S4 Events
S4 Events
  • Видео 580
  • Просмотров 678 801
Badgerboard : Weaseling Out The Unknown
Communication on the backplanes of PLCs has been largely unavailable for visibility, protection and detection. Carl and the team at Talos Intelligence tried to change that.
Carl will present and release research that enabled Snort network IDS visibility directly into a popular PLC's backplane traffic. This visibility is read only, and is not subject to any other modules censoring data. By utilizing the power of a FPGA and custom bitcode, they were able to lift raw traffic from the backplane bus directly into network traffic that could be consumed by any network sensor.
This is an entirely new layer of visibility in a world where ICS security starts at the network layer. This talk includes t...
Просмотров: 49

Видео

Keeping Time In A Warzone
Просмотров 25218 часов назад
To protect themselves in the midst of Russian aggression, the Ukrainian military utilizes electronic warfare to blanket critical infrastructure to defeat radar and GPS guided smart munitions. This has the unintended consequence of disrupting GPS synchrophasor clock measurements and creating service outages on an already beleaguered and damaged transmission electric grid. Joe Marshall will tell ...
An Approach To Disaster Recovery In OT
Просмотров 547День назад
The backend of responding to a cybersecurity incident in OT is recovery, and if the incident is significant, it will spur a larger Disaster Recovery (DR) effort. Currently most Incident Response (IR) focus is around detection, containment, and eradication. However, with OT systems, significant recovery plans often lack detail given a response to any actual or perceived cybersecurity threat that...
A Large Supply Chain Security Program
Просмотров 200День назад
OEMs are expected to deliver secure products and services. The NIST, CISA, and MITRE frameworks are just the start. Are they enough? Cassie Crossley describes how a very large OEM, Schneider Electric, has structured more than 13 supply chain security initiatives including R&D security, secure development, SBOMs, vulnerability management, and 3rd party risk management.
PLCs: To Scan Or Not To Scan
Просмотров 1 тыс.14 дней назад
Can you scan a PLC? The answer in 2013 was no. What's the answer in 2023? Raphael has a lab full of scanners including traditional IT/OT scanning tools, OT detection products that have added scanning, attack surface management tools and more. Plus he addresses and tests different meanings of "scanning". In this session Raphael discusses what he scanned, how he scanned and what were the results ...
S4x24 Interview With Stewart Baker: Legal Issues on Software Liability & SEC Case Against Solarwinds
Просмотров 11714 дней назад
Stewart Baker is one of the preeminent lawyers on topics of cyber law with an impressive career in and out of government. Stewart also hosts the Cyberlaw podcast. The Biden administration is contending that vendors should be held liable for security deficiencies in their products. Assuming this is turned into law and/or executive orders, what does it mean? What can we learn from other liability...
Electric Vehicle Charging - Where's The Cyber
Просмотров 21221 день назад
Susan provides a deep-dive illustration of several key protocols used in the Electric Vehicle Supply Equipment (EVSE) ecosystem and inherent vulnerabilities within the state diagrams of each. In addition to a technical cybersecurity protocol deep dive, there is a brief discussion of the many policy gaps including the lack of a current reference architecture or testing standards for charging sta...
S4x24 Main Stage Interview With Rob Lee
Просмотров 1,5 тыс.21 день назад
Dale Peterson interviews Rob Lee on the S4 Main Stage. They cover a lot of ground and Rob is never shy about sharing his opinions and analysis. They discuss: - Rob’s first S4 - PIPEDREAM deployed v. employed distinction … and why 2 years later is it still the most dangerous ICS malware? - Are we really more homogenous? - What makes a group something that Rob/Dragos tracks as an ICS focused atta...
Risk Prioritization With SAST/DAST Symbolic Execution
Просмотров 197Месяц назад
I have a huge amount of unpatched vulnerabilities in my ICS. What should I patch when? Susan suggests and describes novel technologies, like hybrid Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) Symbolic Execution with Confidence Scoring as a method that can provide risk prioritization with high certainty. She explores emerging Machine Learning (ML) v...
Legal Realities of US Government OT Cybersecurity Regulation ... Lessons Learned From NERC CIP
Просмотров 338Месяц назад
OT & ICS security regulation is coming for many critical infrastructure sectors in the US. What should you do to prepare? Most worry about the implications for the security program, and this is wise. What's underappreciated is that if something is identified the situation moves into the legal field and regulatory law. Security people aren't typically prepared to deal with this. We've asked Shar...
Anatomy of Smart Building Ransomware Attacks
Просмотров 409Месяц назад
The company Anthony works for, JLL, manages almost 5 billion square feet of property. Some of that large number of properties have had cyber incidents in their building management systems. In this session, Anthony shares hard-earned lessons and common pitfalls due to major events, such as the discovery of a ransom note and loss of operations due to the incident. All phases of the attacker life ...
The European Way To Resilience: CRA(ck), SBOM(b) & AdviSor®y
Просмотров 286Месяц назад
Dina Truxius gives you the need to knows for the ongoing and upcoming legislation in Europe to enhance and shape cyber resilience (e.g. CRA=Cyber Resilience Act). The topic is relevant for international vendors when placing products on the European market and aims to discuss the resulting duties and consequences (mandatory SBOM, advisories, security.txt, etc.). Dina contributed to the CRA, and ...
Applying FAIR to OT
Просмотров 504Месяц назад
Justin presents a real-world case study illustrating how the FAIR framework can be leveraged to measure and quantify OT security risk at the production facility level. Using the FAIR framework, Justin shows: 1. A quantified valuation of your most critical production assets and threat scenarios most likely to impact those systems. 2. The risk assessment results and how they would be presented to...
A SBOM'd Substation
Просмотров 458Месяц назад
Experiment: Try to collect, correlate, and operationalize SBOMs for everything in a substation. Matt Wyckhouse and the team at Finite State and Alex Waitkus and the team at Southern Co. tried to do this. They went into the substation, physically inventoried all of their equipment, collected data from their sensors, and started collecting SBOMs from their vendors. Hear about the successes and pr...
The Case for Vertical-Specific OT Cybersecurity Solutions
Просмотров 258Месяц назад
Most of the OT cybersecurity solutions are designed and sold to address the near full set of industry segments. Power, water, manufacturing, maritime, rail, petrochem, ... Would an OT cybersecurity solution tailored for a specific sector be a better approach? Miki Shifman believes the answer is yes and makes his case in this session. He aims to explore the importance of detailed industry based ...
Normalization of Deviance in 3 Minutes
Просмотров 140Месяц назад
Normalization of Deviance in 3 Minutes
OT Security Standards Wars
Просмотров 892Месяц назад
OT Security Standards Wars
Stop Panicking Over Patching: CHERI Morello Memory Safety
Просмотров 302Месяц назад
Stop Panicking Over Patching: CHERI Morello Memory Safety
Plumbing and Cybersecurity: Basically The Same
Просмотров 3702 месяца назад
Plumbing and Cybersecurity: Basically The Same
2024 Threat Report - Cyber Incidents With Physical Impact
Просмотров 6142 месяца назад
2024 Threat Report - Cyber Incidents With Physical Impact
OT Sponsorship By Advancing Operational Priorities
Просмотров 1782 месяца назад
OT Sponsorship By Advancing Operational Priorities
Advanced Vulnerability Information Sharing ... A Success Story in OT
Просмотров 4232 месяца назад
Advanced Vulnerability Information Sharing ... A Success Story in OT
Pulling Data From Drawings Using AI
Просмотров 3702 месяца назад
Pulling Data From Drawings Using AI
State Of NERC CIP, European Update, and OT Security Community
Просмотров 3572 месяца назад
State Of NERC CIP, European Update, and OT Security Community
Priority Is In The Eye Of The Asset Owner
Просмотров 3942 месяца назад
Priority Is In The Eye Of The Asset Owner
The Attack Against Danish Critical Infrastructure
Просмотров 1 тыс.2 месяца назад
The Attack Against Danish Critical Infrastructure
Normalization of Deviance
Просмотров 7152 месяца назад
Normalization of Deviance
Secure Authorization Of ECU Privileges In Automobiles
Просмотров 4192 месяца назад
Secure Authorization Of ECU Privileges In Automobiles
The Reality of Water System Outages
Просмотров 1112 месяца назад
The Reality of Water System Outages
Dale Peterson Interviews Brian Scott on ONCD
Просмотров 2062 месяца назад
Dale Peterson Interviews Brian Scott on ONCD

Комментарии

  • @carol-lo
    @carol-lo День назад

    incredible

  • @kalkan19701
    @kalkan19701 3 дня назад

    You are amazing.

  • @seasidemarkarchive4884
    @seasidemarkarchive4884 6 дней назад

    Isn't this just leaking info to russians? now they can counter that.

  • @AlgoNudger
    @AlgoNudger 6 дней назад

    Thanks.

  • @ChripON
    @ChripON 9 дней назад

    Clearly, he has not heard of ISA-62443-4-2 and the Achilles Test Platform.

  • @marcelonoriega994
    @marcelonoriega994 10 дней назад

    One of the presentations so far!

  • @GokulMohan-v5i
    @GokulMohan-v5i 12 дней назад

    Enjoyed learning about SW Supply Chain Security.

  • @robertoferraz6996
    @robertoferraz6996 13 дней назад

    Great presentation....

  • @hoydn2547
    @hoydn2547 15 дней назад

    Nice speech!

  • @cpizani
    @cpizani 17 дней назад

    Audio is way too low.

  • @VincentDBlair
    @VincentDBlair 18 дней назад

    Indeed.

  • @sarahpamula778
    @sarahpamula778 18 дней назад

    Did Coffee help Bill Clinton from his Lewinsky addiction in an Oval important?

  • @joerobinson1710
    @joerobinson1710 18 дней назад

    Thanks

  • @to2866
    @to2866 27 дней назад

    Disappointing to see Rob Lee essentially adopt Hamas talking points. Terrorist groups will utilize civilian infrastructure in order to store weapons and hostages, and will sometimes even use those sites to launch their attacks. It's utterly ridiculous to say that civilian sites which have been militarized are not valid targets in war. If we followed his advice on never hacking civilian infrastructure, we'd just be putting ourselves at a disadvantage. You don't think the military/NSA should at the very least be prepositioning themselves within adversaries' critical infrastructure in the event of a war? Ok great, but that high road has real costs. I'd rather see those costs put on the aggressors instead of our population if and when we get attacked.

  • @pricerj6190
    @pricerj6190 27 дней назад

    Love that Rob can take a topic like ICS and make it completely entertaining. He is one hell of a dynamic public speaker and as always it's a zero bullshit / just focus on the basics approach. Well done sir!

  • @liljemark1
    @liljemark1 27 дней назад

    I could probably listen to Rob talk about almost anything! Entertaining and so much interesting details. Thanks for sharing this interview.

  • @OSINT-proxy
    @OSINT-proxy 27 дней назад

    Insightful. I hope more organizations start taking an honest risk-based look at their security strategies.

  • @alecrash96
    @alecrash96 27 дней назад

    This man who act like he was just there with no fault it’s now been charged by SEC for “false and misleading statements and omissions…”. Good job Mr “I teach you how to be exemplary”…

  • @GeorgeTsiros
    @GeorgeTsiros 28 дней назад

    I like how the decompiled code still uses windows type names: BOOL DWORD etc

  • @danehrenreich4531
    @danehrenreich4531 29 дней назад

    Truly a meaningful and educating session created by Dale Peterson and Andrew Ginter. It explains the "big secret" as related to how many OT directed attacks occured.

  • @danehrenreich4531
    @danehrenreich4531 29 дней назад

    @Justin Why we consider the impact as CIA? We must do that according to SRA (Safety-reliability-Availability

  • @mikefitzpatrick5183
    @mikefitzpatrick5183 Месяц назад

    Great presentation

  • @aerbil3136
    @aerbil3136 Месяц назад

    Thank you.

  • @mikefitzpatrick5183
    @mikefitzpatrick5183 Месяц назад

    Excellent presentation.

  • @seekitmk
    @seekitmk Месяц назад

    audio is very poor

  • @scadacip
    @scadacip Месяц назад

    This was an interesting talk. We never think about rail for some reason. Thanks Miki!

  • @Tadesan
    @Tadesan Месяц назад

    They know EXACTLY how to cut off the foreskin of male children!

  • @shreddagorge
    @shreddagorge Месяц назад

    What a great presentation and story! Also, Megan needs more caffeine... 😁

  • @inkosinozwelonyathi6360
    @inkosinozwelonyathi6360 2 месяца назад

    Great Video ,educative indeed

  • @marcoayala6263
    @marcoayala6263 2 месяца назад

    I enjoyed Colin’s talk in Miami live. 👍🏼

  • @chasejensen88
    @chasejensen88 2 месяца назад

    What a concept. Now, what language do we need to speak in order to explain this to the executives and business people calling the shots?

  • @orlandostevenson7214
    @orlandostevenson7214 2 месяца назад

    Wonderful success story - thank you for sharing!

  • @danehrenreich4531
    @danehrenreich4531 2 месяца назад

    Truly Impressive Patrick Miller and Dale Peterson

  • @andybochman
    @andybochman 2 месяца назад

    You two are the best. Great when you can be in the same convo.

  • @JenniferLin-df3qd
    @JenniferLin-df3qd 2 месяца назад

    very well explained. Appreciate the effort put into the speech.

  • @xelerated
    @xelerated 2 месяца назад

    Actually the original creator and 'coiner' of the phrase "Zero Trust" was Stephen Paul Marsh, in his doctoral thesis in 1994. You can google this to see its true. But odd, no credit that ive seen has been given to Stephen.

  • @marcoayala6263
    @marcoayala6263 2 месяца назад

    Thanks to Dale Peterson and the whole #S4x24 staff and community for their support for an extremely important principle, something that we should all keep an eye out for and know when to identify and when to push back or challenge.

  • @jakebrodskype
    @jakebrodskype 2 месяца назад

    Perhaps another way of looking at this issue is the normalization of complexity. Most engineers have the KISS (Keep It Simple, Stupid) principle hammered in to them from their very first internship job. But many software and network design firms seem to live by the principle of "putting things on top of other things" (yes, I am referring to that Monty Python sketch). When making the transition from basic pneumatic and electromechanical controls to software, and DCS/SCADA, we slid toward very significant complexity. A case study on how bad this can get can be found in a 2013 case of Bookout v. Toyota, where the Engine Controls could cause unintended acceleration. We haven't learned much since then. We're still putting things on top of other things. Maybe it is time to discuss limits.

    • @marcoayala6263
      @marcoayala6263 2 месяца назад

      Jake - I like it and a fan of Monty Python. The court case you mention is just one of many but definitely highlights the unintended risks we are subject to. Fixing digital problems with digital solutions in the principle of "putting things on top of other things" reminds me of a quote from Albert Einstein "We cannot solve our problems with the same thinking we used to create them" or something to that effect.. Dr. Trevor Kletz if alive today might be very vocal in this topic today...

  • @jakebrodskype
    @jakebrodskype 2 месяца назад

    Think of a control system at a small water utility no differently than an autopilot in a small plane. Autopilots do help. They enable flying to be much more precise and they improve economy. But you can fly them by hand. Civil Aircraft are supposed to be designed for dynamic stability (this is actual regulation). Failure of the automation is not an OMG I'm gonna fall out of the sky event. And neither is the automation at most small water utilities. Will it be less efficient? Yes. Will the quality of the water vary more? Yes. But the systems were originally designed to function without automation of any sort. As long as the attack against automation is recognized and maintained, (and there are protocols to discover and deal with automation failures), it will be a non-event.

  • @AlgoNudger
    @AlgoNudger 3 месяца назад

    Cybersecurity is illusion. 🤭

  • @ftkobbe
    @ftkobbe 3 месяца назад

    Yes… this is happening in many places.

  • @AlgoNudger
    @AlgoNudger 3 месяца назад

    What kind of intelligence, Dude? 😅

  • @mattdfranz
    @mattdfranz 3 месяца назад

    Reminds me of Common Block training at Goodfellow AFB decades ago.

  • @danieln6356
    @danieln6356 4 месяца назад

    Great vid