ics

May 17, 2022

ICS Werewolf: Slaying ICS Mythical Creatures, Part 3

Part 1 of the series saw us slaying the toxic manifestation of what the ICS Unicorn had become, and in Part 2,...
May 11, 2022

ICS Basilisk: Slaying ICS Mythical Creatures, Part 2

In Part 1, no actual Unicorns were harmed, 🦄 but we slayed the toxic manifestation of what the ICS Unicorn...
May 5, 2022

ICS Unicorn: Slaying ICS Mythical Creatures, Part 1

We had the privilege of attending and speaking at S4x22 this year, and for myself and much of the community, it was a homecoming....
April 28, 2022

S4: Creating the Future of ICS

There was a feeling of pent-up excitement as S4x22 started. The ICS security community hasn’t come together for over two...
April 7, 2022

SynSaber's Reference Architecture for Industrial

Reference Architecture to Detect + Defend Industrial Environments Our critical infrastructure, including power grids, water...
March 18, 2022

Cyber Risk Quantification and HAZOPS: Bedfellows?

With previous technical roles in large industrial organizations like ExxonMobil, Chevron, and Tennessee Valley Authority,...
March 10, 2022

What SynSaber 1.0 Means to Me [💜 Ron]

SynSaber 1.0 is a culmination of years of experience out in the field. Not just an incredible and fresh look at the OT visibility...
January 27, 2022

Why Intelligence-Based Detections in ICS Fail: Part 3

Part 3: INDUSTROYER We covered some basics of intelligence-based detections in Part 1 of this series, and Part 2 delved into...
January 18, 2022

Why Intelligence-Based Detections in ICS Fail: Part 2

Part 2: Understanding ICS In part 1, we covered the basics of intelligence-based detections in ICS, primarily focusing on...
January 11, 2022

Why Intelligence-Based Detections in ICS Fail

Part 1: Understanding Intelligence-Based Detections Did you just say “Intelligence-Based Detections in ICS Fail”?...