cybersecurity

/Tag: cybersecurity

Security PHA Review Example – Video from Kaspersky Industrial Cybersecurity 2018

By |2019-01-18T10:33:20+00:00January 18th, 2019|Edward M. Marszal, ICS Cybersecurity, OpenPHA|

Kaspersky has just published the videos from the Kaspersky Industrial CyberSecurity 2018 conference.  This video shows Kenexis CEO Ed Marszal presenting the Security PHA Review concept using a pump station as an example. https://www.youtube.com/watch?v=QnfBRlgBaHg&t=239s  

Security PHA Review Video – Kaspersky ICS Conference

By |2018-10-18T08:18:37+00:00October 18th, 2018|Edward M. Marszal, ICS Cybersecurity, Process Hazards Analysis|

On 20 Sep 2018, Kenexis CEO Ed Marszal presented at the 2018 Kaspersky Industrial Cyber-Security conference in Sochi, Russia. The topic of the presentation was Security PHA Review (SPR).  The presentation provides a brief overview of the topic while highlighting a specific application - a oil pipeline pumping station.  This example was chosen because an [...]

Comments Off on Security PHA Review Video – Kaspersky ICS Conference

You Have Received a Confidential Document

By |2018-04-11T12:58:46+00:00April 11th, 2018|Jim McGlone|

A month ago I was on my way into Istanbul from the Middle East. I filled out the online form for a Visa to enter the country and received an email that had malware attached to the link for my Visa. That one got me and took down my email for a couple hours why [...]

Comments Off on You Have Received a Confidential Document

2-factor authentication

By |2018-02-08T12:35:41+00:00February 8th, 2018|Chris Raiter, News|

2-factor authentication Most of the people I work with know how I feel about password security.  I’m well aware of the password management burden we all face, so I’m always promoting the use of password managers and two-step authentication for any account that supports it.  I recently read an article posted on The Register in which a [...]

Comments Off on 2-factor authentication

Control System SIEM Implementation

By |2018-01-26T11:43:26+00:00August 30th, 2017|ICS Cybersecurity, ICS Design and Implementation, Jim Gilsinn, Jim McGlone|

Network appliances like firewalls and switches, have software (commonly referred to as firmware) on them that monitor and log security events. Unfortunately, the logs are rarely read by anyone. In fact, most people have never logged into their home router to look at the logs or change the administrator password. If the firmware was compromised, [...]

Comments Off on Control System SIEM Implementation

BSides DC 2016 Cybersecurity ICS Work

By |2017-08-29T14:58:03+00:00November 15th, 2016|ICS Cybersecurity, Jim Gilsinn, News|

Recently, Jim Gilsinn presented at BSides DC 2016 about cybersecurity work on Industrial Control Systems (ICS) and SCADA (Supervisory Control And Data Acquisition). His presentation was titled: "What's the Big Deal with Assessing ICS/SCADA?" If you are considering a career in ICS Cybersecurity, this might persuade you to go back to law school. YouTube Link

Comments Off on BSides DC 2016 Cybersecurity ICS Work

Cybersecurity PHA Review

By |2017-06-25T19:58:09+00:00April 20th, 2016|Author, ICS Cybersecurity, Jim McGlone, Process Hazards Analysis, Safety Instrumented System|

Make sure to check out the cover article in ISA’s InTech publication. In the article, Ed Marszal explains: “Even though cyber-threats are not adequately addressed with existing process hazard analysis (PHA) methods, there is no reason to abandon everything that we know about process risk assessment and start from scratch. Instead, industry is extending tried-and-true [...]

Comments Off on Cybersecurity PHA Review