Dale Peterson: ICS Security Catalyst
Premature Consensus In OT Security Made Worse With AI
Week 50: Evaluate The Ability To Meet The RTO (2nd Pass)
Week 49: Evaluate And Verify Backups
Week 48: Review Or Create Your Cyber Narrative
Week 47: Identify The OT Incident Response Team
Week 46: Validate Detection And Call Outs
Week 45: Create Cybersecurity Call Outs
Week 44: Planning And Implementing Your OT Detection
Two OT Security Debates
Week 43: OT Security Log Management
Water Treatment Honeynet Incident Analysis
Week 42: Draw The Line On Your Prioritized OT Detection Information Sources List
OT Is The Venice Of Security Infrastructure
Week 41: Identify OT Detection Information Sources
What Is The True Level Of OT Cyber Incidents?
Week 40: Review ICS Access Control
Disconnected: Manufacturing and OT Security
Week 39: Review OT User Accounts
My OT Security Vendor Was Aquired … What Should I Do?
Week 38: Get Your S4x26 Ticket And Hotel Room
We Won, We Lost (Part 2)
Week 37: Develop An OT Security Patching Program And Schedule
We Won, We Lost (Part 1)
Week 36: Create Prioritized Security Patching Categories