Blog Posts Tagged with "Joe Weiss"

201d6e4b7cd0350a1a9ef6e856e28341

2014 ICS Cyber Security Conference – Mark Your Calendar

June 02, 2014 Added by:Joe Weiss

It's official! The 2014 (the 14th) ICS Cyber Security Conference will be held October 20 – 23, 2014 at the Georgia Tech Hotel and Conference Center in Atlanta.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Are DOE and DHS Helping to Secure the Infrastructure or Not?

March 08, 2012 Added by:Joe Weiss

DOE and the utilities are in an effort to secure the Grid. Yet the utilities voted down Version 5 of the NERC CIPs. Many of the devices that have been demonstrated to be vulnerable would not be addressed by NERC. Who is responsible for protecting critical infrastructure?

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Observations from RSA, BSides, and GABA

March 03, 2012 Added by:Joe Weiss

Stuxnet was being discussed by many without understanding the controller aspect. Most vendors were using technologies developed for monitoring IT networks and applying them to the SCADA networks. There were very few vendors that were addressing the field controllers...

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Is ICS-CERT Focused on the Right Issues?

February 21, 2012 Added by:Joe Weiss

Analysis of the incident database shows the most significant events from an impact perspective were control system related - yet they represent only 24 of the 203 advisories ICS-CERT put out in the last year. It appears ICS-CERT is focusing on the less important issues...

Comments  (2)

201d6e4b7cd0350a1a9ef6e856e28341

What's More Important - Vulnerabilities or Actual Incidents?

February 13, 2012 Added by:Joe Weiss

To at least some of us in the control systems community these vulnerabilities are not unexpected. The fact that many of these systems are also connected to the Internet as Eireann Leverett demonstrated is also not new, even though the numbers of control system connected to the Internet are striking.

Comments  (0)

A966b1b38ca147f3e9a60890030926c9

ICS Cybersecurity: Water, Water Everywhere

November 21, 2011 Added by:Chris Blask

Monitoring of water treatment networks using common SIEM or log management tools offers the kind of capability that can address the need for visibility into control system behavior. The ICS networks found in water facilities are deterministic systems with highly predictable behavior...

Comments  (4)