Dale Peterson: ICS Security Catalyst
Solving The “What Is The Threat To OT Systems” Problem
Number Of Cyber Incidents With A Physical Impact Down In 2025
The OT Cyber Incident And Threat Dichotomy
Reducing OT Incident Impact Inflation
S4x26 Theme Keynote: Connect
Week 8: Celebrate And Prepare For S4x26
Week 7: Prepare A 5-Minute Unsolicited Response Talk
Week 6: Your Top 5 Critical OT Security Controls
Week 5: Create And Track Leading Indicators
Week 4: Identify OT Security’s Impact On Key Mission Metrics
First Nozomi, Now Armis
25 Years, 3 Lessons
Week 3: Develop An OT Cyber Asset Inventory Plan
Week 2 : Evaluate OT Cyber Asset Inventory
Week 52 and 1: Enjoy The Year End And Holiday Season
Week 51: OT Security Patching Audit
Premature Consensus In OT Security Made Worse With AI
Week 50: Evaluate The Ability To Meet The RTO (2nd Pass)
Week 49: Evaluate And Verify Backups
Week 48: Review Or Create Your Cyber Narrative
Week 47: Identify The OT Incident Response Team
Week 46: Validate Detection And Call Outs
Week 45: Create Cybersecurity Call Outs
Week 44: Planning And Implementing Your OT Detection
Two OT Security Debates
Week 43: OT Security Log Management
Water Treatment Honeynet Incident Analysis
Week 42: Draw The Line On Your Prioritized OT Detection Information Sources List
OT Is The Venice Of Security Infrastructure
Week 41: Identify OT Detection Information Sources
What Is The True Level Of OT Cyber Incidents?
Week 40: Review ICS Access Control
Disconnected: Manufacturing and OT Security
Week 39: Review OT User Accounts
My OT Security Vendor Was Aquired … What Should I Do?
Week 38: Get Your S4x26 Ticket And Hotel Room
We Won, We Lost (Part 2)
Week 37: Develop An OT Security Patching Program And Schedule
We Won, We Lost (Part 1)
Week 36: Create Prioritized Security Patching Categories