Jim Gilsinn

//Jim Gilsinn

What’s Your Backup and Recovery Strategy?

By |2018-08-22T17:28:36+00:00August 22nd, 2018|ICS Cybersecurity, ICS Design and Implementation, Jim Gilsinn|

While reading the Wired article, titled The Untold Story of NotPetya, the Most Devastating Cyberattack in History, I thought a lot about backups. Backing up your data and systems in order to maintain critical services is a cornerstone of any disaster recovery program (DRP). I hadn’t realized how fast NotPetya spread through some organizations. From [...]

Comments Off on What’s Your Backup and Recovery Strategy?

Control System SIEM Implementation

By |2018-01-26T11:43:26+00:00August 30th, 2017|ICS Cybersecurity, ICS Design and Implementation, Jim Gilsinn, Jim McGlone|

Network appliances like firewalls and switches, have software (commonly referred to as firmware) on them that monitor and log security events. Unfortunately, the logs are rarely read by anyone. In fact, most people have never logged into their home router to look at the logs or change the administrator password. If the firmware was compromised, [...]

Comments Off on Control System SIEM Implementation

BSides DC 2016 Cybersecurity ICS Work

By |2017-08-29T14:58:03+00:00November 15th, 2016|ICS Cybersecurity, Jim Gilsinn, News|

Recently, Jim Gilsinn presented at BSides DC 2016 about cybersecurity work on Industrial Control Systems (ICS) and SCADA (Supervisory Control And Data Acquisition). His presentation was titled: "What's the Big Deal with Assessing ICS/SCADA?" If you are considering a career in ICS Cybersecurity, this might persuade you to go back to law school. YouTube Link

Comments Off on BSides DC 2016 Cybersecurity ICS Work

Beware of USB Charging Stations

By |2017-06-25T19:58:09+00:00August 15th, 2016|ICS Cybersecurity, Jim Gilsinn, News|

As a consultant, I travel on a regular basis. When I travel, I usually have multiple devices with me: a personal phone, a work phone, one or more computer, test equipment, and other devices. All of these are power hungry, especially the phones. It is tempting to charge them anywhere I can, but as a [...]

Comments Off on Beware of USB Charging Stations

Teaching to Learn

By |2017-06-25T19:58:13+00:00April 2nd, 2015|ICS Cybersecurity, Jim Gilsinn|

Being an expert at something doesn’t always mean that you truly understand something. Until you can explain that topic to someone else, you can’t really prove that you know it that well. Sure, you can spout some jargon and show some really complicated process. But, until you can breakdown that explanation and/or process into simpler [...]

Comments Off on Teaching to Learn

Kenexis ICS Training Class @ S4x15

By |2017-06-25T19:58:13+00:00December 26th, 2014|Author, ICS Cybersecurity, Jim Gilsinn, News|

Jim Gilsinn and Bryan Singer, from Kenexis, will be teaching one of the advanced training courses at the S4x15 conference, titled “Why Does the Red Team Get All the Fun?” (http://www.cvent.com/events/s4x15-week/custom-22-6527b763e4b94569a3612510327b7278.aspx) This class will allow students to participate in an industrial control system (ICS) cyber security red/blue exercise during the course. The emphasis will be [...]

Comments Off on Kenexis ICS Training Class @ S4x15

The Changing Face of ICS/SCADA

By |2017-06-25T19:58:13+00:00December 16th, 2014|Author, ICS Cybersecurity, Jim Gilsinn, News|

What constitutes an industrial control system (ICS) or supervisory control and data acquisition (SCADA) system and the environments in which they operate has changed drastically over the last decade or so. Traditionally, ICS were used in discrete and batch manufacturing, process control, packaging, and infrastructure. Some may argue the fine points of that list, however, [...]

Comments Off on The Changing Face of ICS/SCADA