot has changed even since June. YouTube. ICS DETECTION MARKET ANALYSIS detect attacks using a combination of signatures, anomaly detection and behavioral analysis. The vendors were mostly startups with a few exception, such as GE and Kaspersky. It was a simple matter of analyzing similar offerings across product, sales and marketing, headcount, finances and installed base. ICS BREACHES WILL HAPPEN Focus on Recovery and Resilience in 2021 We, the ICS security community and asset owners, need to grow up in 2021. There is near hysteria whenever there is an actual, potential or mythical breach of an ICS, regardless of the impact. And this is in an environment where the number and consequences of successful attacks ARE YOUR ICS SECURITY PATCHING PLANS REALISTIC? An interesting and potentially important technical paper was published near the year end holidays and didn’t get the attention it deserved: Vulnerability Forecasting: In Theory and Practice by Éireann Leverett, Matilda Rhode and Adam Wedgbury of Airbus. The authors make the bold claim that is possible to predict the number of CVE’s fromthe NVD a year
THE BACK DOOR IS IRRELEVANT IF THE FRONT DOOR IS OPEN The Secretary of Energy is authorized to create ‘a criteria’ for equipment to be pre-qualified. Even a very basic four point criteria to address insecure by design would be a big step forward, such as: signed firmware with secure boot. encrypted and authenticated management protocols. authenticated ICS protocols for control andmonitoring.
ICS-PATCH
ICS-Patch What To Patch When In ICS? A Decision Tree Approach Version 0.5 – 13 Sept 2020 Introduction Applying security patches is part of a cybersecurity program, which ICS SECURITY PATCHING: NEVER, NEXT, NOW The two things I like about Art’s approach are 1) It ties security patching to risk and 2) It is a simplified three tiered approach. Art presented a flowchart (see above) that asset owners use to determine if a patch should be applied Never, Next or Now. My guidance for the past five years has been a similar three-tiered approach.2020-ARTICLES
Security Outcomes in ICS. 3 Dec 2020. Cisco recently published their 2021 Security Outcomes Study. It is worth a close look. Not so much for the results and conclusions applicable to the enterprise, but the methodology is worth adopting for the ICS CONSULTING - DALE PETERSON: ICS SECURITY CATALYST ICS & IIoT SECURITY CONSULTING SERVICES. Dale Peterson and his team have secured SCADA, DCS and other industrial control systems for over 15 years. Our clients across all sectors have achieved dramatic improvement in their security posture. We focus on increasing security rather than perfection, and we have developed proven methodologies. BLOG - DALE PETERSON: ICS SECURITY CATALYST The World Economic Forum (WEF) recently published Cyber Resilience in the Oil and Gas Industry: Playbook for Boards and Corporate Officers. This is timely coming weeks after the Colonial Pipeline incident, which was a resilience failure not an OT security failure. ICS DETECTION MARKET ANALYSIS ICS Detection Market Analysis - Dale Peterson: ICS Security Catalyst. Here are my thoughts on the the ICS Detection Market in reverse chronological order (most recent on top): From ICSJWG session on 9 June 2020 – The Future of ICS Security Products . A lot has changed even since June. YouTube. ICS BREACHES WILL HAPPEN Focus on Recovery and Resilience in 2021 We, the ICS security community and asset owners, need to grow up in 2021. There is near hysteria whenever there is an actual, potential or mythical breach of an ICS, regardless of the impact. And this is in an environment where the number and consequences of successful attacks ICS DETECTION MARKET ICS Detection Market – Part 1. 10 Dec 2020 | 2020, Detect. Part 1 looks at some of the major changes in the competitors focused primarily on the ICS detection market since the May update. Part 2 comes out next Tuesday and will map out where the competitors stand relative to each other and be a major change to the Tiers approach inthe May update.
LEGACY SYSTEM PROBLEM KEEPS GROWING We have increased the ‘legacy system’ problem with eight years of ICS deployments. We are still digging that hole. The optimist’s side is some of the Level 1 device vendors and some of the ICS protocol groups have addressed the problem. There are now encrypted and authenticated versions of many ICS protocols. There are also nowPLC’s
ICS DETECTION MARKET Q2 UPDATE Part 2: Acquirers, Enterprise Vendors and Tier 3 See Part 1: COVID 19 Impact, Tier 2 and Tier 1 Analysis, and Valuation First the updated chart and then the analysis below. You will see big changes in Tiers 2 & 3. Funding data comes from Crunchbase. Acquirers and Enterprise Vendors When an ICS detection company CONSEQUENCE AND INL'S CCE The long awaited detail of INL’s Consequence-driven, Cyber-informed Engineering (CCE) methodology is now available in the Andy Bochman / Sarah Freemen book Countering Cyber Sabotage. I had the opportunity to interview the authors for an hour in this week’s Unsolicited Response episode that you can see below. There is a lot to like aboutthe
WHY DID MICROSOFT ACQUIRE CYBERX? The rumors started in February and became reality this week. Microsoft acquired CyberX. The price is not a material event for Microsoft. It will never be officially released. A recent article claimed the price was $165M, and I predicted it would be substantially less if it occurred based on the acquisition prices of fellow Tier 2 vendorsIndegy
HOME - DALE PETERSON: ICS SECURITY CATALYSTBLOGCONSULTINGHIRE DALE TO SPEAKPODCASTS4 EVENTSCONTACT He has pioneered numerous ICS security tools and techniques, such as the first intrusion detection signatures for ICS that are now in every commercial product. In 2007 Dale created the S4 Events to showcase the best offensive and defensive work in ICS security and build a community. S4 is now the largest and most advanced ICS event in theworld.
ICS DETECTION MARKET UPDATE See previous analysis on my ICS Detection Market page. We Have A Winner The ICS Detection Market is the clear ICS security market winner of 2021 to date. Even before the Colonial Pipeline incident it was clear that well funded and relentless marketing by vendors in this segment has achieved dominant mindshare. Visibility and detection 3 INCIDENT RESPONSE PLAYBOOKS FOR OT Playbook 1 – Enterprise Network Compromised. Pending additional details (this is written Monday afternoon) this may be the playbook needed for the Colonial Pipeline incident. Scenario: The enterprise network has been compromised, and there is currently no evidence of a related compromise in OT. For almost two decades many OT systems havehad
ICS DETECTION MARKET ANALYSIS detect attacks using a combination of signatures, anomaly detection and behavioral analysis. The vendors were mostly startups with a few exception, such as GE and Kaspersky. It was a simple matter of analyzing similar offerings across product, sales and marketing, headcount, finances and installed base. ICS DETECTION MARKET ANALYSIS ICS Detection Market Analysis - Dale Peterson: ICS Security Catalyst. Here are my thoughts on the the ICS Detection Market in reverse chronological order (most recent on top): From ICSJWG session on 9 June 2020 – The Future of ICS Security Products . A lot has changed even since June. YouTube. ICS BREACHES WILL HAPPEN Focus on Recovery and Resilience in 2021 We, the ICS security community and asset owners, need to grow up in 2021. There is near hysteria whenever there is an actual, potential or mythical breach of an ICS, regardless of the impact. And this is in an environment where the number and consequences of successful attacks LEGACY SYSTEM PROBLEM KEEPS GROWING We have increased the ‘legacy system’ problem with eight years of ICS deployments. We are still digging that hole. The optimist’s side is some of the Level 1 device vendors and some of the ICS protocol groups have addressed the problem. There are now encrypted and authenticated versions of many ICS protocols. There are also nowPLC’s
ARE YOUR ICS SECURITY PATCHING PLANS REALISTIC? An interesting and potentially important technical paper was published near the year end holidays and didn’t get the attention it deserved: Vulnerability Forecasting: In Theory and Practice by Éireann Leverett, Matilda Rhode and Adam Wedgbury of Airbus. The authors make the bold claim that is possible to predict the number of CVE’s fromthe NVD a year
THE BACK DOOR IS IRRELEVANT IF THE FRONT DOOR IS OPEN The Secretary of Energy is authorized to create ‘a criteria’ for equipment to be pre-qualified. Even a very basic four point criteria to address insecure by design would be a big step forward, such as: signed firmware with secure boot. encrypted and authenticated management protocols. authenticated ICS protocols for control andmonitoring.
ICS-PATCH
ICS-Patch What To Patch When In ICS? A Decision Tree Approach Version 0.5 – 13 Sept 2020 Introduction Applying security patches is part of a cybersecurity program, which HOME - DALE PETERSON: ICS SECURITY CATALYSTBLOGCONSULTINGHIRE DALE TO SPEAKPODCASTS4 EVENTSCONTACT He has pioneered numerous ICS security tools and techniques, such as the first intrusion detection signatures for ICS that are now in every commercial product. In 2007 Dale created the S4 Events to showcase the best offensive and defensive work in ICS security and build a community. S4 is now the largest and most advanced ICS event in theworld.
ICS DETECTION MARKET UPDATE See previous analysis on my ICS Detection Market page. We Have A Winner The ICS Detection Market is the clear ICS security market winner of 2021 to date. Even before the Colonial Pipeline incident it was clear that well funded and relentless marketing by vendors in this segment has achieved dominant mindshare. Visibility and detection 3 INCIDENT RESPONSE PLAYBOOKS FOR OT Playbook 1 – Enterprise Network Compromised. Pending additional details (this is written Monday afternoon) this may be the playbook needed for the Colonial Pipeline incident. Scenario: The enterprise network has been compromised, and there is currently no evidence of a related compromise in OT. For almost two decades many OT systems havehad
ICS DETECTION MARKET ANALYSIS detect attacks using a combination of signatures, anomaly detection and behavioral analysis. The vendors were mostly startups with a few exception, such as GE and Kaspersky. It was a simple matter of analyzing similar offerings across product, sales and marketing, headcount, finances and installed base. ICS DETECTION MARKET ANALYSIS ICS Detection Market Analysis - Dale Peterson: ICS Security Catalyst. Here are my thoughts on the the ICS Detection Market in reverse chronological order (most recent on top): From ICSJWG session on 9 June 2020 – The Future of ICS Security Products . A lot has changed even since June. YouTube. ICS BREACHES WILL HAPPEN Focus on Recovery and Resilience in 2021 We, the ICS security community and asset owners, need to grow up in 2021. There is near hysteria whenever there is an actual, potential or mythical breach of an ICS, regardless of the impact. And this is in an environment where the number and consequences of successful attacks LEGACY SYSTEM PROBLEM KEEPS GROWING We have increased the ‘legacy system’ problem with eight years of ICS deployments. We are still digging that hole. The optimist’s side is some of the Level 1 device vendors and some of the ICS protocol groups have addressed the problem. There are now encrypted and authenticated versions of many ICS protocols. There are also nowPLC’s
ARE YOUR ICS SECURITY PATCHING PLANS REALISTIC? An interesting and potentially important technical paper was published near the year end holidays and didn’t get the attention it deserved: Vulnerability Forecasting: In Theory and Practice by Éireann Leverett, Matilda Rhode and Adam Wedgbury of Airbus. The authors make the bold claim that is possible to predict the number of CVE’s fromthe NVD a year
THE BACK DOOR IS IRRELEVANT IF THE FRONT DOOR IS OPEN The Secretary of Energy is authorized to create ‘a criteria’ for equipment to be pre-qualified. Even a very basic four point criteria to address insecure by design would be a big step forward, such as: signed firmware with secure boot. encrypted and authenticated management protocols. authenticated ICS protocols for control andmonitoring.
ICS-PATCH
ICS-Patch What To Patch When In ICS? A Decision Tree Approach Version 0.5 – 13 Sept 2020 Introduction Applying security patches is part of a cybersecurity program, which2020-ARTICLES
Security Outcomes in ICS. 3 Dec 2020. Cisco recently published their 2021 Security Outcomes Study. It is worth a close look. Not so much for the results and conclusions applicable to the enterprise, but the methodology is worth adopting for the ICS CONSULTING - DALE PETERSON: ICS SECURITY CATALYST ICS & IIoT SECURITY CONSULTING SERVICES. Dale Peterson and his team have secured SCADA, DCS and other industrial control systems for over 15 years. Our clients across all sectors have achieved dramatic improvement in their security posture. We focus on increasing security rather than perfection, and we have developed proven methodologies. BLOG - DALE PETERSON: ICS SECURITY CATALYST Two Tracks Needed – Remedial and Create The Future. 1 Jun 2021 | 2021. In 2008 I had three US electric utility clients who were making impressive progress in securing their ICS used in generation and transmission. They had implemented the basic security controls and were pushing with questions like “what should we do next year to bemore
I'M WAITING FOR
I’m waiting for a company that is ready for ransomware in the same way they would be ready for a weather event. Imagine something like the following response if this hypothetical company gets hit with ransomware: Today approximately 25% of our computers have been disabled by ransomware, and many of the remaining 75% of the ICS DETECTION MARKET ANALYSIS ICS Detection Market Analysis - Dale Peterson: ICS Security Catalyst. Here are my thoughts on the the ICS Detection Market in reverse chronological order (most recent on top): From ICSJWG session on 9 June 2020 – The Future of ICS Security Products . A lot has changed even since June. YouTube. CONSEQUENCE AND INL'S CCE The long awaited detail of INL’s Consequence-driven, Cyber-informed Engineering (CCE) methodology is now available in the Andy Bochman / Sarah Freemen book Countering Cyber Sabotage. I had the opportunity to interview the authors for an hour in this week’s Unsolicited Response episode that you can see below. There is a lot to like aboutthe
ICS DETECTION MARKET ICS Detection Market – Part 1. 10 Dec 2020 | 2020, Detect. Part 1 looks at some of the major changes in the competitors focused primarily on the ICS detection market since the May update. Part 2 comes out next Tuesday and will map out where the competitors stand relative to each other and be a major change to the Tiers approach inthe May update.
WHY DID MICROSOFT ACQUIRE CYBERX? The rumors started in February and became reality this week. Microsoft acquired CyberX. The price is not a material event for Microsoft. It will never be officially released. A recent article claimed the price was $165M, and I predicted it would be substantially less if it occurred based on the acquisition prices of fellow Tier 2 vendorsIndegy
ICS SECURITY PATCHING: NEVER, NEXT, NOW The two things I like about Art’s approach are 1) It ties security patching to risk and 2) It is a simplified three tiered approach. Art presented a flowchart (see above) that asset owners use to determine if a patch should be applied Never, Next or Now. My guidance for the past five years has been a similar three-tiered approach. ETHERNET PLC AND VFD CRASH / VULNERABILITY CAUSES NUCLEAR This is a fascinating real world case study and example why protocol stack security and reliability is so important. From a NRC report dated April 17, 2007:. On August 19, 2006, operators at Browns Ferry, Unit 3, manually scrammed the unit following a loss of both the 3A and 3B reactor recirculation pumps. HOME - DALE PETERSON: ICS SECURITY CATALYSTBLOGCONSULTINGHIRE DALE TO SPEAKPODCASTS4 EVENTSCONTACT He has pioneered numerous ICS security tools and techniques, such as the first intrusion detection signatures for ICS that are now in every commercial product. In 2007 Dale created the S4 Events to showcase the best offensive and defensive work in ICS security and build a community. S4 is now the largest and most advanced ICS event in theworld.
ICS DETECTION MARKET UPDATE See previous analysis on my ICS Detection Market page. We Have A Winner The ICS Detection Market is the clear ICS security market winner of 2021 to date. Even before the Colonial Pipeline incident it was clear that well funded and relentless marketing by vendors in this segment has achieved dominant mindshare. Visibility and detection 3 INCIDENT RESPONSE PLAYBOOKS FOR OT Playbook 1 – Enterprise Network Compromised. Pending additional details (this is written Monday afternoon) this may be the playbook needed for the Colonial Pipeline incident. Scenario: The enterprise network has been compromised, and there is currently no evidence of a related compromise in OT. For almost two decades many OT systems havehad
ICS DETECTION MARKET ANALYSIS ICS Detection Market Analysis - Dale Peterson: ICS Security Catalyst. Here are my thoughts on the the ICS Detection Market in reverse chronological order (most recent on top): From ICSJWG session on 9 June 2020 – The Future of ICS Security Products . A lot has changed even since June. YouTube. ICS DETECTION MARKET ANALYSIS detect attacks using a combination of signatures, anomaly detection and behavioral analysis. The vendors were mostly startups with a few exception, such as GE and Kaspersky. It was a simple matter of analyzing similar offerings across product, sales and marketing, headcount, finances and installed base. ICS BREACHES WILL HAPPEN Focus on Recovery and Resilience in 2021 We, the ICS security community and asset owners, need to grow up in 2021. There is near hysteria whenever there is an actual, potential or mythical breach of an ICS, regardless of the impact. And this is in an environment where the number and consequences of successful attacks ARE YOUR ICS SECURITY PATCHING PLANS REALISTIC? An interesting and potentially important technical paper was published near the year end holidays and didn’t get the attention it deserved: Vulnerability Forecasting: In Theory and Practice by Éireann Leverett, Matilda Rhode and Adam Wedgbury of Airbus. The authors make the bold claim that is possible to predict the number of CVE’s fromthe NVD a year
THE BACK DOOR IS IRRELEVANT IF THE FRONT DOOR IS OPEN The Secretary of Energy is authorized to create ‘a criteria’ for equipment to be pre-qualified. Even a very basic four point criteria to address insecure by design would be a big step forward, such as: signed firmware with secure boot. encrypted and authenticated management protocols. authenticated ICS protocols for control andmonitoring.
ICS-PATCH
ICS-Patch What To Patch When In ICS? A Decision Tree Approach Version 0.5 – 13 Sept 2020 Introduction Applying security patches is part of a cybersecurity program, which ICS SECURITY PATCHING: NEVER, NEXT, NOW The two things I like about Art’s approach are 1) It ties security patching to risk and 2) It is a simplified three tiered approach. Art presented a flowchart (see above) that asset owners use to determine if a patch should be applied Never, Next or Now. My guidance for the past five years has been a similar three-tiered approach. HOME - DALE PETERSON: ICS SECURITY CATALYSTBLOGCONSULTINGHIRE DALE TO SPEAKPODCASTS4 EVENTSCONTACT He has pioneered numerous ICS security tools and techniques, such as the first intrusion detection signatures for ICS that are now in every commercial product. In 2007 Dale created the S4 Events to showcase the best offensive and defensive work in ICS security and build a community. S4 is now the largest and most advanced ICS event in theworld.
ICS DETECTION MARKET UPDATE See previous analysis on my ICS Detection Market page. We Have A Winner The ICS Detection Market is the clear ICS security market winner of 2021 to date. Even before the Colonial Pipeline incident it was clear that well funded and relentless marketing by vendors in this segment has achieved dominant mindshare. Visibility and detection 3 INCIDENT RESPONSE PLAYBOOKS FOR OT Playbook 1 – Enterprise Network Compromised. Pending additional details (this is written Monday afternoon) this may be the playbook needed for the Colonial Pipeline incident. Scenario: The enterprise network has been compromised, and there is currently no evidence of a related compromise in OT. For almost two decades many OT systems havehad
ICS DETECTION MARKET ANALYSIS ICS Detection Market Analysis - Dale Peterson: ICS Security Catalyst. Here are my thoughts on the the ICS Detection Market in reverse chronological order (most recent on top): From ICSJWG session on 9 June 2020 – The Future of ICS Security Products . A lot has changed even since June. YouTube. ICS DETECTION MARKET ANALYSIS detect attacks using a combination of signatures, anomaly detection and behavioral analysis. The vendors were mostly startups with a few exception, such as GE and Kaspersky. It was a simple matter of analyzing similar offerings across product, sales and marketing, headcount, finances and installed base. ICS BREACHES WILL HAPPEN Focus on Recovery and Resilience in 2021 We, the ICS security community and asset owners, need to grow up in 2021. There is near hysteria whenever there is an actual, potential or mythical breach of an ICS, regardless of the impact. And this is in an environment where the number and consequences of successful attacks ARE YOUR ICS SECURITY PATCHING PLANS REALISTIC? An interesting and potentially important technical paper was published near the year end holidays and didn’t get the attention it deserved: Vulnerability Forecasting: In Theory and Practice by Éireann Leverett, Matilda Rhode and Adam Wedgbury of Airbus. The authors make the bold claim that is possible to predict the number of CVE’s fromthe NVD a year
THE BACK DOOR IS IRRELEVANT IF THE FRONT DOOR IS OPEN The Secretary of Energy is authorized to create ‘a criteria’ for equipment to be pre-qualified. Even a very basic four point criteria to address insecure by design would be a big step forward, such as: signed firmware with secure boot. encrypted and authenticated management protocols. authenticated ICS protocols for control andmonitoring.
ICS-PATCH
ICS-Patch What To Patch When In ICS? A Decision Tree Approach Version 0.5 – 13 Sept 2020 Introduction Applying security patches is part of a cybersecurity program, which ICS SECURITY PATCHING: NEVER, NEXT, NOW The two things I like about Art’s approach are 1) It ties security patching to risk and 2) It is a simplified three tiered approach. Art presented a flowchart (see above) that asset owners use to determine if a patch should be applied Never, Next or Now. My guidance for the past five years has been a similar three-tiered approach.2020-ARTICLES
Security Outcomes in ICS. 3 Dec 2020. Cisco recently published their 2021 Security Outcomes Study. It is worth a close look. Not so much for the results and conclusions applicable to the enterprise, but the methodology is worth adopting for the ICS CONSULTING - DALE PETERSON: ICS SECURITY CATALYST ICS & IIoT SECURITY CONSULTING SERVICES. Dale Peterson and his team have secured SCADA, DCS and other industrial control systems for over 15 years. Our clients across all sectors have achieved dramatic improvement in their security posture. We focus on increasing security rather than perfection, and we have developed proven methodologies. BLOG - DALE PETERSON: ICS SECURITY CATALYST The World Economic Forum (WEF) recently published Cyber Resilience in the Oil and Gas Industry: Playbook for Boards and Corporate Officers. This is timely coming weeks after the Colonial Pipeline incident, which was a resilience failure not an OT security failure. ICS DETECTION MARKET ANALYSIS ICS Detection Market Analysis - Dale Peterson: ICS Security Catalyst. Here are my thoughts on the the ICS Detection Market in reverse chronological order (most recent on top): From ICSJWG session on 9 June 2020 – The Future of ICS Security Products . A lot has changed even since June. YouTube. ICS BREACHES WILL HAPPEN Focus on Recovery and Resilience in 2021 We, the ICS security community and asset owners, need to grow up in 2021. There is near hysteria whenever there is an actual, potential or mythical breach of an ICS, regardless of the impact. And this is in an environment where the number and consequences of successful attacks ICS DETECTION MARKET ICS Detection Market – Part 1. 10 Dec 2020 | 2020, Detect. Part 1 looks at some of the major changes in the competitors focused primarily on the ICS detection market since the May update. Part 2 comes out next Tuesday and will map out where the competitors stand relative to each other and be a major change to the Tiers approach inthe May update.
LEGACY SYSTEM PROBLEM KEEPS GROWING We have increased the ‘legacy system’ problem with eight years of ICS deployments. We are still digging that hole. The optimist’s side is some of the Level 1 device vendors and some of the ICS protocol groups have addressed the problem. There are now encrypted and authenticated versions of many ICS protocols. There are also nowPLC’s
ICS DETECTION MARKET Q2 UPDATE Part 2: Acquirers, Enterprise Vendors and Tier 3 See Part 1: COVID 19 Impact, Tier 2 and Tier 1 Analysis, and Valuation First the updated chart and then the analysis below. You will see big changes in Tiers 2 & 3. Funding data comes from Crunchbase. Acquirers and Enterprise Vendors When an ICS detection company CONSEQUENCE AND INL'S CCE The long awaited detail of INL’s Consequence-driven, Cyber-informed Engineering (CCE) methodology is now available in the Andy Bochman / Sarah Freemen book Countering Cyber Sabotage. I had the opportunity to interview the authors for an hour in this week’s Unsolicited Response episode that you can see below. There is a lot to like aboutthe
WHY DID MICROSOFT ACQUIRE CYBERX? The rumors started in February and became reality this week. Microsoft acquired CyberX. The price is not a material event for Microsoft. It will never be officially released. A recent article claimed the price was $165M, and I predicted it would be substantially less if it occurred based on the acquisition prices of fellow Tier 2 vendorsIndegy
HOME - DALE PETERSON: ICS SECURITY CATALYSTBLOGCONSULTINGHIRE DALE TO SPEAKPODCASTS4 EVENTSCONTACT He has pioneered numerous ICS security tools and techniques, such as the first intrusion detection signatures for ICS that are now in every commercial product. In 2007 Dale created the S4 Events to showcase the best offensive and defensive work in ICS security and build a community. S4 is now the largest and most advanced ICS event in theworld.
ICS DETECTION MARKET UPDATE See previous analysis on my ICS Detection Market page. We Have A Winner The ICS Detection Market is the clear ICS security market winner of 2021 to date. Even before the Colonial Pipeline incident it was clear that well funded and relentless marketing by vendors in this segment has achieved dominant mindshare. Visibility and detection2020-ARTICLES
Security Outcomes in ICS. 3 Dec 2020. Cisco recently published their 2021 Security Outcomes Study. It is worth a close look. Not so much for the results and conclusions applicable to the enterprise, but the methodology is worth adopting for the ICS 3 INCIDENT RESPONSE PLAYBOOKS FOR OT Playbook 1 – Enterprise Network Compromised. Pending additional details (this is written Monday afternoon) this may be the playbook needed for the Colonial Pipeline incident. Scenario: The enterprise network has been compromised, and there is currently no evidence of a related compromise in OT. For almost two decades many OT systems havehad
ICS DETECTION MARKET ANALYSIS ICS Detection Market Analysis - Dale Peterson: ICS Security Catalyst. Here are my thoughts on the the ICS Detection Market in reverse chronological order (most recent on top): From ICSJWG session on 9 June 2020 – The Future of ICS Security Products . A lot has changed even since June. YouTube. ICS DETECTION MARKET ANALYSIS detect attacks using a combination of signatures, anomaly detection and behavioral analysis. The vendors were mostly startups with a few exception, such as GE and Kaspersky. It was a simple matter of analyzing similar offerings across product, sales and marketing, headcount, finances and installed base. ARE YOUR ICS SECURITY PATCHING PLANS REALISTIC? An interesting and potentially important technical paper was published near the year end holidays and didn’t get the attention it deserved: Vulnerability Forecasting: In Theory and Practice by Éireann Leverett, Matilda Rhode and Adam Wedgbury of Airbus. The authors make the bold claim that is possible to predict the number of CVE’s fromthe NVD a year
THE BACK DOOR IS IRRELEVANT IF THE FRONT DOOR IS OPEN The Secretary of Energy is authorized to create ‘a criteria’ for equipment to be pre-qualified. Even a very basic four point criteria to address insecure by design would be a big step forward, such as: signed firmware with secure boot. encrypted and authenticated management protocols. authenticated ICS protocols for control andmonitoring.
ICS-PATCH
ICS-Patch What To Patch When In ICS? A Decision Tree Approach Version 0.5 – 13 Sept 2020 Introduction Applying security patches is part of a cybersecurity program, which ETHERNET PLC AND VFD CRASH / VULNERABILITY CAUSES NUCLEAR This is a fascinating real world case study and example why protocol stack security and reliability is so important. From a NRC report dated April 17, 2007:. On August 19, 2006, operators at Browns Ferry, Unit 3, manually scrammed the unit following a loss of both the 3A and 3B reactor recirculation pumps. HOME - DALE PETERSON: ICS SECURITY CATALYSTBLOGCONSULTINGHIRE DALE TO SPEAKPODCASTS4 EVENTSCONTACT He has pioneered numerous ICS security tools and techniques, such as the first intrusion detection signatures for ICS that are now in every commercial product. In 2007 Dale created the S4 Events to showcase the best offensive and defensive work in ICS security and build a community. S4 is now the largest and most advanced ICS event in theworld.
ICS DETECTION MARKET UPDATE See previous analysis on my ICS Detection Market page. We Have A Winner The ICS Detection Market is the clear ICS security market winner of 2021 to date. Even before the Colonial Pipeline incident it was clear that well funded and relentless marketing by vendors in this segment has achieved dominant mindshare. Visibility and detection2020-ARTICLES
Security Outcomes in ICS. 3 Dec 2020. Cisco recently published their 2021 Security Outcomes Study. It is worth a close look. Not so much for the results and conclusions applicable to the enterprise, but the methodology is worth adopting for the ICS 3 INCIDENT RESPONSE PLAYBOOKS FOR OT Playbook 1 – Enterprise Network Compromised. Pending additional details (this is written Monday afternoon) this may be the playbook needed for the Colonial Pipeline incident. Scenario: The enterprise network has been compromised, and there is currently no evidence of a related compromise in OT. For almost two decades many OT systems havehad
ICS DETECTION MARKET ANALYSIS ICS Detection Market Analysis - Dale Peterson: ICS Security Catalyst. Here are my thoughts on the the ICS Detection Market in reverse chronological order (most recent on top): From ICSJWG session on 9 June 2020 – The Future of ICS Security Products . A lot has changed even since June. YouTube. ICS DETECTION MARKET ANALYSIS detect attacks using a combination of signatures, anomaly detection and behavioral analysis. The vendors were mostly startups with a few exception, such as GE and Kaspersky. It was a simple matter of analyzing similar offerings across product, sales and marketing, headcount, finances and installed base. ARE YOUR ICS SECURITY PATCHING PLANS REALISTIC? An interesting and potentially important technical paper was published near the year end holidays and didn’t get the attention it deserved: Vulnerability Forecasting: In Theory and Practice by Éireann Leverett, Matilda Rhode and Adam Wedgbury of Airbus. The authors make the bold claim that is possible to predict the number of CVE’s fromthe NVD a year
THE BACK DOOR IS IRRELEVANT IF THE FRONT DOOR IS OPEN The Secretary of Energy is authorized to create ‘a criteria’ for equipment to be pre-qualified. Even a very basic four point criteria to address insecure by design would be a big step forward, such as: signed firmware with secure boot. encrypted and authenticated management protocols. authenticated ICS protocols for control andmonitoring.
ICS-PATCH
ICS-Patch What To Patch When In ICS? A Decision Tree Approach Version 0.5 – 13 Sept 2020 Introduction Applying security patches is part of a cybersecurity program, which ETHERNET PLC AND VFD CRASH / VULNERABILITY CAUSES NUCLEAR This is a fascinating real world case study and example why protocol stack security and reliability is so important. From a NRC report dated April 17, 2007:. On August 19, 2006, operators at Browns Ferry, Unit 3, manually scrammed the unit following a loss of both the 3A and 3B reactor recirculation pumps. CONSULTING - DALE PETERSON: ICS SECURITY CATALYST ICS & IIoT SECURITY CONSULTING SERVICES. Dale Peterson and his team have secured SCADA, DCS and other industrial control systems for over 15 years. Our clients across all sectors have achieved dramatic improvement in their security posture. We focus on increasing security rather than perfection, and we have developed proven methodologies. BLOG - DALE PETERSON: ICS SECURITY CATALYST The World Economic Forum (WEF) recently published Cyber Resilience in the Oil and Gas Industry: Playbook for Boards and Corporate Officers. This is timely coming weeks after the Colonial Pipeline incident, which was a resilience failure not an OT security failure. ICS DETECTION MARKET ANALYSIS ICS Detection Market Analysis - Dale Peterson: ICS Security Catalyst. Here are my thoughts on the the ICS Detection Market in reverse chronological order (most recent on top): From ICSJWG session on 9 June 2020 – The Future of ICS Security Products . A lot has changed even since June. YouTube. CONTACT - DALE PETERSON: ICS SECURITY CATALYST Address and Phone. Dale Peterson c/o Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130. Sunrise, FL 33323 USA. Email: info@digitalbond.com. ICS BREACHES WILL HAPPEN Focus on Recovery and Resilience in 2021 We, the ICS security community and asset owners, need to grow up in 2021. There is near hysteria whenever there is an actual, potential or mythical breach of an ICS, regardless of the impact. And this is in an environment where the number and consequences of successful attacks PODCAST - DALE PETERSON: ICS SECURITY CATALYST Episodes Every Tuesday and Thursday. Tuesday’s episodes include Dale’s opening monologue, guests and topics that are on the leading, or even bleeding, edge of OT and ICS security, and your questions. On Thursdays the feed will include the audio version of Dale’s weekly article. Please subscribe and rate on your favorite podcast provider. LEGACY SYSTEM PROBLEM KEEPS GROWING We have increased the ‘legacy system’ problem with eight years of ICS deployments. We are still digging that hole. The optimist’s side is some of the Level 1 device vendors and some of the ICS protocol groups have addressed the problem. There are now encrypted and authenticated versions of many ICS protocols. There are also nowPLC’s
ICS DETECTION MARKET Q2 UPDATE Part 2: Acquirers, Enterprise Vendors and Tier 3 See Part 1: COVID 19 Impact, Tier 2 and Tier 1 Analysis, and Valuation First the updated chart and then the analysis below. You will see big changes in Tiers 2 & 3. Funding data comes from Crunchbase. Acquirers and Enterprise Vendors When an ICS detection company CONSEQUENCE AND INL'S CCE The long awaited detail of INL’s Consequence-driven, Cyber-informed Engineering (CCE) methodology is now available in the Andy Bochman / Sarah Freemen book Countering Cyber Sabotage. I had the opportunity to interview the authors for an hour in this week’s Unsolicited Response episode that you can see below. There is a lot to like aboutthe
WHY DID MICROSOFT ACQUIRE CYBERX? The rumors started in February and became reality this week. Microsoft acquired CyberX. The price is not a material event for Microsoft. It will never be officially released. A recent article claimed the price was $165M, and I predicted it would be substantially less if it occurred based on the acquisition prices of fellow Tier 2 vendorsIndegy
HOME - DALE PETERSON: ICS SECURITY CATALYSTBLOGCONSULTINGHIRE DALE TO SPEAKPODCASTS4 EVENTSCONTACT An Operator Turing Test. Proposal: A small group in the ICS world develop a test to determine if a “machine” can be trained from only historian data to perform as good (indistinguishable) or better than a representative Operator. ICS DETECTION MARKET UPDATE See previous analysis on my ICS Detection Market page. We Have A Winner The ICS Detection Market is the clear ICS security market winner of 2021 to date. Even before the Colonial Pipeline incident it was clear that well funded and relentless marketing by vendors in this segment has achieved dominant mindshare. Visibility and detection2020-ARTICLES
I made a number of predictions in 2020, some overlapping, in both my coverage of the detection market and as a feature of the monthly ICS security month in review episodes of the Unsolicited Response podcast. ICS DETECTION MARKET ANALYSIS Article: ICS Detection Market Analysis – Part 2 (Dec 2020) Article: ICS Detection Market Analysis – Part 1 (Dec 2020) Article: Explanations Wanted On ICS Risk Scores Article: Automated Risk Metrics: The Next Battleground For ICS Security Products Article: Why Did Microsoft Acquire CyberX? Article: ICS Detection Market Update Q2 2020 – Part 1: COVID 19 Impact, Tier 2 and Tier 1 Analysis 3 INCIDENT RESPONSE PLAYBOOKS FOR OT If you will forgive yet another article inspired by the Colonial Pipeline incident it does represent the oldest of the three must have OT Incident Response Playbooks. ICS DETECTION MARKET ANALYSIS Since I began seriously covering the ICS Detection Space in 2016, the products were quite similar. They passively listened on switch span ports and taps to: create an asset inventory (and provide vulnerability management but not asset management) detect attacks using a combination of signatures, anomaly detection and behavioral analysis The vendors were mostly startups with ICS BREACHES WILL HAPPEN Focus on Recovery and Resilience in 2021 We, the ICS security community and asset owners, need to grow up in 2021. There is near hysteria whenever there is an actual, potential or mythical breach of an ICS, regardless of the impact. And this is in an environment where the number and consequences of successful attacks ARE YOUR ICS SECURITY PATCHING PLANS REALISTIC? An interesting and potentially important technical paper was published near the year end holidays and didn’t get the attention it deserved: Vulnerability Forecasting: In Theory and Practice by Éireann Leverett, Matilda Rhode and Adam Wedgbury of Airbus. The authors make the bold claim that is possible to predict the number of CVE’s fromthe NVD a year
THE BACK DOOR IS IRRELEVANT IF THE FRONT DOOR IS OPEN No Insecure By Design ICS Should Be Pre-Qualified On May 1st President Trump issued an Executive Order On Securing the United States Bulk-Power System. This Executive Order could create a list of pre-qualified ICS equipment and vendors, as noted in the excerpt below: The Secretary may establish and publish criteria for recognizing particular equipment andICS-PATCH
ICS-Patch What To Patch When In ICS? A Decision Tree Approach Version 0.5 – 13 Sept 2020 Introduction Applying security patches is part of a cybersecurity program, which HOME - DALE PETERSON: ICS SECURITY CATALYSTBLOGCONSULTINGHIRE DALE TO SPEAKPODCASTS4 EVENTSCONTACT An Operator Turing Test. Proposal: A small group in the ICS world develop a test to determine if a “machine” can be trained from only historian data to perform as good (indistinguishable) or better than a representative Operator. ICS DETECTION MARKET UPDATE See previous analysis on my ICS Detection Market page. We Have A Winner The ICS Detection Market is the clear ICS security market winner of 2021 to date. Even before the Colonial Pipeline incident it was clear that well funded and relentless marketing by vendors in this segment has achieved dominant mindshare. Visibility and detection2020-ARTICLES
I made a number of predictions in 2020, some overlapping, in both my coverage of the detection market and as a feature of the monthly ICS security month in review episodes of the Unsolicited Response podcast. ICS DETECTION MARKET ANALYSIS Article: ICS Detection Market Analysis – Part 2 (Dec 2020) Article: ICS Detection Market Analysis – Part 1 (Dec 2020) Article: Explanations Wanted On ICS Risk Scores Article: Automated Risk Metrics: The Next Battleground For ICS Security Products Article: Why Did Microsoft Acquire CyberX? Article: ICS Detection Market Update Q2 2020 – Part 1: COVID 19 Impact, Tier 2 and Tier 1 Analysis 3 INCIDENT RESPONSE PLAYBOOKS FOR OT If you will forgive yet another article inspired by the Colonial Pipeline incident it does represent the oldest of the three must have OT Incident Response Playbooks. ICS DETECTION MARKET ANALYSIS Since I began seriously covering the ICS Detection Space in 2016, the products were quite similar. They passively listened on switch span ports and taps to: create an asset inventory (and provide vulnerability management but not asset management) detect attacks using a combination of signatures, anomaly detection and behavioral analysis The vendors were mostly startups with ICS BREACHES WILL HAPPEN Focus on Recovery and Resilience in 2021 We, the ICS security community and asset owners, need to grow up in 2021. There is near hysteria whenever there is an actual, potential or mythical breach of an ICS, regardless of the impact. And this is in an environment where the number and consequences of successful attacks ARE YOUR ICS SECURITY PATCHING PLANS REALISTIC? An interesting and potentially important technical paper was published near the year end holidays and didn’t get the attention it deserved: Vulnerability Forecasting: In Theory and Practice by Éireann Leverett, Matilda Rhode and Adam Wedgbury of Airbus. The authors make the bold claim that is possible to predict the number of CVE’s fromthe NVD a year
THE BACK DOOR IS IRRELEVANT IF THE FRONT DOOR IS OPEN No Insecure By Design ICS Should Be Pre-Qualified On May 1st President Trump issued an Executive Order On Securing the United States Bulk-Power System. This Executive Order could create a list of pre-qualified ICS equipment and vendors, as noted in the excerpt below: The Secretary may establish and publish criteria for recognizing particular equipment andICS-PATCH
ICS-Patch What To Patch When In ICS? A Decision Tree Approach Version 0.5 – 13 Sept 2020 Introduction Applying security patches is part of a cybersecurity program, which2020-ARTICLES
I made a number of predictions in 2020, some overlapping, in both my coverage of the detection market and as a feature of the monthly ICS security month in review episodes of the Unsolicited Response podcast. CONSULTING - DALE PETERSON: ICS SECURITY CATALYST PROJECTS OR RETAINER. You can work with Dale on a project basis with a set scope and deliverables or have him on retainer. The retainer services allow you to ask him questions by email or phone as needed and make Dale a great, as needed, addition to your ICS security team. BLOG - DALE PETERSON: ICS SECURITY CATALYST The World Economic Forum (WEF) recently published Cyber Resilience in the Oil and Gas Industry: Playbook for Boards and Corporate Officers. This is timely coming weeks after the Colonial Pipeline incident, which was a resilience failure not an OT security failure. ICS BREACHES WILL HAPPEN Focus on Recovery and Resilience in 2021 We, the ICS security community and asset owners, need to grow up in 2021. There is near hysteria whenever there is an actual, potential or mythical breach of an ICS, regardless of the impact. And this is in an environment where the number and consequences of successful attacks CONTACT - DALE PETERSON: ICS SECURITY CATALYST Address and Phone. Dale Peterson c/o Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323 USA Email: info@digitalbond.com LEGACY SYSTEM PROBLEM KEEPS GROWING If you find yourself in a hole, stop digging. Will Rogers The large amount of insecure legacy ICS and long ICS lifetimes mean we will need to live with this security risk for years / decades. We can argue about how long it should take to replace the deployed insecure-by-design ICS, but there is no PODCAST - DALE PETERSON: ICS SECURITY CATALYST Dale interviews Ed Schweitzer of SEL on the S4x20 Main Stage. Ed is a prolific inventor and still very technical almost 3 decades after he invented the digital relay and started SEL. ICS DETECTION MARKET Q2 UPDATE Part 2: Acquirers, Enterprise Vendors and Tier 3 See Part 1: COVID 19 Impact, Tier 2 and Tier 1 Analysis, and Valuation First the updated chart and then the analysis below. You will see big changes in Tiers 2 & 3. Funding data comes from Crunchbase. Acquirers and Enterprise Vendors When an ICS detection company S4 - DALE PETERSON: ICS SECURITY CATALYST S4x22 Jan 25 - 27 in Miami South Beach. Visit S4 Site. HOME BLOG CONSULTING SPEAKING PODCAST S4 CONTACT. BIOGRAPHY PRIVACY POLICY WHY DID MICROSOFT ACQUIRE CYBERX? The rumors started in February and became reality this week. Microsoft acquired CyberX. The price is not a material event for Microsoft. It will never be officially released. A recent article claimed the price was $165M, and I predicted it would be substantially less if it occurred based on the acquisition prices of fellow Tier 2 vendorsIndegy
* BLOG
* CONSULTING
* SPEAKING
* PODCAST
* S4
* CONTACT
Select Page
* BLOG
* CONSULTING
* SPEAKING
* PODCAST
* S4
* CONTACT
GET DALE'S ICS SECURITY NEWS & NOTES EMAIL EVERY FRIDAYSUBSCRIBE
DALE PETERSON SECURES ICS For over 15 years he has been on the leading/bleeding edge helping security conscious asset owners effectively and efficiently manage risk to their critical assets. He has pioneered numerous ICS security tools and techniques, such as the first intrusion detection signatures for ICS that are now in every commercial product. In 2007 Dale created the S4 Events to showcase the best offensive and defensive work in ICS security and build a community. S4 is now the largest and most advanced ICS event in the world. Dale is constantly pushing and prodding the ICS community to move faster and get better.READ MY STORY>>
WATCH THIS
READ THIS
AN OPERATOR TURING TEST Proposal: A small group in the ICS world develop a test to determine if a “machine” can be trained from only historian data to perform as good (indistinguishable) or better than a representative Operator. In 1950 Alan Turing wrote an article on what he called “theimitation game”
in an
effort to …
>
READ MORE>>
WATCH THIS
UNSOLICITED RESPONSE PODCAST - ARE SIEMS DOOMED TO FAIL?Audio Player
https://traffic.libsyn.com/secure/unsolicitedresponse/21-3_Are_SIEMs_Doomed_To_Fail_Final.mp300:00
00:00
00:00
Use Up/Down Arrow keys to increase or decrease volume. DHS CISA DIRECTOR KREBS INTERVIEW It was actually the first time I’ve met or spoken with Chris. I found him to be frank, thoughtful and most importantly less constrained into bureaucratic speak than usual for someone at his level in government. We talk about the effective use of DHS’s big megaphone, the status of information sharing, reaching out to small / medium critical infrastructure, the future of ICSJWG and more.Watch >>
STAY IN TOUCH WITH ME* Follow Follow
* Follow Follow
* Follow Follow
* Follow Follow
* Follow Follow
CONTACT DALE
Name
Email Address
Message
8 + 3 =
Submit
UPCOMING EVENTS
ACCENTURE OPERATION: NEXT CLOSING KEYNOTE ... MARCH 24TH Dale will speak on Creating The Future of OT and ICS Security S4X22 ... 25-27 JAN 2022 IN MIAMI SOUTH BEACH Save the date. Big comeback event after one year off! 2021/2020 PAST EVENTS ICS CYBERSEC 2021 ISRAEL ... FEBRUARY 11TH Dale spoke on the topic of Less FORTINET SECURE OT 2020 VIRTUAL Dale's keynote on Innovation Through Disruption.
HACK THE CAPITOL VIRTUAL Led panel discussion on VC for ICS Security companies OT-ISAC VIRTUAL KEYNOTE ICSJWG VIRTUAL MEETING The Future of ICS Security Products(video)
S4X20 IN MIAMI SOUTH BEACH See the videos from the event. HOME BLOG CONSULTING SPEAKING PODCASTS4
CONTACT
BIOGRAPHY PRIVACY POLICY* RSS
Copyright © 2021 Digital Bond, Inc All Rights Reserved Record YourQuestion
Details
3
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0