RSS.Social

Dale Peterson: ICS Security Catalyst

follow: @[email protected]

Posts

Solving The “What Is The Threat To OT Systems” Problem

Number Of Cyber Incidents With A Physical Impact Down In 2025

The OT Cyber Incident And Threat Dichotomy

Reducing OT Incident Impact Inflation

S4x26 Theme Keynote: Connect

Week 8: Celebrate And Prepare For S4x26

Week 7: Prepare A 5-Minute Unsolicited Response Talk

Week 6: Your Top 5 Critical OT Security Controls

Week 5: Create And Track Leading Indicators

Week 4: Identify OT Security’s Impact On Key Mission Metrics

First Nozomi, Now Armis

25 Years, 3 Lessons

Week 3: Develop An OT Cyber Asset Inventory Plan

Week 2 : Evaluate OT Cyber Asset Inventory

Week 52 and 1: Enjoy The Year End And Holiday Season

Week 51: OT Security Patching Audit

Premature Consensus In OT Security Made Worse With AI

Week 50: Evaluate The Ability To Meet The RTO (2nd Pass)

Week 49: Evaluate And Verify Backups

Week 48: Review Or Create Your Cyber Narrative

Week 47: Identify The OT Incident Response Team

Week 46: Validate Detection And Call Outs

Week 45: Create Cybersecurity Call Outs

Week 44: Planning And Implementing Your OT Detection

Two OT Security Debates

Week 43: OT Security Log Management

Water Treatment Honeynet Incident Analysis

Week 42: Draw The Line On Your Prioritized OT Detection Information Sources List

OT Is The Venice Of Security Infrastructure

Week 41: Identify OT Detection Information Sources

What Is The True Level Of OT Cyber Incidents?

Week 40: Review ICS Access Control

Disconnected: Manufacturing and OT Security

Week 39: Review OT User Accounts

My OT Security Vendor Was Aquired … What Should I Do?

Week 38: Get Your S4x26 Ticket And Hotel Room

We Won, We Lost (Part 2)

Week 37: Develop An OT Security Patching Program And Schedule

We Won, We Lost (Part 1)

Week 36: Create Prioritized Security Patching Categories