Episodes

  • EP 44: Performing Security Assessments on ICS systems
    Aug 27 2024

    Too few vulnerabilities in industrial control systems (ICS) are assigned CVEs because of client non-disclosure agreements. This results in repeatedly discovering the same vulnerabilities for different clients, especially in critical infrastructure. Don C. Weber from IOActive shares his experiences as an ICS security professional and suggests improvements, including following the SANS best practices for ICS security..

    Show more Show less
    34 mins
  • EP 43: Hacking Large-Scale Off-Grid Solar Systems and Other Consumer IoT Devices
    Aug 13 2024

    At DEF CON 32, in the ICS village, researchers disclosed vulnerabilities in home and commercial solar panel systems that could potentially disrupt the grid. Dan Berte, Director of IoT security for Bitdefender, discusses his more than a decade in IoT, how the vendor maturity often isn’t there for our smart TVs or even for our solar panels, so reporting vulnerabilities sometimes goes nowhere. That doesn’t stop defenders like Dan, who, along with his team, work hard to change and to educate the industry.

    Show more Show less
    51 mins
  • EP 42: OT-CERT
    Jul 30 2024

    The resources available at small utilities are scarce, and that’s a big problem because small water, gas, and electric facilities are increasingly under attack. Dawn Capelli of Dragos is the Director of OT-CERT, an independent organization that provides free resources to educate and even protect small and medium sized utilities from attack.

    Show more Show less
    34 mins
  • EP 41: Firmware SBOMs, Zero Trust, And IoT Truth Bombs
    Jul 16 2024

    For the last twenty years we’ve invested in software security without parallel development in firmware security. Why is that? Tom Pace, co-founder and CEO of NetRise, returns to Error Code to discuss the need for firmware software bills of materials, and why Zero Trust is a great idea yet so poorly implemented. As in Episode 30, Tom is a straight shooter, imparting necessary truth bombs about our industry. Fortunately he’s optimistic about our future.

    Show more Show less
    41 mins
  • EP 40: Hacking IoT Surveillance Cameras For Espionage Operations
    Jul 2 2024

    That camera above your head might not seem like a good foreign target, yet in the Ukraine there’s evidence of Russian-backed hackers passively counting the number of foreign aid workers at the local train stations. Andrew Hural of UnderDefense talks about the need to secure everything around a person, everything around an organization, and everything around a nation because every one can be a target.

    Show more Show less
    28 mins
  • EP 39: Hacking Water Systems and the OT Skills Gap
    Jun 18 2024

    A critical skills gap in Operational Technology security could have a real effect on your water supply and other areas of the critical infrastructures. Christopher Walcutt from DirectDefense explains how the IT OT convergence, and the lack of understanding of what OT systems are, might be contributing to the spate of water systems attacks in 2024.

    Show more Show less
    40 mins
  • EP 38: Regulating OT Data Breaches And Ransomware Reporting
    Jun 4 2024

    When critical infrastructure is shut down due to ransomware or some other malicious attack, who gets notified and when? Chris Warner, from GuidePoint Security, discusses the upcoming Cyber Incident Reporting for Critical Infrastructure Act or CIRCIA and what it will mean for critical infrastructure organizations.

    Show more Show less
    43 mins
  • EP 37: Solving Mysteries. Saving Lives. Just Another Day with OT Incident Response and Forensics
    May 21 2024

    When an enterprise network goes down, you call in the Incident Response team and they do forensics. When your SCADA goes down, who do you call? Meet Lesley Carhart, technical director of incident response at Dragos, who focuses on products and services for the non standard part of cybersecurity. That means things like performing digital forensics on SCADA, industrial control systems, and critical infrastructure. There’s still some normal enterprise computing involved, but very often the stories told by practitioners are … well, just plain weird.

    Show more Show less
    42 mins