Podcasts about ics scada

  • 20PODCASTS
  • 31EPISODES
  • 41mAVG DURATION
  • ?INFREQUENT EPISODES
  • Oct 11, 2023LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about ics scada

Latest podcast episodes about ics scada

Secure Networks: Endace Packet Forensics Files
Episode 49: ICS/SCADA security expert, Lionel Jacobs from Palo Alto Networks

Secure Networks: Endace Packet Forensics Files

Play Episode Listen Later Oct 11, 2023 29:38


In this Episode of Packet Forensics Files, Endace's Michael Morris talks to Lionel Jacobs, Senior Partner Engineer, ICS and SCADA security expert, at Palo Alto Networks. Lionel draws on his more than 25 years of experience in OT and almost a decade at Palo Alto Networks in discussing some of the challenges of securing OT, IoT and critical infrastructure from cyber-attack.Lionel talks about the challenge of detecting attacks in OT environments, how to spot unusual activity, and the importance of having a reference baseline to compare against. He highlights the importance of packet data in providing insight into what is happening on OT networks.Lionel also stresses the importance of close collaboration between OT security teams and the operators of OT networks. It's crucial to ensure that the safe and effective operation of critical infrastructure isn't adversely impacted by security teams that don't understand the operational processes and procedures that are designed to ensure the safety of the plant and the people that work there.Lastly, Lionel reiterates the importance of gathering reliable evidence, and enabling security analysts to quickly get to the evidence that's pertinent to their investigation. It's not just about collecting data, but about making sure that data is relevant and easy to access.

@BEERISAC: CPS/ICS Security Podcast Playlist
Dale Peterson Talks Current and Future States of OT Cybersecurity

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Feb 2, 2023 32:34


Podcast: FORGING CONNECTIONSEpisode: Dale Peterson Talks Current and Future States of OT CybersecurityPub date: 2023-01-26On this episode of Forging Connections, Tim has a conversation with Dale Peterson, the founder and host of S4, the world's largest and most advanced ICS / SCADA cyber security conference. Listen in as they talk current and future state of OT cybersecurity. Tune in now!The podcast and artwork embedded on this page are from HONEYWELL FORGE, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

FORGING CONNECTIONS
Dale Peterson Talks Current and Future States of OT Cybersecurity

FORGING CONNECTIONS

Play Episode Listen Later Jan 26, 2023 32:34


On this episode of Forging Connections, Tim has a conversation with Dale Peterson, the founder and host of S4, the world's largest and most advanced ICS / SCADA cyber security conference. Listen in as they talk current and future state of OT cybersecurity. Tune in now!

IoT: The Internet of Threats
What's Going on with ICS Security, and What's SBOM Got to Do with It? with Dale Peterson, ICS Security Catalyst and Founder of S4 Events

IoT: The Internet of Threats

Play Episode Listen Later Dec 12, 2022 25:50


On this episode of the IoT: The Internet of Threats podcast, host Eric Greenwald interviews Dale Peterson, a widely recognized name in the OT cybersecurity field and, specifically, in ICS (industrial control system) security. Dale is the founder of S4, the premiere event in ICS security. Dale created the event in 2007 to showcase the best offensive and defensive work in ICS security and to build connections within the industry. He founded Digital Bond, an ICS / SCADA cybersecurity consulting company in 1998 and serves as its CEO.    Together, Eric and Dale examine the origins of Dale's influential S4 conference and the addition of this year's SBOM Challenge (in which Finite State will take part in February). They also discuss the future of ICS cybersecurity, the role the SBOM will play, how manufacturers and asset owners can best derive value from the SBOM, and Dale's insights into developing an effective ICS patching strategy that won't break the bank.    Interview with Dale Peterson    Dale Peterson is the Founder and CEO of Digital Bond, Inc. and S4 Events. Prior to founding Digital Bond in 1998, Dale held a variety of positions in security. Dale started his career as a cryptanalyst with the NSA (National Security Agency) in 1984. He holds a B.S. in Finance from the University of Illinois Urbana-Champaign.    In this episode, Eric and Dale discuss: The genesis of the S4 ICS Security Event: How and why Dale created one of the world's largest and most influential ICS cybersecurity conferences  Dale's insights into what the future of ICS cybersecurity holds and the role that the SBOM will play How manufacturers and asset owners can best derive information and value from the SBOM (and the business models that will support and fund their continued development and improvement) What constitutes an effective and efficient ICS patching strategy Regulation methodology: cyber hygiene-style vs. risk-based regulations    Find Dale on LinkedIn: Dale Peterson: https://www.linkedin.com/in/dale-peterson-s4/   Learn more about S4: https://s4xevents.com/   Thank you for listening to this episode of the IoT: The Internet of Threats podcast, powered by Finite State — the leading supply chain cyber-security solution provider for connected devices and embedded systems.   If you enjoyed this episode, click subscribe to stay connected and leave a review to get the word out about the podcast.   To learn more about building a robust product security program, protecting your connected devices, and complying with emerging regulations and technical standards, visit https://finitestate.io/

Security Conversations - A SecurityWeek Podcast
News Podcast: Pipedream/Incontroller ICS Malware Designed to Target ICS

Security Conversations - A SecurityWeek Podcast

Play Episode Listen Later Apr 14, 2022 12:24


[Breaking News Podcast] Sergio Caltagirone, VP of Threat Intelligence at industrial cybersecurity firm Dragos, discusses the U.S. government's joint advisory on the discovery of rare custom malware known as Pipedream/Incontroller, which is capable of doing damage to ICS/SCADA installations.

CISA Cybersecurity Alerts
CISA Alert AA22-103A – APT Cyber Tools Targeting ICS/SCADA Devices.

CISA Cybersecurity Alerts

Play Episode Listen Later Apr 13, 2022 3:22


The DOE, CISA, NSA, and the FBI are releasing this joint Cybersecurity Advisory to warn that certain APT actors have demonstrated the ability to gain full system access to multiple ICS/SCADA devices, including: Schneider Electric programmable logic controllers, OMRON Sysmac NEX programmable logic controllers, and Open Platform Communications Unified Architecture servers. DOE, CISA, NSA, and the FBI urge critical infrastructure organizations, especially Energy Sector organizations, to implement the detection and mitigation recommendations provided in this CSA to detect potential malicious APT activity and harden their ICS/SCADA devices. The DOE, CISA, NSA, and the FBI would like to thank Dragos, Mandiant, Microsoft, Palo Alto Networks, and Schneider Electric for their contributions to this joint CSA. AA22-103A Alert, Technical Details, and Mitigations Layering Network Security Through Segmentation Stop Malicious Cyber Activity Against Connected Operational Technology NSA and CISA Recommend Immediate Actions to Reduce Exposure Across Operational Technologies and Control Systems Dragos Report: CHERNOVITE's PIPEDREAM Malware Targeting Industrial Control Systems All organizations should report incidents and anomalous activity to CISA's 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI's 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.

@BEERISAC: CPS/ICS Security Podcast Playlist
Episode 306 - Assessing Risk in ICS Environments

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jan 24, 2022 35:47


Podcast: Cyber Security Weekly Podcast (LS 38 · TOP 2.5% what is this?)Episode: Episode 306 - Assessing Risk in ICS EnvironmentsPub date: 2022-01-23Ransomware has captured the attention of many due to its far-reaching impacts on industrial control systems (ICS). Once a problem that only affected IT infrastructure, ransomware that now targets ICS / OT can significantly impact or even shut-down control processing, logistics, distribution, and delivery of critical goods. We speak with Dr. Tom Winston, Director of Intelligence with Dragos Inc, based in Virginia. Dr. Winston is a Cyber Security subject matter expert focused on threats to critical infrastructure (ICS/SCADA) systems, as well as foreign cyber threat intelligence and threat analysis. Tom has extensive public and private sector experience in IT/OT threat environments to include hunting, detection engineering and reverse engineering. Tom has extensive experience in mobile devices, removable/fixed media digital forensics. Tom is also a seasoned manager of people, technology, projects, and programs. Multilingual, and with extensive experience in international relations, intelligence, and foreign policy analysis. Dr Winston has extensive private and public sector experience in IT/OT threat environments to include hunting, detection engineering and reverse engineering. Formerly, a highly sought after and award-winning professor Dr Winston was an undergraduate and graduate student advocate and champion; student success is critical - not just in school, but after graduation as well. He built cyber security engineers one student at a time and continues to assist them even well past their graduation by providing career and other professional guidance.Recorded 18 January 2022 courtesy of Dragos.To view the video version visit https://mysecuritymarketplace.com/av-media/assessing-risk-in-ics-environments/Further readingBlog post – Tom WinstonAssessing Ransomware Risk in IT and OT Environmentshttps://www.dragos.com/blog/industry-news/assessing-ransomware-risk-in-it-and-ot-environments/Blog post – DragosAssessment of Ransomware Event at US Pipeline Operatorhttps://www.dragos.com/blog/industry-news/assessment-of-ransomware-event-at-u-s-pipeline-operator/Blog post – Sergio CaltagironeRecent Ransomware Attacks against Governments and Critical Infrastructurehttps://www.dragos.com/blog/industry-news/recent-ransomware-attacks-against-governments-and-critical-infrastructure/Webinar recording – Tom WinstonProtect your ICS environments from Ransomware with Risk Assessmentshttps://www.dragos.com/resource/protect-your-ics-environment-from-ransomware/#ICS #OTcybersecurity #cybersecurity #insiderthreatThe podcast and artwork embedded on this page are from MySecurity Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Cyber Security Weekly Podcast
Episode 306 - Assessing Risk in ICS Environments

Cyber Security Weekly Podcast

Play Episode Listen Later Jan 23, 2022


Ransomware has captured the attention of many due to its far-reaching impacts on industrial control systems (ICS). Once a problem that only affected IT infrastructure, ransomware that now targets ICS / OT can significantly impact or even shut-down control processing, logistics, distribution, and delivery of critical goods. We speak with Dr. Tom Winston, Director of Intelligence with Dragos Inc, based in Virginia. Dr. Winston is a Cyber Security subject matter expert focused on threats to critical infrastructure (ICS/SCADA) systems, as well as foreign cyber threat intelligence and threat analysis. Tom has extensive public and private sector experience in IT/OT threat environments to include hunting, detection engineering and reverse engineering. Tom has extensive experience in mobile devices, removable/fixed media digital forensics. Tom is also a seasoned manager of people, technology, projects, and programs. Multilingual, and with extensive experience in international relations, intelligence, and foreign policy analysis. Dr Winston has extensive private and public sector experience in IT/OT threat environments to include hunting, detection engineering and reverse engineering. Formerly, a highly sought after and award-winning professor Dr Winston was an undergraduate and graduate student advocate and champion; student success is critical - not just in school, but after graduation as well. He built cyber security engineers one student at a time and continues to assist them even well past their graduation by providing career and other professional guidance.Recorded 18 January 2022 courtesy of Dragos.To view the video version visit https://mysecuritymarketplace.com/av-media/assessing-risk-in-ics-environments/Further readingBlog post – Tom WinstonAssessing Ransomware Risk in IT and OT Environmentshttps://www.dragos.com/blog/industry-news/assessing-ransomware-risk-in-it-and-ot-environments/Blog post – DragosAssessment of Ransomware Event at US Pipeline Operatorhttps://www.dragos.com/blog/industry-news/assessment-of-ransomware-event-at-u-s-pipeline-operator/Blog post – Sergio CaltagironeRecent Ransomware Attacks against Governments and Critical Infrastructurehttps://www.dragos.com/blog/industry-news/recent-ransomware-attacks-against-governments-and-critical-infrastructure/Webinar recording – Tom WinstonProtect your ICS environments from Ransomware with Risk Assessmentshttps://www.dragos.com/resource/protect-your-ics-environment-from-ransomware/#ICS #OTcybersecurity #cybersecurity #insiderthreat

PA大讲堂
PA大讲堂 75期 ICS/SCADA工控安全案例分享 王世忠

PA大讲堂

Play Episode Listen Later Nov 26, 2021 39:40


ics scada
InSecurity
Clint Bodungen and Brian Proctor: How At Risk is our Critical Infrastructure?

InSecurity

Play Episode Listen Later Sep 8, 2021 59:17


      On this Very Special Episode, Matt Stephenson brings in ThreatGEN Founder/CEO and Hacking Exposed: Industrial Control Systems author Clint Bodungen alongside Forescout Technologies Inc. Principal OT Strategist Brian Proctor for a sit-down. We take a hard look at the state of security for Operational Technology, Blue and Red teaming for OT, the cybersecurity Skills Gap and a few other things.     About Clint Bodungen Clint Bodungen (@R1ngZer0) is a world-renowned industrial cybersecurity expert, public speaker, published author, and cybersecurity gamification pioneer. He is the lead author of Hacking Exposed: Industrial Control Systems, and creator of the ThreatGEN Red vs. Blue cybersecurity gamification platform. He is a United States Air Force veteran, has been a cybersecurity professional for more than 25 years, and is an active part of the cybersecurity community, especially in ICS/OT (BEER-ISAC #046). Focusing exclusively on ICS/OT cybersecurity since 2003, he has helped many of the world's largest energy companies, worked for cybersecurity companies such as Symantec, Kaspersky Lab, and Industrial Defender, and has published multiple technical papers and training courses on ICS/OT cybersecurity vulnerability assessment, penetration testing, and risk management.   Clint hopes to revolutionize the industry approach to cybersecurity education, and help usher in the next generation of cybersecurity professionals, using gamification. His flagship product, ThreatGEN Red vs. Blue, is the world's first online multiplayer cybersecurity computer game, designed to teach real-world cybersecurity.     About Brian Proctor Brian Proctor (@brianproctor67) is the Principal OT Strategist at Forescout. He spent the majority of his previous professional life as an ICS/SCADA cybersecurity engineer and cybersecurity team lead working for two progressive California Investor Owned Utilities (IOUs). In joined an ICS security startup which was then acquired by Forescout Technologies. Brian jumped to the vendor side to promote the benefits ICS/SCADA/DCS threat detection, network security monitoring, and visualization capabilities can bring critical infrastructure asset owners. He is passionate about helping the ICS security community in any way possible and trying to make a difference for the greater good of our industry and country.     About Matt Stephenson Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, I hosted podcasts, videos and live events all over the world which put me with experts on every corner of the cybersecurity landscape. The new No Name Security Podcast will continue and expand upon that tradition as we seak out the leading minds in the security industry as well as those may break things every now again. And… just for fun, there will be some wildcard guests as well.   In 10 years in the ecosystem of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to information security, these technologies can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...   Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.   Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...   If you tuned in to any of my previous podcasts, there's great news! The No Name Security Podcast is here! I will be bringing the same kind of energy and array of guests you know and love. Best part? We're still at the same spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!   Make sure you Subscribe, Rate and Review!

InSecurity
Patrick Miller and Brian Proctor: What's Left to Hack in Critical Infrastructure?

InSecurity

Play Episode Listen Later Aug 20, 2021 65:43


  Perfection is achieved, not when there is nothing more to add, but when there is nothing left to take away.  -- Antoine de Saint-Exupéry; French writer, poet, aristocrat, journalist and pioneering aviator   Me with nothing left to lose, plotting my big revenge in the spotlight. Give me violent revenge fantasies as a coping mechanism  -- Chuck Palahniuk; author   We've been looking for the enemy for some time now. We've finally found him. We're surrounded. That simplifies things  -- Chesty Puller, US Marines      Matt Stephenson welcomes Ampere Industrial Security CEO Patrick Miller and Forescout Principal OT Strategist in for a chat about what is left to hack in the world of Critical Infrastructure. Because Critical Infrastructure seems to be a term that evolves every day, we run all over the place talking about what is vulnerable and why… what is safe and how to protect everything in between. And just to make sure you know we are authentic… Proctor was broadcasting from the floor of a manufacturing facility in full OSHA required protective gear (literally a hard hat, goggles and a day-glo vest)     About Patrick Miller     Patrick Miller (@patrickcmiller) shares over 35 years of IT/OT experience through his consulting services as an independent security and regulatory advisor for the Critical Infrastructure and Key Resource sectors. He is currently the CEO of Ampere Industrial Security, an industrial security consultancy based in Portland, OR USA. Patrick is also the founder, president emeritus and currently serves on the board of directors for the Energy Sector Security Consortium, Inc,  nonprofit organization in Portland, OR as well as the US Coordinator for the Industrial Cybersecurity Center, based in Spain.    Patrick is currently an instructor for the SANS ICS456 training on the NERC CIP standards.     About Brian Proctor     Brian Proctor (@brianproctor67) is the Principal OT Strategist at Forescout. He spent the majority of his previous professional life as an ICS/SCADA cybersecurity engineer and cybersecurity team lead working for two progressive California Investor Owned Utilities (IOUs). In joined an ICS security startup which was then acquired by Forescout Technologies. Brian jumped to the vendor side to promote the benefits ICS/SCADA/DCS threat detection, network security monitoring, and visualization capabilities can bring critical infrastructure asset owners. He is passionate about helping the ICS security community in any way possible and trying to make a difference for the greater good of our industry and country.     About Matt Stephenson     Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, I hosted podcasts, videos and live events all over the world which put me with experts on every corner of the cybersecurity landscape. The new No Name Security Podcast will continue and expand upon that tradition as we seak out the leading minds in the security industry as well as those may break things every now again. And… just for fun, there will be some wildcard guests as well.   In 10 years in the ecosystem of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to information security, these technologies can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...   Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.   Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...     If you tuned in to any of my previous podcasts, there's great news! The No Name Security Podcast is here! I will be bringing the same kind of energy and array of guests you know and love. Best part? We're still at the same spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!   Make sure you Subscribe, Rate and Review!

InSecurity
Bad Guys Hacked the National Oil Supply Chain… Now What?

InSecurity

Play Episode Listen Later May 21, 2021 64:39


    When the DarkSide hacking group attacked the Colonial Pipeline, they may have gotten a bit more than they bargained for. Colonial has acknowledged paying $4.4 million in ransom in order to bring their systems back online as quickly as possible. It was a decision they had to make quickly, but had to consider a myriad of variables in the process. Joseph Blount, Colonial CEO stated “I know that’s a highly controversial decision… I didn’t make it lightly. I will admit that I wasn’t comfortable seeing money go out the door to people like this… But it was the right thing to do for the country,”   Pundits everywhere weighed in with thoughts about how long the pipeline could be down, the impact on pricing, shortages of petroleum products ranging from gas to heating fuel. Other questions bubbled up as well. How did the do it? Was it politically motivated? How easy would it be for the next attack? Over the last few days, we have seen some pretty remarkable blowback on DarkSide. Even their fellow bad guys don’t want to play with them any more.   So… now what?   Matt Stephenson welcomes Duke Energy Technology Manager David Lawrence alongside  Forescout Principal OT Strategist Brian Proctor and Sr Systems Engineer Shawn Taylor for a lively chat about the attack on Colonial and the impact it may have on the worlds of critical infrastructure and operational technology. This isn’t just another academic discussion of security… we have a harmonica! Seriously… we do… check it out!   About David Lawrence David Lawrence is the Tehchnology Manager of the Emerging Tchnology at Duke Energy. There he provides leadership on a portfolio of technologies for the Future Grid, including development of use cases and requirements, architectures and designs, and technology test plans. He works in defining and executing technology evaluations, and providing change management support.  David is currently focused on Grid distributed autonomous functions, edge analytics, and security for distributed technologies.  He has 38 years of experience in the energy industry.  He has worked in research and development and IT management for electric metering, transformer, and switchgear product manufacturing.  His roles included embedded systems and protocol development, engineering management, global engineering information systems, manufacturing execution and scheduling systems, product lifecycle management, and IT management.    About Brian Proctor Brian Proctor (@brianproctor67) is the Principal OT Strategist at Forescout. He spent the majority of his previous professional life as an ICS/SCADA cybersecurity engineer and cybersecurity team lead working for two progressive California Investor Owned Utilities (IOUs). In joined an ICS security startup which was then acquired by Forescout Technologies. Brian jumped to the vendor side to promote the benefits ICS/SCADA/DCS threat detection, network security monitoring, and visualization capabilities can bring critical infrastructure asset owners. He is passionate about helping the ICS security community in any way possible and trying to make a difference for the greater good of our industry and country.   About Shawn Taylor Shawn Taylor (@smtaylor12) is a Senior Systems Engineer at Forescout. He is an accomplished and well-respected Public Speaker and Systems Engineer. With a strong mix of technical acumen, architectural experience, and sales savvy Shawn is a trusted advisor the customers he's worked with over his 20-year career. His background includes Cybersecurity, Biometrics and Identity Management, IT Operations and Service Management and IT Asset Management. As a ForeScout Systems Engineer, Shawn expanded his technical knowledge into cybersecurity, while still leveraging his foundation of IT Operations and Service Management. He is responsible for integrating the ForeScout CounterACT solution with many of the industry-leading Cybersecurity products while in support of sales opportunities. Shawn has spoken at industry events around the country and too many online events to list. Additionally, Shawn helps to drive thought leadership around Forescout and continuous visibility being foundational to enterprise ITSM initiatives by authoring White Papers and blogs. About Matt Stephenson Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, as the host of the InSecurity I have been talking with experts about every corner of the cybersecurity landscape.   In 10 years in the world of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to network security, can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...   Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.   Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...   If you are  listener to Insecurity, there’s great news! An all new show is coming bringing the same kind of energy and array of guests you know and love. Best part? We’re still at the spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!   Make sure you Subscribe, Rate and Review!

mnemonic security podcast

In this episode, you'll learn about the digital canaries; honeypots.Honeypots are passive monitoring systems that appear to be legitimate parts of an organisation's core infrastructure, designed to alert you about someone trying to illegitimately enter your infrastructure, and help you get insight on the attacker's tactics, techniques, and procedures. Someone with a lot of experience using honeypots is IT & OT Industrial specialist Mikael Vingaard. Mikael has experience working with OT security in industrial control systems (ICS)/ SCADA environments from many of the major energy institutions in Denmark, like Energinet.dk, Danish Energy Agency and EnergiCERT, and now works to educate others about the benefits of honeypots and providing in-house honeypots to organisations. Mikael is joining Robby from his test lab to speak about the benefits of using honeypots, the threat landscape for OT systems, as well as what kind of organisations can use honeypots and the maturity level required for doing so.https://www.honeypot.dk/Producer: Paul Jæger

@BEERISAC: CPS/ICS Security Podcast Playlist
ICS/SCADA Security - The Permanence and People Problems

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Apr 22, 2021 42:31


Podcast: Beers with Talos Podcast (LS 45 · TOP 1% what is this?)Episode: ICS/SCADA Security - The Permanence and People ProblemsPub date: 2021-04-21Recorded March 2020 – ICS and SCADA systems are deeply embedded all around us in critical infrastructure. Today we talk about some of the inherent issues in infrastructure security and take a wide-ranging look at the ICS- and SCADA-specific issues found there. Joe Marshall from the Talos Outreach group joins to share his insights on the space and how donuts are the ultimate career track switching tool. Oh- and Matt’s cat discovers jerky. Full show notes on the Talos blogThe podcast and artwork embedded on this page are from Cisco Talos, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Beers with Talos Podcast
ICS/SCADA Security - The Permanence and People Problems

Beers with Talos Podcast

Play Episode Listen Later Apr 21, 2021 42:31


Recorded March 2020 – ICS and SCADA systems are deeply embedded all around us in critical infrastructure. Today we talk about some of the inherent issues in infrastructure security and take a wide-ranging look at the ICS- and SCADA-specific issues found there. Joe Marshall from the Talos Outreach group joins to share his insights on the space and how donuts are the ultimate career track switching tool. Oh- and Matt’s cat discovers jerky. Full show notes on the Talos blog

@BEERISAC: CPS/ICS Security Podcast Playlist
Ron Brash on the water plant hacks and the state of ICS security

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Mar 13, 2021 50:06


Podcast: Security Conversations (LS 33 · TOP 5% what is this?)Episode: Ron Brash on the water plant hacks and the state of ICS securityPub date: 2021-03-11Ron Brash joins Ryan Naraine on the show to talk about the recent water supply hack, the state of security in ICS/SCADA installations, the checklist of affordable things for critical infrastructure defenders, and the things we should worry -- and not worry -- about. Ron is Director of Cyber Security Insights at Verve Industrial Protection, a critical infrastructure-focused organisation that sells services and products that work across IT and OT environments for effective cyber security, controls and management. The podcast and artwork embedded on this page are from Ryan Naraine, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Security Conversations
Ron Brash on the water plant hacks and the state of ICS security

Security Conversations

Play Episode Listen Later Mar 11, 2021 50:06


Ron Brash joins Ryan Naraine on the show to talk about the recent water supply hack, the state of security in ICS/SCADA installations, the checklist of affordable things for critical infrastructure defenders, and the things we should worry -- and not worry -- about. Ron is Director of Cyber Security Insights at Verve Industrial Protection, a critical infrastructure-focused organisation that sells services and products that work across IT and OT environments for effective cyber security, controls and management.

CERIAS Security Seminar Podcast
Greg Akers, SDN/NFV in the ICS, SCADA and Manufacturing World as a Cyber Security Tool

CERIAS Security Seminar Podcast

Play Episode Listen Later Mar 10, 2021 43:52


A discussion about where we are in the commercial SDN/NFV world today and where we are headed.  What are the next generation threats beyond where we are today and how software definability may be a asset in the defender's toolkit. Also looking at the intersection point between SDN/NFV and AI/ML. How this changes the defense calculus and alters the attack surface. What capabilities we need to develop in the practitioner, consumer and defender worlds. About the speaker: Greg Akers was the Senior Vice President & CTO of Advanced Security Research & Government and Chief Technology Officer within the Security & Trust Organization (STO) group at Cisco.  With more than two decades of executive experience, Akers brought a wide range of technical and security knowledge to this role.  A major focus of his group was to expand security awareness and launch product resiliency initiatives throughout Cisco's development organization to deliver high-quality and secure products to customers.  He also served as executive sponsor of the Cisco Disability Awareness Network.Akers joined Cisco in 1993. He held a variety of technical, managerial and executive roles at Cisco. These have included networking engineer,Vice President for the Worldwide Technical Assistance Center, Senior Vice President-CTO Services and Senior Vice President-Global Governments Solutions Group.  He also holds the CCIE certification. In addition, Akers is an Internet security and critical infrastructure protection advisor to Cisco customers and to the U.S. government. He regularly advises and directs activities relative to technology and security matters of domestic and international importance.  Akers has also advised the U.S. Department of Defense and the federal intelligence community for more than fifteen years.  Before joining Cisco, Akers' career included more than 15 years of designing, building, and running large networks for Fortune 100 companies.  He has held senior technical and leadership roles at Fechheimer Brothers, a holding of Berkshire Hathaway, and Procter and Gamble.  Akers holds a bachelor of science degree in chemical engineering from the University of Akron.

CERIAS Security Seminar Podcast
Greg Akers, "SDN/NFV in the ICS, SCADA and Manufacturing World as a Cyber Security Tool"

CERIAS Security Seminar Podcast

Play Episode Listen Later Mar 10, 2021


A discussion about where we are in the commercial SDN/NFV world today and where we are headed.  What are the next generation threats beyond where we are today and how software definability may be a asset in the defender’s toolkit. Also looking at the intersection point between SDN/NFV and AI/ML. How this changes the defense calculus and alters the attack surface. What capabilities we need to develop in the practitioner, consumer and defender worlds.

@BEERISAC: CPS/ICS Security Podcast Playlist
E02 - Vulnerable ICS systems in The Netherlands

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Feb 7, 2021 8:07


Podcast: The Cyber Resilience PodcastEpisode: E02 - Vulnerable ICS systems in The NetherlandsPub date: 2020-12-01The motivation behind the research described in the report is that various ICS/SCADA devices seem to be inadvertently exposed on the public Internet without proper security measures, potentially causing catastrophic incidents. The report can be downloaded here: https://research.utwente.nl/files/124347608/wodc_report_scada_final.pdfThe podcast and artwork embedded on this page are from Chris Reurings, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Vulnerable, el podcast de seguridad digital
5 Predicciones de Cyberseguridad para 2020 - Vulnerable Podcast

Vulnerable, el podcast de seguridad digital

Play Episode Listen Later Jan 6, 2020 12:46


Las 5 principales prediciones en cyberseguridad - Episodio 1 5 El uso de Inteligencia Artificial, por ambos bandos Los adversarios también pueden usar AI y de hecho lo han usado. Especialmente grupos asociados a estados para adaptar el ataque a las respuestas y medidas de mitigación que su objetivo tenga. 4 Aumentan los ataques específicos con ransomware ¿Cómo olvidar el caso de Pemex en 2019 en el que la página donde se daban instrucciónes para el pago del rescate estaba personalizada para la petrolera. 3 Fuera del perímetro Ataques en la cadena de suministro, los alcances y controles del área de seguridad para cualquier empresa deberán estar donde sea cuando sea. 2 Se incrementa la escasez de talento en la industria. Buenas noticias si quieres hacer carrera en esta industria. Menciones honoríficas MFA en todos lados Filtraciones de datos y credenciales siguen siendo un gran problema para las organizaciones. Los sistemas ICS SCADA seguirán siendo vulnerables. Se robustecerá cybercrime-as-a-service Más actividad de M&A en la industria 1 Ataques IoT Los avances en redes 5G implementadas incrementará la cantidad de dispositivos conectados y con ello también la superficie de ataque. Referencias Infosec Institute. https://resources.infosecinstitute.com/top-cybersecurity-predictions-for-2020/#gref Targeted ransomware attacks on the rise Most nation-state attacks remain unattributed IoT devices under attack AI-based attacks, a nightmare for security experts Compromised credentials and data breaches will continue to be a problem for organizations ICS/SCADA systems are still too vulnerable Supply chain attacks will grow slightly in frequency Cybercrime-as-a-service — stronger than ever Sdcentral. https://www.sdxcentral.com/articles/news/top-5-cybersecurity-predictions-for-2020/2019/12/ More Security M&A Activity in 2020 Open Source Security Takes Hold Push to the Edge AI Will Speed Security Response — and Attacks 5G Security Gets Real Watchguard. https://www.watchguard.com/es/wgrd-resource-center/predictions-2020 Ransomware targets the cloud GDPR comes to the US 2020 elections Cybersecurity skills GAP widens Outside the perimeter New vulnerabilities in 5G/Wi-Fi MFA becomes the standard SC Magazine. https://www.scmagazine.com/home/security-news/2020-cybersecurity-predictions/ Voice Deepfakes will become the new phishing bait We’ll start to hear more about the convergence of physical infiltration with cyberattacks Get ready for SMS attacks to go mainstream Office 365-specific security issues will finally get the attention they deserve Company microtargeting with industry-specific tools will rise Disaster Recovery-as-a-Service (DRaaS) is now mainstream State and state-sponsored cyber groups are the new proxy for international relations The accepted definition of a vulnerability will broaden In 2020, we expect to see federal agencies to increasingly differentiate their IT consumption models The digital advertising ecosystem will be the next top target as a new class of attacks emerges The use of and evolution of biometrics Cisco. https://newsroom.cisco.com/feature-content?type=webcontent&articleId=2038484 Balance humans and machines Find talent in unexpected places Get the board up to speed Prepare for the inevitable Know your network — but look beyond it Consider compliance an advantage (not just a headache) Expand your perspective, and enable the future

InSecurity
Cheryl Biswas: Diversifying Cybersecuity

InSecurity

Play Episode Listen Later Jul 8, 2019 63:32


Cheryl Biswas: Diversifying Cybersecuity     You better watch out Oh, what you wish for It better be worth it So much to die for Hey, so glad you could make it Yeah, now you've really made it Hey, there's only us left now  --Hole – 1997, Celebrity Skin What if I told that… compared to men, higher percentages of women cybersecurity professionals are reaching some of the most sought after positions in security. Among the security workforce, the population of women in key spots is surging… Chief Technology Officer 7% of women vs 2% of men Vice President of IT 9% vs 5% IT Director 18% vs 14% C-level / Executive 28% vs 19%   Women in cybersecurity are generally more educated and younger than their male colleagues. 44% of men in cybersecurity hold a post-graduate degree compared to 52% of women. Also, nearly half of women cybersecurity professionals surveyed are millennials – 45% compared to 33% of men. By contrast, Generation X men make up a bigger percentage of the workforce (44%) than women (25%)   Now… what if I told you that the gender pay gap hasn't moved at all. Women still make less than men. according to the 2018 (ISC)2report, women make $5,000 less than men in security management positions.   It is this environment that spurred a group of women to create The Diana Initiative.   In this week’s episode of InSecurity, Matt Stephenson chats with Cheryl Biswas on why the time was right to co-create The Diana Initiative. Now, 4 years later, Diana has a new home and is key part of that stretch of August where the cybersecurity world convenes in Las Vegas to figure out how to save the world. Their mission is to encourage diversity and support women who want to pursue careers in information security, promote diverse and supportive workplaces, and help change workplace cultures.      About The Diana Initiative   It was the summer of 2015. Hackers from around the world had gathered in Las Vegas, NV for DEF CON 23. In the cafeteria tucked away in the basement of Bally’s and Paris, 9 women found themselves chatting and laughing about their experiences in the field of Information Security. They were all passionate about their challenging roles in the male-dominated field and began exchanging strategies for success in their challenging environments. It was then and there that they accepted their new mission: to create a conference for all those who identify as women/non binaries, and to help them meet the challenges that come with being a woman in Information Security with resilience, strength and determination. The first event in 2016 began with a morning speaking track and an afternoon of lockpicking and badge soldering in a small suite at Bally’s, bringing attendees together in a collaborative, comfortable setting. Interest and attendance showed that demand for a woman-focused InfoSec conference existed. In 2017, The Diana Initiative was formed and the conference expanded to cover almost 2 days – with speakers on the evening of the first day, as well as the entire second day. There was also a hands-on opportunity for learning about lockpicking, a Career village, and fun contests. During the summer of 2018, The Diana Initiative conference soared in popularity. But with this incredible growth and popularity, the space still couldn’t meet the demand, as attendees were continuously turned away due to over capacity of all the suites. For more information, make sure to follow them at @DianaInitiativeand keep up with them on LinkedIN and Facebook.   About Cheryl Biswas Cheryl Biswas’s (@3ncr1pt3d) fascination with computers started with those blinking machines on the original Star Trek, and the realization that, if she could learn to work those things, then she could boldly go  – anywhere!  But Cheryl didn’t learn math like everyone else and found herself struggling. She mistakenly believed a few key people who convinced her that she couldn’t learn computers, so she didn’t take programming or comp sci. They were wrong, though. Curiosity and passion led Cheryl to technology through the back door and she taught herself computers. Currently, Cheryl is a Threat Intel analyst on a cybersecurity team, researching, analysing, and communicating her discoveries to the team and to clients to keep them safe. GRC, privacy, APTs, best practices, evolving threats – the learning never stops. Cheryl is an active writer and speaker about threats to less-known but critical systems like ICS SCADA and Mainframes, Shadow IT and Big Data.  You may have seen her present at some of the most important security conferences including BSides Las Vegas and Toronto, DEFCON, ShmooCon and SecTor.   About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV   Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come   Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.   Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts!   Make sure you Subscribe, Rate and Review!

@BEERISAC: CPS/ICS Security Podcast Playlist
Unsolicited Response Podcast: SANS ICS 410 Course & GICSP

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Mar 16, 2019 67:46


Podcast: Digital BondEpisode: Unsolicited Response Podcast: SANS ICS 410 Course & GICSPPub date: 2015-03-18Episode 2015:2 SANS ICS Security Training and Certification SANS provided four individuals for our Unsolicited Response podcast on the 5-day ICS 410: ICS/SCADA Security Essentials training course and the related Global Industrial Cyber Security Professional (GICSP) certification. Scott Cassity, Managing Director of GIAC Mike Assante, SANS Lead for ICS/SCADA security training Justin Searle, SANS Instructor and […]The podcast and artwork embedded on this page are from Dale Peterson, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Unsolicited Response Podcast: Rios on WhiteScope and Medical Device Security

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Mar 16, 2019 42:32


Podcast: Digital BondEpisode: Unsolicited Response Podcast: Rios on WhiteScope and Medical Device SecurityPub date: 2015-04-23Billy Rios of Laconicly joined me on the Unsolicited Response Podcast to discuss two topics: WhiteScope – an online ICS/SCADA whitelist that is trying to solve the last mile supply chain problem until vendors start signing their code. The WhiteScope data repository is available to all, free of charge. Medical Device Security – an area that […]The podcast and artwork embedded on this page are from Dale Peterson, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
#051 – Robert M. Lee: The Adversary’s Ability to Change Their Trade Craft is Difficult

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Mar 16, 2019 52:14


Podcast: Cyber Security InterviewsEpisode: #051 – Robert M. Lee: The Adversary’s Ability to Change Their Trade Craft is DifficultPub date: 2018-04-24Robert M. Lee is the CEO and Founder of the industrial (ICS/IIoT) cyber security company Dragos, Inc. He is also a non-resident National Cybersecurity Fellow at New America focusing on policy issues relating to the cyber security of critical infrastructure. For his research and focus areas, Robert was named one of Passcode’s Influencers, awarded EnergySec’s Cyber Security Professional of the Year (2015), and inducted into Forbes’ 30 under 30 for Enterprise Technology (2016).A passionate educator, Robert is the course author of SANS ICS515 – “ICS Active Defense and Incident Response” with its accompanying GIAC certification GRID and the lead-author of SANS FOR578 – “Cyber Threat Intelligence” with its accompanying GIAC GCTI certification.Robert obtained his start in cyber security in the U.S. Air Force where he served as a Cyber Warfare Operations Officer. He has performed defense, intelligence, and attack missions in various government organizations including the establishment of a first-of-its-kind ICS/SCADA cyber threat intelligence and intrusion analysis mission.In this episode we discuss threat hunting, SCADA/ICS, IIoT, IoT security, his start in cyber security, the 2015 Ukrainian power grid attack, starting and teaching a SANS ICS class, advice he would give someone starting in the industry, and HACKNYC, and so much more.Where you can find Robert:LinkedInTwitterBlogThe podcast and artwork embedded on this page are from Douglas A. Brush | Weekly Interviews w/ InfoSec Pros, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Cyber Security Interviews
#051 – Robert M. Lee: The Adversary’s Ability to Change Their Trade Craft is Difficult

Cyber Security Interviews

Play Episode Listen Later Apr 24, 2018 52:14


Forbes’ 30 under 30 (http://www.forbes.com/pictures/mll45klmm/robert-lee-27/) for Enterprise Technology (2016). A passionate educator, Robert is the course author of SANS FOR578 (https://www.sans.org/course/cyber-threat-intelligence) – “Cyber Threat Intelligence” with its accompanying GIAC GCTI certification. Robert obtained his start in cyber security in the U.S. Air Force where he served as a Cyber Warfare Operations Officer. He has performed defense, intelligence, and attack missions in various government organizations including the establishment of a first-of-its-kind ICS/SCADA cyber threat intelligence and intrusion analysis mission. In this episode we discuss threat hunting, SCADA/ICS, IIoT, IoT security, his start in cyber security, the HACKNYC (https://q22018.hacknyc.com/en/) , and so much more. Where you can find Robert: LinkedIn (https://www.linkedin.com/in/robmichaellee/) Twitter (https://twitter.com/RobertMLee) Blog (http://www.robertmlee.org/)

The CyberWire
Daily & Week in Review: FBI has "high confidence" Russians hacked DNC. Olympic hacks, cyber vigilantes, criminal markets.

The CyberWire

Play Episode Listen Later Aug 12, 2016 19:59


In today's podcast we learn that the US Intelligence Community discovered the DNC hack sometime last year—much earlier than its public disclosure this Spring. We hear about threats to critical infrastructure, and we follow developments in the cyber criminal markets—ransomware's getting mighty picky, if you ask us. We hear about ISIS's appeal to disaffected petty criminals. The Olympics see both cybercrime and patriotic hacktivism. Quintessence Labs' John Leiseboer discusses redundancy and replication of data, and we interview Robert M. Lee from Dragos Security about ICS SCADA security, and preparing for cyber security jobs. And, of course, we hear more about how Pokémon-GO is driving security people quite nuts.

DEF CON 23 [Audio] Speeches from the Hacker Convention
Collin Cassidy, Robert Lee, Eireann Leverett - Switches Get Stitches

DEF CON 23 [Audio] Speeches from the Hacker Convention

Play Episode Listen Later Oct 9, 2015


Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Cassidy-Leverett-Lee-Switches-Get-Stitches.pdf Switches Get Stitches Colin Cassidy Senior Security Consultant at IOActive Éireann Leverett Robert M. Lee This talk will introduce you to Industrial Ethernet Switches and their vulnerabilities. These are switches used in industrial environments, like substations, factories, refineries, ports, or other homes of industrial automation. In other words: DCS, PCS, ICS & SCADA switches. The researchers focus on attacking the management plane of these switches, because we all know that industrial system protocols lack authentication or cryptographic integrity. Thus, compromising any switch allows the creation of malicious firmwares for further MITM manipulation of a live process. Such MITM manipulation can lead to the plant or process shutting down (think: nuclear reactor SCRAM) or getting into a unknown and hazardous state (think: damaging a blast furnace at a steel mill) Not only will vulnerabilities be disclosed for the first time, but the methods of finding those vulnerabilities will be shared. All vulnerabilities disclosed will be in the default configuration state of the devices. While these vulnerabilities have been responsibly disclosed to the vendors, SCADA/ICS patching in live environments tends to take 1-3 years. Because of this patching lag, the researchers will also be providing live mitigations that owner/operators can use immediately to protect themselves. At least four vendors switches will be examined: Siemens, GE, Garrettcom and Opengear. Colin Cassidy is a security consultant for IOActive where he focuses on Industrial Control Systems. He has a strong development and software engineering background. He is also a seasoned leader in the areas of security and software engineering. Before joining IOActive, Cassidy served for a number of years as Technical Manager and Security Technical Lead for IGE Energy Services, Ltd, part of GE Energy. He has hands-on experience with PowerOn Fusion, a leading Outage Management System/Distribution Management System (OMS/DMS) solution for electricity distribution management. He also led a team of developers in producing new functionality within the core product and worked with customers to understand their requirements. Colin Cassidy has a BSc (Hons) in Computing Science from the University of Glasgow. Twitter: @parttimesecguy Éireann Leverett hates writing bios in the third person. He once placed second in an Eireann Leverett impersonation contest. He likes teaching the basics, and learning the obscure. He is sometimes jealous of his own moustache for being more famous than he is. If he could sum up his life in one sentence; he wouldn't. That would be a life-sentence! He is primarily known for smashing the myth of the air-gap in industrial systems with his master's thesis, finding authentication bypasses for industrial ethernet switches, and working with incident response teams to improve their understanding of industrial control systems security. He believes security takes an awful lot more than penetration-testing and speaks often about the wider effects of embedded system insecurity. Twitter: @blackswanburst Robert M. Lee is a co-founder of Dragos Security LLC where he has a passion for control system protocol analysis, digital forensics, and threat intelligence research. He is also an active-duty U.S. Air Force Cyber Warfare Operations Officer where he has been a member of multiple computer network defense teams including his establishing and leading of a first-of-its-kind ICS/SCADA threat intelligence and intrusion analysis mission. Robert received his BS from the United States Air Force Academy and his MS in Cybersecurity Digital Forensics from Utica College. He is a passionate educator and teaches in the ICS and Forensics programs at SANS and is an Adjunct Lecturer at Utica College where he teaches in their MS Cybersecurity program. Robert is also the author of 'SCADA and Me' and is currently pursuing his PhD at Kings College London with research in control system cyber security. He routinely publishes academic and industry focused works in a wide variety of journals and publications; additionally he has presented at conferences around the world. Twitter: @RobertMLee

ControlTalk Now  The Smart Buildings Podcast
ControlTalk NOW Week Ending August 23, 2015

ControlTalk Now The Smart Buildings Podcast

Play Episode Listen Later Aug 24, 2015 47:32


ControlTalk NOW for the week ending August 23, 2015 continues its focus on Cyber Security Awareness with Data Center Equipment Exposure; CABA’s Landmark CyberSecurity Research Initiative; and White Hat Billy Rios brings ICS/SCADA training to Georgia. Also featured: Eric Stromquist presents the Belimo Energy Valve to the Atlanta Better Building Challenge; Neptronic’s and ecobee’s newest product releases; the 2016 AHR EXPO registration is now available; 7 Minutes in Control with Rob Allen and Mike Bonner discussing their successful Honeywell N4 migration; and the amazing history of KMC Controls. Data Center Equipment Exposed With Default Manufacturer User and Pass. Shodan Cataloging of Liebert & APC (Disclaimer – It is not the intent of this post to point out a particular BAS software vendor. The intent is to show that we, the system integrator, still have work ahead of us to do our part.) Last week I searched for Niagara systems on Shodan and the numbers were 27k plus in just the US. This week the US number is down just over 15k. CABA Launches Landmark Research on CyberSecurity: Is Your Organization Prepared? What steps have your organization taken to ensure that your customers, products/services and organization are safe from privacy issues and cybersecurity attacks? The CABA Board of Directors and the CABA Connected Home Council (CHC) have selected the next CABA Landmark Research Study to be “Cybersecurity and the Connected Home”. 7 Minutes in Control with Stromquist’s Rob Allen and Mike Bonner. The two gentlemen provide great insight to a successful Honeywell WEBs AX migration to N4 that included several JACE controllers, numerous Honeywell Spyders, and an AX Supervisor, connecting multiple buildings over a wireless IP LAN. Please stay tuned to 7 Minutes in Control as Rob and Mike continue with N4 project migration updates. World’s Largest HVACR Marketplace is Headed to Orlando, FL — January 25-27, 2016. The World’s Largest HVACR Marketplace is headed to Orlando, January 25-27, 2016, Orlando, Florida — ORANGE COUNTY CONVENTION CENTER! The AHR EXPO brings the entire HVACR Industry together under one roof to see the latest products and technology, learn about innovations & trends, and build relationships. Neptronic Announces its Next Generation VAV and Fan Coil Controllers are Here! Neptronic, a leading manufacturer of HVAC Products and Solutions since 1976, is proud to announce that their game-changing Next Generation VAV and Fan Coil Controllers — are Available NOW! Huge hardware, software, and network improvements provide better precision, greater application versatility and more. Visit Neptronic today to see more features and benefits of Neptronic’s Next Generation Controllers! Hey Siri, meet ecobee3 — Ahem, the HomeKit-enabled ecobee3. HomeKit makes it easy to discover, group, and control Apple HomeKit-enabled accessories in your home. Control your ecobee3 by using Siri on your iPhone, iPad, and iPod Touch. Requires iOS 8.1 or later. Your iPhone is now a universal remote that controls your home. Imagine all your smart accessories working together and customized around you. ControlTrends at The Atlanta Better Buildings Challenge. I got a chance to hang out with the movers and shakers of the Atlanta Better Buildings Challenge last night. Atlanta’s mayor, Kasim Reed, gave us an update on the progress Atlanta Building owners are making towards reducing their energy spend by 20% by the year 2020. KMC Controls — A History of Great Success Built with Great People and Great Products. KMC Controls, an almost mythical American success story begins with a summer job at Barber Colman in Rockford, IL, where Ken Krueter was first introduced to the world of HVAC and controls. Ken Kreuter’s pioneer efforts were soon augmented by a remarkable family and a cast of industrious and harmonious visonaries that would sustain KMC’s growth — and allow KMC to make significant contributions to the HVAC industry — for the next fifty years. ICS/SCADA Security Essentials, Atlanta – Billy Rios, Instructor. My friend and mentor Billy Rios will be he instructor for the upcoming SANS Institute ICS/SCADA Security Essentials in Atlanta, September 28 thru October 2. Billy is not only an expert on this subject, but is highly engaging and thought provoking. His instructional delivery method coveys information that can be easily understood and is comprehensive. The Atlanta Better Buildings Challenge, Pecha Kucha, and The Belimo Energy Valve. Here is a video of my Pecha Kucha at the Atlanta Better Buildings Challenge. Pecha Kucha is a presentation style that allows the speaker 20 slides and 20 seconds to explain each slide. The Atlanta Better Buildings Challenge is the vision of Atlanta mayor Kasim Reed. He challenges commercial buildings in Atlanta to reduce their energy consumption 20% by the year 2020. The post ControlTalk NOW Week Ending August 23, 2015 appeared first on ControlTrends.

State Of Security
State Of Security Episode 5

State Of Security

Play Episode Listen Later May 27, 2015 51:27


This is one of my favorite episodes so far! I spend about 45 minutes with Josh Anderson, who riffs on IT and ICS/SCADA security threats, career advice, how he compares his life to characters on TV's "24" and a whole lot more. Very relaxed, generous in time and content, this interview with one of America's Premier ICS Security Gurus (I just gave him that title...) is fun and lively. Special shout out to Kent King for his mentorship in this episode, as well. Let us know what you think on StateOfSecurity.com or via Twitter. Thanks for listening! 

Liquidmatrix Security Digest Podcast
Liquidmatrix Security Digest Podcast - Episode 24

Liquidmatrix Security Digest Podcast

Play Episode Listen Later Mar 12, 2013 75:47


Episode 0x24 -- The Robot Uprising You'd think those worthless meatbag humans would be more respectful. It looks like we will have a limited incidence of Robots in tonights episode. Of course, nothing in life can be ACTUALLY robot free. That's just silly talk. Also, pro-tip: make grilled cheese sandwiches in the George Foreman after making steak - better than butter. Upcoming this week... Lots of News Breaches SCADA / Cyber, cyber... etc. finishing it off with DERPs/Mailbag and THE DEEP DIVE Our new weekly Briefs - no arguing or discussion allowed And if you've got commentary, please sent it to mailbag@liquidmatrix.org for us to check out. DISCLAIMER: It's not that explicit, but you may want to use headphones if you're at work. ADDITIONAL DISCLAIMER: In case it is unclear, this is the story of 5 opinionated infosec pros who have sufficient opinions of their own they don't need to speak for anyone except themselves. Ok? Good. In this episode: News and Commentary Pwn2Own: IE, Firefox, Chrome and Java go down ...and Adobe Flash, Reader and Oracle Java exploits Chrome hack details (threat post link) Thanks Ben! Indian .gov puts bounty on botnet takedown China's internet backbone will have security features (also censorship) (SAVA) How Facebook Prepared to Be Hacked Having the MD5 hash of "123456" is probably not the best way to store passwords in your publicly searchable code on github... /via Thierry Zoller. (also don't put your twitter oauth keys in github) International Womens' Day - Don't forget Admiral Grace Freeze All The Robots: Put Android ICS in the freezer to break crypto Harvard sneaks through 16 Deans' email Deja vote: Iran blocks VPN use ahead of elections The Breach Report Another bitcoin exchange gets p0wned Ausie Ausie Ausia Bank Oy Oy Oy (Reserve Bank of Australia gets infected, then found out) Pakistan .gov gets hacked SCADA / Cyber, cyber... etc Metasploit releases exploit module for Honeywell ICS that has a patch available Formal Paper (pdf) from Ralph Langner Bound to Fail: Why Cyber Security Risk Cannot Be "Managed" Away US Military Advisory Panel Says Nuke a Cyber Attacker Reasons to depend on Kaspersky for ICS/SCADA operating systems -- EXCELLENT IPv6 STACKS BP Fights Off Up to 50,000 Cyber-Attacks a Day: CEO Cyberwar: you lack imagination DERP TELUS releases qualitive security survey (pdf link) - completely ignores science, math and proper research Survival of the fittest: Some data-breach victims can't be helped - but they enjoy reacharounds China points at USA and cries "you're stinky and mean" Mailbag / Bizarro Land Dear Dudes of the Liquid I found a vuln when I was browsing a company's website with w3af? Should I report it? Yimmy, Warsaw Briefly - NO ARGUING OR DISCUSSION ALLOWED From Space Rogue - The Infinite Daft Loop - productivity in a can Play Donkey Kong as the Princess Browser sec Tripwire aquires nCircle Click to play!!!! Microsoft preps UPDATE EVERYTHING patch batch Liquidmatrix Staff Projects The Liquidmatrix Vegas Party- We threatened more news. There will be passes distributed. You can beg your way onto the list by sending an email to vegas2013party@liquidmatrix.org. The BSidesLV Ticket Give-away- Three tickets up for grabs: best original piece of artwork incorporating a security rock star; bonus points for using a unicorn best rap song about a major breach best poem describing a vendor DERP Judging will be done by The Liquidmatrix Intern. Mocking will be done by us. I'd suggest you start buying a vote early. Email your submission to bsideslv2013@liquidmatrix.org The Security Conference Library  Contribute to the Strategic Defense Execution Standard (#SDES) and you'll be Doing Infosec Right in no time. If you're interested in helping out with openCERT.ca, drop a line to info@openCERT.ca Upcoming Appearances: James speaking at Thotcon, BSidesChicago, BSidesRochester and Training (with Rich Mogull) at BHUSA. Dave will be at Secure Dusseldorf, Infosecurity Europe, Black Hat, DEF CON, Secure Asia In Closing Movie Review Moon (it's all about clones - BTW spoiler alert) everyday is CTF! go set up a team Signing up for a SANS course? Be sure to use the code "Liquidmatrix_150" and save $150 off the course fee! And Liquidmatrix_5 for 5% off a course Seacrest Says: "Here's to a hoopy frood who really knew where his towel was." RIP Douglas Adams Creative Commons license: BY-NC-SA