RSS.Social

Dale Peterson: ICS Security Catalyst

follow: @[email protected]

Posts

Premature Consensus In OT Security Made Worse With AI

Week 50: Evaluate The Ability To Meet The RTO (2nd Pass)

Week 49: Evaluate And Verify Backups

Week 48: Review Or Create Your Cyber Narrative

Week 47: Identify The OT Incident Response Team

Week 46: Validate Detection And Call Outs

Week 45: Create Cybersecurity Call Outs

Week 44: Planning And Implementing Your OT Detection

Two OT Security Debates

Week 43: OT Security Log Management

Water Treatment Honeynet Incident Analysis

Week 42: Draw The Line On Your Prioritized OT Detection Information Sources List

OT Is The Venice Of Security Infrastructure

Week 41: Identify OT Detection Information Sources

What Is The True Level Of OT Cyber Incidents?

Week 40: Review ICS Access Control

Disconnected: Manufacturing and OT Security

Week 39: Review OT User Accounts

My OT Security Vendor Was Aquired … What Should I Do?

Week 38: Get Your S4x26 Ticket And Hotel Room

We Won, We Lost (Part 2)

Week 37: Develop An OT Security Patching Program And Schedule

We Won, We Lost (Part 1)

Week 36: Create Prioritized Security Patching Categories