Unsolicited Response Podcast

Unsolicited Response Podcast

Dale Peterson interviews guests who are pushing and prodding the ICS community to improve cyber security, as well as those in related fields with innovative ideas the ICS community should consider. Dale began his career as a NSA Cryptanalyst, has been securing ICS for over 15 years, and is the founder and program chair of the S4 Conference.... Show More

In the last two months Bryan Owen attended the SANS ICS Security Summit, DHS ICSJWG, RSA, OSIsoft's PI World, and LOGIIC (Oil/Gas/Gov consortium). Since most listeners like me aren't able to attend these events I thought we could find out what's happening from Bryan.

  • Why Bryan attends events. (4:12)
  • Is it worthwhile for an ICS security professional to attend RSA? (7:40)
  • Mike Assante from the ICS world winning the most prestigious RSA award. (14:00)
  • Any difference in ICSJWG given the recent DHS reorganization? (15:25)
  • Does it look like DHS will increase it's ICS security consulting and is this a good idea? (18:36)
  • Are two ICSJWG events a year too much? Or should there be more? (20:45)
  • Government training of ICS resources and what does success look like? (23:00)
  • What was the theme of PI World? (31:35)
  • Information on the new secure PI System Connector for passing information between PI components (slow RIP 5450). (33:50)
  • Will we see a shift away or replacement for the Purdue Model? (36:05)
  • Is Oil/Gas in the LOGIIC group rethinking control/safety integration recommendations after TRITON? (49:00)
  • Links and Info:

    The native 3 zone architecture approach is called a PI Connector.  Instead of a basic client server approach, PI Connectors come with a purpose built relay as a proxy for deployment in the DMZ.  Some of the major US control centers collaborated on the design and year of field trials.  PI System Connector is now generally available.  All PI Connectors such as Modbus, OPC-UA, etc will include the connector relay. The relay architecture also provides the endpoint for data ingress from our open source project called FogLAMP or any device pushing OSIsoft Message Format (OMF).

    PI World links:

    Biogen Case Study – Gus Green

    Fog Computing On The Plant Floor - Ivan Zoratti

    Introduction to FogLAMP - Ivan Zoratti

    OSIsoft Extreme PI System Hardening – Harry Paul

    This episode was sponsored by CyberX. Founded by military cyber experts with nation-state expertise defending critical infrastructure, CyberX has developed an end-to-end platform for continuous ICS threat monitoring and risk mitigation.

    Check out the CyberX Global ICS and IIoT Risk Report and my podcast from last year on the report with Phil Neray.

    Share
    Mark as Played

    Chat About Unsolicited Response Podcast

    Popular Podcasts

    The Daily
    The Daily
    This moment demands an explanation. This show is on a mission to find it.
    The Ron Burgundy Podcast
    The Ron Burgundy Podcast
    Will Ferrell reprises his role as Ron Burgundy in his brand new Ron Burgundy Podcast! Each episode has a different theme in which Ron engages in conversation with another notable person on the topic at hand.
    Stuff You Should Know
    Stuff You Should Know
    If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks then look no further. Josh and Chuck have you covered.