Podcast without auto template – Waterfall Security Solutions https://waterfall-security.com Unbreachable OT security, unlimited OT connectivity Wed, 10 Sep 2025 08:31:45 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.2 https://waterfall-security.com/wp-content/uploads/2023/09/cropped-favicon2-2-32x32.png Podcast without auto template – Waterfall Security Solutions https://waterfall-security.com 32 32 I don’t sign s**t – Episode 143 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/i-dont-sign-st-episode-143/ Wed, 10 Sep 2025 08:31:45 +0000 https://waterfall-security.com/?p=35976 Tim McCreight of TaleCraft Security in his (coming soon) book "I don't sign s**t" uses story-telling to argue that front line security leaders should not be accepting multi-billion dollar risks on behalf of the business. We need to escalate those decisions - with often surprising results when we do.

The post I don’t sign s**t – Episode 143 appeared first on Waterfall Security Solutions.

]]>

I don’t sign s**t – Episode 143

We don't have budget to fix the problem, so we accept the risk? Tim McCreight of TaleCraft Security in his (coming soon) book "I Don't Sign S**t" uses story-telling to argue that front line security leaders should not be accepting multi-billion dollar risks on behalf of the business. We need to escalate those decisions - with often surprising results when we do.

For more episodes, follow us on:

Share this podcast:

“It always comes down to can I have a meaningful business discussion to talk about the risk? What’s the risk that we’re facing? How can we reduce that risk and can we actually pull this off with the resources that we have?” – Tim McCreight

Transcript of I don’t sign s**t | Episode 143

Please note: This transcript was auto-generated and then edited by a person. In the case of any inconsistencies, please refer to the recording as the source.

Nathaniel Nelson
Hey everyone, and welcome to the Industrial Security Podcast. My name is Nate Nelson. I’m here as usual with Andrew Ginter, the Vice President of Industrial Security at Waterfall Security Solutions, who is going to introduce the subject and guest of our show today. Andrew, how’s going?

I’m very well, thank you, Nate. Our guest today is Tim McCrate. He is the CEO and founder of TaleCraft Security, and his topic is the book that he’s working on. The working title is We Don’t Sign Shit, which is a bit of a controversial title, but he’s talking about risk. Lots of technical detail, lots of examples, talking about who should really be making high-level decisions about risk in an organization.

Nathaniel Nelson
Then without further ado, here’s your conversation with Tim.

Andrew Ginter
Hello, Tim, and welcome to the podcast. Before we get started, can I ask you to say a few words for our listeners? You know, tell us a bit about yourself and about the good work that you’re doing at TaleCraft.

Tim McCreight
Hi folks, my name is Tim McCreight. I’m the CEO and founder of TaleCraft Security. This is year 44 now in the security industry. I started my career in 1981 when I got out of the military, desperately needed a job and took a role as a security officer in a hotel in downtown Winnipeg, Manitoba.

Shortly after I was moved into the chief security officer role for that’ that hotel and others and had an opportunity to move into security as a career path. And I haven’t looked back I decided I also wanted to learn more about cybersecurity.

Holy smokes, in ’98, ’99, I took myself out of the workforce for two years, learned as much as I could about information systems, and then came back for the latter part of my career and have held roles as a chief information security officer in a number of organizations. So I’ve had the pleasure and the honor of being both in physical and cybersecurity for the past 40 some years.

Andrew Ginter
And tell me about TaleCraft

Tim McCreight
It’s a boutique firm with two of our lines. Our first line is that it’s new skills from the old guard, and we are here to help give back and grow.

And it’s our opportunity to provide services to clients focusing on a risk-based approach to developing security programs. We teach security professionals how to tell their story and how to use the concepts of storytelling to present security risks and ideas to executives.

And finally, we have a series of online courses through our TaleCraft University where a chance to learn more about the principles of ESRM and other skills that we’re going to be adding to our repertoire of classes in the near future.

Andrew Ginter
And our topic is your new book. You know, I’m eagerly awaiting a look at the book. Can I ask you, you know before we even get into the the content of the book, how’s it coming? When are we going to see this thing?

Yeah Well, thank you for asking. i had great intentions to publish the book, hopefully this year. and Unfortunately, some things changed last year. i I was laid off from a role that I had and I started TaleCraft Security.

So sadly, my days have been absorbed by the work that it takes to stand up a business get it up and running. And my hats off to all the entrepreneurs out there who do all of these things every day. I’m new to this. So understanding what you have to do to stand up a business, get it running, to market it, to run the finances, et cetera, it has been like all consuming. So The book has unfortunately taken a bit of backseat, but I’ve got some breathing room now. I’ve got into a bit of a rhythm.

Tim McCreight
It’s a chance for me to get back to the book and start working through it. And and it’s to me, it’s appropriate. It’s a really good time. If I’m following the arc of a story, this is the latter part of that story arc. So I get a chance to help fill in that last part of the story, my own personal story, and and to put that into the book.

Andrew Ginter
I’m sorry to hear that. I’m, like said, looking forward to it. We have talked about the book in in the past. Let me ask you again, sort of big picture. You know, I’m focused on industrial cybersecurity. I saw a lot of value in the the content you described us as being produced. But can you talk about, you know, how industrial is the book?

We’re talking about risk. We’re talking about about leadership, right? How industrial does it get? I know you you do ah you do a podcast. You do Caffeinated Risk with Doug Leese, who’s a big contributor at Enbridge. He’s deep industrial. How industrial are you? How industrial is this book?

Tim McCreight
It spans around 40 years of my career and starting from, you know, physical security roles that I had, but also dealing with the security requirements for telecommunications back in the eighties into the nineties, getting ready for, and and helping with the security planning for the Olympics in the early two thousands, working into the cyberspace and understanding the value of first information security, then it turned into cyber security, then focusing on the OT environment as well, when I had a chance to work in critical infrastructure and oil and gas.

And then finally, you know the consistent message throughout the book is this concept of risk and that our world, when we first, you know when we first began this idea of industrial security back in the forties, bringing it up to where we need to be now from a professional perspective and how we view risk.

I do touch and do speak a little bit about the the worlds that I had a chance to work in from an industrial perspective. The overarching theme though is really this concept of risk and how we need to continue to focus on risk regardless of the environment that we’re in.

And some of the interesting stories I had along the way, some of the, honest to God, some of the mistakes I made along the way as well. I’ve learned more from mistakes than I have from successes.

And understanding the things that I needed to get better at throughout my career. I’m hoping that folks, when they do get a chance to read the book, that they recognize they don’t need to spend 40 some years to get better at their profession. You can do it in less time and you can do it by focusing on risk, regardless of whether you’re in the IT, the OT or the physical space.

Andrew Ginter
So there’s, there is some, some industrial angle in there, but, like I said, industrial or not, I’m i’m fascinated by the topic. I think we’ve, I’ve, beaten around the bush enough. The title, the working title is, is “We Don’t Sign Shit.” What does that mean?

Tim McCreight
I came up with “We Don’t Sign Shit.” And it’s I have a t-shirt downstairs in my office so that that I got from my team with an oil and gas company I worked with. And and Doug Lease was in the team as well.

And it really came down to this, the principle that for years, security was always asked to sign off on risk or to accept it or to endorse it or my favorite, well, security signed off on it, must be good.

Wait a second. We never should have. That never should have been our role. We never should have been put in a position where we had to accept risk on behalf of an organization because that’s not the role of security. Security’s role is to identify the risk.

Identify mitigation strategies and present it back to the executives so that they can make a business decision on the risks that we face. So in my first couple of weeks, when I was at this oil and gas organization, we had a significant risk that came across my desk and it was a letter that I had to sign off on. a brand new staff member came in and said, “Hi boss, I just need to take a look at this.”

I’m like, “Hi, who are you? What team do you work on? And what’s the project you’re working on?” When I read this letter, I’m like, are you serious that we’re accepting a potential billion dollar risk on behalf of this organization? Why?

And like, “Well, we always do this.” Not anymore. And we went upstairs. We got a hold of the right vice president to take a look at this to address the risk and work through it. And as I continued to provide this type of coaching and training to the team there, I kept bringing up the same concept. Look, our job is not to sign shit.

That’s not what we’re here for. We don’t sign off on the risk. We identify what the risk is, the impacts to the organization, what the potential mitigation strategies are. And then we provide that to executives to make a business decision.

So when I did leave the organization for another role, they took me out for lunch and I thought it was pretty cool. The whole team got together and they created this amazing t-shirt and it says, “Team We Don’t Sign Shit.” So it worked, right? And that mindset’s still in place today. I have a chance to touch base with them often. Ask how they’re doing. And all of them said the same thing is that, yeah, it’s that mindset is still there where they’ve embraced the idea that security’s role is to identify the risk and present opportunities to mitigate, but not to accept the risk on behalf of the organization.

That was the whole context of where I I took this book is, wouldn’t it be great if we could finally get folks to recognize, no, we don’t sign shit. This isn’t our job.

Nathaniel Nelson
So Andrew, I get the idea here. tim isn’t the one who signs off on the risk. He identifies it and passes it on to business decision makers, but I don’t yet see where the passion for this issue comes from, like why this point in the process is such a big deal.

Andrew Ginter
Well, I can’t speak for Tim, but I’m fascinated by the topic because I see so many organizations doing this a different way. In my books, the people who decide how much budget industrial security gets should be the people ah making decisions about are these risks big enough to address today? Is this, is this ah a serious problem because they’re the ones that are are you know they have the the business context they can compare the the industrial risks to the the other risks the business is facing to the other needs of the business and make business decisions

When you have the wrong people making the decisions, you risk, there’s a real risk that you make the wrong decisions because the the people executing on industrial cybersecurity do not have the business knowledge of what the business needs. They don’t have the big picture of the business and the people with the big picture of the business do not have knowledge, the information about the risk and the mitigations and the costs. And so each of them is making the wrong decision. When you bring these people together and the people with the information convey it to the people with the business knowledge, now the people with the business knowledge can make the right decision for the business.

And again, the industrial team execute on it. If you have the wrong people making the decision, you risk making the wrong decision.

Andrew Ginter
So let me ask, I mean, you take a letter into an executive, you you you do this over and over again in lots of different organizations. How do how is that received? How do the executives react when you do that?

Tim McCreight
So, I mean, my standard approach has always been, and and I use this as my litmus test is if the role I play as a chief security officer or CISO, and you’re asking me to accept risk, I come back. And the the first question I’m going to ask is if this is the case and you’re asking me to do this on, I’m going to say, no, invariably the room gets really quiet.

People start recognizing, oh, he’s serious. Yeah. Cause I have no risk tolerance when it comes to work. I would be giving everybody like paper notebooks and crayons and I want it back at the end of the day So I don’t have any tolerance for risk. But to test my theory is when I ask executives, if you’re saying that my role is to sign off on this, then I’m not going to, does that stop the project?

It never does. So the goal then is to ensure that the executives understand it’s their decision, and it’s a business decision that has to be made, not a security decision because my decision is always going to be, I start with no and I’ll negotiate from there.

But when we look at what the process is that i’ve I’ve provided and others have followed is I’ll bring the letter with the recommendations to the business for them to review and to either accept the risk, sign off on it, or to find me an opportunity to reduce the risk.

That’s when I start getting attention from the executives. So it moves from shock to he’s serious to, okay, now we can understand what the risk is. Let’s walk through this as a business decision. That’s when you start making headway with executives is taking that approach.

Andrew Ginter
So, I mean, that that sounds simple, simple but in in my experience, what you said there is actually very deep. I mean, i’ve I’m on the end of a long career as well, and I’ve never been a CISO. And in hindsight, I come to realize that, bluntly, I’m not a very good manager.

Because when someone comes to me, it doesn’t matter, so any anyone outside the the my sphere of influence my scope of responsibility saying, hey, Andrew, can you do X for me?

Whenever one of my people comes to me with an idea saying, hey, we should do Y, my first instinct is, what a good idea. Yeah, yeah.

Whereas I know that strong managers, their first instinct is no. And now whoever’s coming at us with the request or with the idea has to justify it, has to give some business reasons.

Again, so that’s, this is this is deep. It’s a deep difference between between you and and people like me.

Tim McCreight
Yeah well, and it is, and there’s, don’t get me wrong. There’s an internal struggle every time when I’ve worked through these types of requests where I, I want to help people too, but, but I understand that the path you got to take and how you have to get business to understand it, accept it and move forward with it. It’s different, right? This is why some great friends of mine that I’ve known for years, and they were technical, they’re technically brilliant. They have some amazing skills. Like, honest to God, I stopped being a smart technical person long time ago, and I’ve relied on just wizards to help move the programs forward.

And, I’ve chatted with them as well, and then they’re similar to you, Andrew. they’ve They’ve got great technical skills. They’ve been doing this for a long time. And, one of the one of the folks I chatted with, they’re just like, I can’t I can’t give myself the lobotomy to get to that level. I’m like, oh, my God. Okay, fair enough.

And I get it, but the way I’ve always approached this, it’s different, right? So I i take myself out of the equation of always wanted to help everybody to how can I ensure that I’m reducing the risk?

And if I can get to those types of discussions and have them with executives, for me, that’s where I find the value. So all of the work I’ve done in my career to get to this space, the amazing folks that I’ve met along the way, the teams that I’ve helped build, the folks I still call on to, to to mentor me through situations,

It always comes down to, can I have a meaningful business discussion to talk about the risk? And then it takes away some of the emotional response. It takes away that immediate, I need to help everybody do everything because we can’t.

But it gives us a chance to focus on what the problem is. What’s the risk that we’re facing? How can we reduce that risk? And can we actually pull this off with the resources that we have? So yeah, I get it. Not everybody wants to sit in these chairs. I’ve met so many folks throughout my career that they keep looking at me going, Jesus, Tim, why would you ever want to be in that space?

Why would you ever accept the fact that you’re, that they’re trying to hold you accountable for breaches or or for events or incidents? And I challenge back with it from it, for me, it’s that opportunity to speak at a business language, to get the folks at the business level, to appreciate what we bring to the table, whether it’s in OT security, IT t or cyber, it physical or cyber, it’s,

It’s a chance for all of us to be represented at that table, at that level, but at a business focus. So for me, that’s why I kept looking for these opportunities is can I continue to move the message forward that we’re here to help, but let’s make sure we do it the right way.

Andrew Ginter
So, fascinating principles. Can you give me some examples? I mean, TaleCraft is about telling stories. Can you tell me a story? How did this work? How did it come about? What kind of stories are you telling here?

Tim McCreight
So there’s there’s a lot that i’ve I’ve presented over the years, but a really good one is I was working with Bell Canada many years ago. We had accepted the, we were awarded the communication contract and some of the advertising media supporting contracts for the Olympics for 2010 for Vancouver.

And I was working with an amazing team at Bell Canada. Doug Leese was on the team as well, reporting into the structure. So it was very cool to work with Doug on some of these projects. We decided that the team that was putting in place the communication structure decided they want to use the first instance of voice over IP, commercial voice over IP. It was called hosted IP telephony.

And it was from Nortel. If folks still remember Nortel, it was from Nortel Networks. We looked at the approach that they were taking, how we were going to be applying the the technology to the Olympic Village, et cetera.

Doug and the team, they did this amazing work when the risk assessment came across, but they were able to intercept a conversation decrypt the conversation and play it back as an MP4, like an MP3 file.

You could actually hear them talking. And it was at the time it was the CEO calling his executive assistant order lunch. And we had that recorded. You could actually hear it. It was just as if it was, they were speaking to you.

So that’s a problem when you’re trying to keep secure communications between endpoints in a communication path. We wrote up the risk assessment. We presented it to the executives. We we presented the report up to my chain and it was simple.

Here’s the risk. Here’s the mitigation strategy. We need a business decision for the path that we wanted to take. And that generated quite the stir. My boss got back to me and said, well, we have to change the report. No, I said, no, we don’t. We don’t change this shit. We just, you you move it forward.

We’ve objectively uncovered the risk. The team did a fantastic job. But here’s an attached recording. If you want to hear it, but let’s keep moving forward. So it went up to the next level of management and same thing. Would you alter report? No, no I would not.

Move on, move on. Finally got to the chief security officer. And I remember getting the phone call. It’s like, well, Tim, this is, this is going to cause concerns. No, it’s a business decision. It isn’t about concerns. This is a business decision. And what risk is the business willing to accept?

So he submitted the report forward. Next thing I’m getting a call from, an executive office assistant telling me that my flight is going to be made for the next day. I’ll be, I’ll be flying to present the report. Like, Jesus Christ. So, all right, I got on a plane headed out east.

Waited forever to talk to the CEO at the time. And all they asked all they asked was, it is this real? are you is Would you change this? I said, no, the risk is legitimate.

And here’s the resolution. Here’s the mitigation path. Here’s the strategy. So they asked how much we needed, what we needed for time. it was about six months worth of work with the folks at Nortel to fix the problem. And all of that to state that had we done this old school many years ago, we would have just accepted the risk and move forward with it.

That wasn’t our role. That’s not our job, right? In that whole path, that whole risk assessment needed to presented to the point where executives understood what could potentially happen. We already proved that it could, but they needed to understand here’s the mitigation strategy. We found a way to resolve it.

We need this additional funding time resources to fix the problem. So that That stuck with me. That was like almost 20 years, like that was over 20 years ago. And that stuck with me because had I, altered my report, had I taken away the risk, had he accepted it on behalf of the security team, we don’t know what could have happened to the transmissions back and forth at the Olympics.

But I do know that in following that process, you never read about anyone’s conversations being intercepted at the 2010 Olympics, did you? It works. The process works, but what it takes is an understanding that from a risk perspective, this is the path that we have to take.

It’s not ours to accept. You have to make sure you get that to the executives and let them make that decision. Those are the stories that we need folks to hear now, as we move into this next phase of developing the profession of security.

Andrew Ginter
So Nate, you might ask, the CEO had a conversation, intercepted ordering lunch. Is this worth, the the big deal that it turned into? And I discussed this offline with with Tim and what he came back with is was, Andrew, think about it. Imagine that you’re nine days into the 10-day Summer Olympics or two week, whatever it is.

And someone, pick someone, let’s say the Chinese intelligence is found to have been intercepting and listening in on all of the conversations between the various nations, teams, coaches in the various sports and their colleagues back in their home countries.

They’ve been listening in on them for the the whole Olympics. What would that do to the reputation of the Olympics? What would that do to the reputation of Bell Canada? This is a huge issue. It was a material cost to fix. It took six months and he didn’t say how many people and how much technology.

But this is not something that the security team could say, “Okay, we don’t have any budget to fix this, therefore we have to accept the risk.” That’s the wrong business decision.

When he escalated this, it went all the way up to the CEO who said, yeah, this needs to be fixed. Take the budget, fix it. We cannot accept this risk as a business. That’s ah a business decision the CEO could make. It’s not a business decision he could make with the budget authority that he had four levels down in the organization.

Andrew Ginter
So fascinating stuff. Again, I look forward to stories in in the book. But you mentioned stories at the very beginning when you introduced TaleCraft. Can you tell me more about TaleCraft? How does this this idea of storytelling dovetail with with the work you’re doing right now?

Tim McCreight
When I was first designing this idea of what TaleCraft could be, we reached out to a good friend of ours here in Calgary, Mike Daigle. He does some amazing work. He spent some time just dissecting what I’ve done in my career and what I’ve accomplished. More importantly, some of the things that he wanted to focus on from company perspective.

And one of the the parts he brought up, and this is how TaleCraft was created, the word tail was I i spend a significant amount of my time now telling stories and it’s to help educate and to inform and stories to influence and and to provide meaning and value to executives.

But the common theme for all of this has been this concept of telling a story. One of the things I found throughout my career is as security professionals move through the ranks, as they begin, junior levels, moving into their first role as management and moving into director positions and eventually chief positions, the principles and the concepts of being able to tell a story or to communicate effectively with executives,

I found that some of my peers weren’t doing a great job or they were, I don’t know about you, Andrew, but if you sit in a ah presentation that someone’s giving and if all you’re reading is the slide deck, Jesus, you could just send that to me. I got this. I don’t need to spend time watching you stagger through a slide deck or the slides that have a couple of thousand words on them that you’re expecting us to read from 40 feet away.

It doesn’t happen. So what really bothered me is that we started losing this skillset of being able to tell a story. And to effectively use the principles of storytelling to provide input to executives, to make decisions for things like budget or resourcing or allocating, staff resources, et cetera.

So that’s one of the things that we do at TaleCraft is we teach security professionals and others, the principle and the concept of storytelling and how the story arc, those three parts to a story arc that we learned as kids, the beginning of the story, the middle where the conflict occurs, the resolution, and finally the end of the story, when, when you’re closing off and heading back to the village, after you slayed the dragon, those three things that we have, we learned as kids, they still apply as an adult because we learn as human beings through stories. We have for hundreds of years, thousands of years, used oral history as a way to present a story from one generation to the next.

We can use the same skill sets when we’re talking to our executives, when we’re explaining a new technique to our team, or when we’re giving an update in the middle of an incident and how you’re going to react to the next problem and how you’re going to solve it.

Those principles exist. It’s reminding people of what the structure is, teaching people how to follow the story arc when they’re presenting their material, taking away the noise, the distractions and everything else that gets in the way when listening to a story, but focus on the human.

And that’s one of the things that we’re doing here Telegraph is we’re teaching people to be more human in their approach and the techniques work. I just, My wife is up in Edmonton doing a conference right now for the CIO c Conference for Canada.

And she actually asked me to, this is a first folks, for all those of you who are married, what what kind of a progress I’ve made. My wife actually asked if I could dissect her presentation and help her with it. I thought that was pretty amazing. We restructured it so that she was able to use props.

She brought in a medical smock and and a stethoscope to talk about one of the clients that she worked with. And it sounds like it worked because she got some referrals for folks in the audience and she’s spending time right now talking to more clients up in Edmonton. So yeah, I crossed my fingers I was going to get through that one and it seemed to have worked. But these principles of telling a story, if you have a chance to understand how a story works and you’re able to replicate that in a security environment, all of a sudden now you’re speaking from a human to a human.

You’re not bringing in technology. You’re not talking about controls. You’re not spewing off all of these different firewall rules that we have to go through. Nobody cares about that stuff. What they want to hear is what’s the story and can I link the story to risk?

And at the top end of that arc, can I provide you an opportunity to reduce the risk and then finish the story by asking for help? If we can do that, those types of presentations throughout my career, that’s when I’ve been the most successful is when I can focus on the story I need to tell, get the executives as part of it and focus on the human reaction to the problem that we have.

That’s one of the things that we’re teaching at TaleCraft.

Andrew Ginter
So that makes sense in principle. Let me let me ask you. I mean, I do a lot of presentations. I had an opportunity to present on a sort of an abstract topic at S4, which is the currently the world’s biggest OT security-focused conference. And, if you’re curious, it was the title was “Credibility Versus Likelihood.” So, again, a very sort of abstract, risky, risk-type topic.

And the the the advice I got from Dale Peterson, the organizer, was, “Andrew, I see your slides. You can’t just read the slides. You’ve got to come to this presentation armed with examples for every slide, for every second slide.”

Tim McCreight
Yep.

Andrew Ginter
“Get up there and tell stories.” so I would give examples. Sometimes they would be attack scenarios. is that is that the same kind of thing here?

Tim McCreight
It is, I think. you And congratulations for for being asked to present at that conference. That’s amazing. So so kudos to you. That’s that’s awesome, Andrew. That’s great to hear. But you’re right. You touched on one of the things that a lot of presentations lack is the credibility or how I view the person providing the presentation. Do they have the authority? Do I look at them as someone who’s experienced and understands it?

And you do that by telling the story and providing an example for, let’s say, an attack scenario where you saw how it unfolded, how you’re able to detect it, how are you able to contain it, eradicate it, recover back. Those are the stories that people want to hear because it makes it real for people. Providing nothing but a technical description of an attack or bringing out, us as an example, a CVE and breaking it down by different sections on a slide. Oh my God, I would probably poke my eye out with a fork.

But if you walk me through how you identified it, The work that you guys did to identify, to detect it, to contain it, to eradicate it, and then recover. it If you can walk me through those steps from a personal example that you’ve had, that to me is the story.

And that’s the part that gets compelling is now you’ve got someone who’s got real world experience, expertise in this particular problem. They were able to solve it and they provide to me in a story. So now I can pick up those parts. I’m going to remember that part of the presentation because you gave me a great example, which is really, you gave me a great story. Does that make sense?

Andrew Ginter
It does to a degree. Let me Let me distract you for a moment here. I’m not sure this is I’m not sure this is the same the same topic, but I’ve, again, i’ve I’ve written a bit on risk.

Tim McCreight
Okay.

Andrew Ginter
You know I’ve tried to teach people a bit about what what is risk, how do you manage risk in in especially critical infrastructure settings. And I find that a lot of risk assessment reports are, it seems to me not very useful. They’re not useful as tools to make business decisions.

You get a long list of, you still have 8,000 unpatched vulnerabilities in your your your OT environment. Any questions? To me what business decision makers understand more than a list of 8,000 vulnerabilities is attack scenarios.

And so what I’ve argued is that every risk assessment should finish or lead, if you wish, with a in In physical security, you’re you’re probably more familiar this than I am, the the concept of design basis threat, a description of the capable attack you must defeat. You’re designed to defeat with a high degree of confidence.

And you look at your existing security posture and decide this class of attack we defeat with a high degree of confidence. These attacks up here, we don’t have that high degree of confidence.

And and what I’ve argued you should tell the story. Go through one or two of these attack scenarios and say, here is an attack that we would not defeat with a high degree of confidence. Is it acceptable that this attack potential is out there? Is that an acceptable risk?

Is that Is that the kind of storytelling we’re talking about here, or have I drifted off into some other space?

Tim McCreight
No, I think you’ve actually applied the principles of telling a story to something as complex as identifying your particular response or your organization’s response to ah either an attack a attack scenario or a more sophisticated attack scenario. So no, I think you’ve you’ve nailed it.

What it does though, in the approach that you just talked about, It gives a few things to the business audience. One, you have a greater understanding of the assets that are in place and how they apply to the business environment, right? Whether it’s in a physical plant structure for OT or whether it’s a pipeline, et cetera.

If you understand the environment that is being targeted, understand the assets that are in place and the controls that you have there in place, that gives you greater a greater understanding and foundations for what is the potential risk.

By telling the story then of what a particular attack scenario looks like, And if you have a level of confidence that you’d be able to protect against it, you’d be able to walk through the different parts of the story arc.

This is the context of the attack. This is what the attack could look like. Here’s how we would try to resolve it if we can. And then here’s the closing actions that we would be focused on if the attack was either successful or unsuccessful.

So all of those things, I think, apply to the principles of telling a story. What you’ve given is a great example of how to take something that’s very technical or, the the typical risk assessment I’ve seen in my career where, that Andrew here, here’s your 200 page report, the last 10, last hundred pages are all the CVEs we found.

And let us know if you need any help. Well, that doesn’t help me. But if you walk me through a particular example where here is in this one set of infrastructure, we’re liable or we’re open to this type of attack.

I think that’s amazing because it gives the executives the story they need. You understand the assets. Here’s the risk. Here’s the potential impact. Here’s what we can and cannot do to defeat or defend against this.

And then we need your help if this is a risk that you can’t accept. So no, I think you’ve covered all parts of what would be an appropriate story arc for using that type of approach. And honest to God, if you could get more folks to include that in reports, I would love to see that because I’m like you, I i have read too many reports that don’t offer value.

But the description you just provided and the way we break it down, that offers huge value to executives moving forward.

Nathaniel Nelson
Tim’s spending a lot of time emphasizing the importance of storytelling in conveying security concepts to the people who make decisions. Andrew, in your experience, is this sort of thing something you think about a lot? Do frame your your information in the same ways that he’s talking about, or do you have a different sort of approach?

Andrew Ginter
This makes sense to me. it’s sort of a step beyond what I usually do. So I’m i’m very much thinking about what he’s done and and how to use it going forward. But just to give you an example, close to a decade ago, I came out with a report, the “Top 20 Cyber Attacks on Industrial Control Systems.”

And it wasn’t so much a report looking backwards saying what has happened. It’s a report looking at what’s possible, what kind of capabilities are out there. And I tried to put together a spectrum of attack scenarios with a spectrum of consequences. Some of the attacks were very simple to carry out and had almost no consequence.

Some of them were really difficult to carry out and would take you down hard and cost an organization billions of dollars or dozens of lives. And everything in between.

And I did that because, in my experience, business decision makers understand attack scenarios, better than they understand abstract numeric risk metrics or lists of vulnerabilities.

But I described it as attack scenarios. In hindsight, I think really… what I was doing there was telling some stories and, I need to update that report.

I’m going to do it by updating it to read in more of a storytelling style so that, people can hear stories about attacks that they do defeat reliably and why, and attacks that they probably will not defeat with a high degree of confidence and what will be the consequences so that they can make these business decisions.

Nathaniel Nelson
Yeah, and that sounds nice in theory, but then I’m imagining, you tell your nice story to someone in the position to make a decision with money and they come back to you and say, well, Andrew, your story is very nice, but why can’t we defeat all of these attack scenarios with the amount of money we’re giving you?

Nathaniel Nelson
What do you tell them at that point?

Andrew Ginter
That is a very common reaction, saying, “You’ve asked us where to draw the line. We draw the line above the most sophisticated attack, fix them all.” And then I explain what that’s going to cost.

They haven’t even really paid attention to the attack scenarios. They haven’t even asked me about the attack scenarios. I’ve just explained the concept of a spectrum. They said, yeah, put it on the very put the line on the top, fix them all. And then you have to explain the cost.

And they go, “Whoa. Okay, so what are these?” And they ask in more detail and you give them the simplest attack, the simplest story that you do not defeat with a high degree of confidence.

And you ask them, is that something we need to fix? And they say, “Yeah, that’s nasty. I could see that happening, fix that. What else do you got?” And you work up the chain and eventually you reach an attack scenario or two where they look at it and say, “That’s just weird.”

I mean, let me give you an extreme example. Imagine that a foreign power has either bribed or blackmailed every employee in a large company. What security program, what policy can this the the CEO put in place that will defend the organization? Well, there isn’t one. Your entire organization is working against you. Is that a credible threat? The business is probably going to say, no, this is why we have background checks.

A conspiracy that large, the government is going to, be you going to come in and, and and and arrest everyone. That’s not a credible threat. And so, the initial reaction might be, yeah, fix it all. Draw the line across the very top of the spectrum.

And when that becomes clear that you can’t do that, this is where you dig into the stories and they have to understand the the individual scenarios. And they will eventually draw the line and say, “These three here that you told me about, fix them.” The rest of them just don’t seem credible.

That’s the decision process that you need to to to go through. And you need to describe the attacks. And I think the right way to describe the attacks is is with storytelling.

Andrew Ginter
So, I mean, this all makes great sense to me. I mean, this is why I asked you to be a guest on the podcast. But let me ask you, a sort of the next level of detail at TaleCraft. If, I don’t know, a big business, a CISO, says, TaleCraft makes sense to me and they bring you in, what do you actually do? Do you do you run seminars? Do you review reports and give advice? what What does TaleCraft actually do if we if somebody engages with you?

Tim McCreight
So there are a couple of things that we can offer to organizations that bring us in that from a TaleCraft perspective. First, what we offer, let me talk about storytelling first. What we offer from the storytelling approach is we will go to the client site.

We will run workshops, anywhere from four-hour workshop to a two-day workshop. We will bring team members from the security group, as well as others that the security team interacts with. We’ll go over the principles of storytelling and the concepts of storytelling, how to be more mindful in your public speaking and in your preparation.

And we’ll spend the first day going through the theory and the concepts of telling a story and becoming a better public speaker. Then on the second day of the workshop, we we then ask all participants to stand up for up to 10 minutes and provide their stories.

At the end of each one of the sessions, we provide positive feedback and provide them opportunities to grow and experience more more storytelling opportunities. And then we close out the workshop We provide reports back to each of the individuals on how we observed them absorbing all of the content from day one, and then offer opportunities for individual mentoring and coaching along the way.

So that’s one of the first services we offer. The second, as we come into organizations, if a CISO or CSO contacts us and asks us for assistance, we can do everything from helping them redesign their security program using the principles of enterprise security risk management, review the current program that they have today, assess the maturity of the controls that they have in place, identify risks that are facing the organization at a strategic level. And then we can come in and help them map out and design path to greater maturity by assessing the culture of security across the organization as well, where we go out and interview stakeholders from across the organization, from different departments, different divisions, and different levels of employees in the organization and identify their perception of security, the value that security brings to the organization, and how the security team can become greater partners and trusted advisors to the company. That’s part of the work that we do at Telegram Security.

Andrew Ginter
I understand as well that you’re working with professional associations or or something. I mean, I know that in in Canada, there’s the Canadian Information Processing Society. It’s not security focused. Security is an aspect of information processing in in the IT space.

In Alberta, there’s APEGA, the Association for Professional Engineers, Geologists, Geophysicists. I would dearly love to see these professions embrace cybersecurity and establish professional standards for practitioners for what is considered acceptable practice so that there is sort of a minimum bar.

So tell me, you’re you’re working with these folks. what What is it that you’re doing? How’s that going?

Tim McCreight
Yeah, so this happened, I’ve been thinking about this for probably the last 20 some years, and it always bothered me that the security director, the CISO, et cetera, in an organization, if they did get a chance to come to a board meeting or to be invited to talk to executives, you got a 45 minute time slot. Most times it was less. You had a chance to drink the really good coffee, and then you were asked to leave the room, and that was your time.

Where your peers who were running other departments across the organization in legal, finance, HR, etc. They stayed the entire weekend to help map out the strategy for an organization. Yet we weren’t invited to that party.

And that kind of annoyed me for the last some years. So I took it upon myself to begin a journey and I brought some folks along with me. There’s about 15 of us now that are working on the concept of designing and developing the profession of security, focusing on Canada first, and then working through the Commonwealth model to all those countries that follow the Commonwealth parliamentary system.

And it it made sense to me. I couldn’t do much work when I was the president of ASIS 2023. I didn’t want to have any perceived conflict of interest or anything that I was doing. But what we looked at from this concept of designing the profession of security It’s an opportunity for thus those who call this our profession and want to be recognized as such to borrow some of the great work that KIPPS has done and that APEGA has done here in Alberta, KIPPS across the country, to recognize the path that they took, how they were recognized and established, how they developed their charters, et cetera.

So we’ve had an opportunity to chat with some folks from KIPPS, but also to look at the work that they’ve done. And I’ve had a chance to review APEGA and it made sense to me. So now, Spin forward to 2025. We have a group of individuals who are focused on designing and developing what we consider to be a model that will provide a professional designation for security professionals in Canada.

It’s an opportunity to demonstrate your expertise and your body of knowledge. It’s an opportunity to take all of the the designations that you’ve received from groups like ISC squared, ISACA, ASIS, et cetera, use them as stepping stones to the next level where you’re accepted as a professional designation so that a security designation, whatever we can land on for the post nominals would be recognized the same as an engineer or as a doctor or as potentially a lawyer.

It gives us the validation of our work that we do. It gives us the recognition of the value that security brings to an organization. And it ties together OT, IT, t cyber, physical, all of the different parts of makeup security. And it’s a chance for us to come under one umbrella. So the way I describe it is that, I’ve, For years, I said, I ran a department. It just happens to be security. Now we can say I’m a security professional and my expertise is in OT security or in forensics or in investigations or in a crime prevention through environmental design.

It gives us an umbrella designation for security and a chance to specialize. So a good friend of mine is a surgeon. He started off as a doctor and now he’s a thoracic surgeon. So whenever he recognizes himself is that, he’s a, he’s a doctor, my specialty is c thoracic surgery, and now he’s chief of thoracic surgery at Vancouver General Hospital. Super great guy, but the path he took was become a doctor, demonstrate your expertise, spend more time to create your specialty, focus on that, be recognized for that. And now that’s his designation.

I want to do the same here in Canada for security. The reason why is, look, you and I both know this, Andrew, and we’ve we’ve seen this. If I go do a risk assessment for a client or internally, and if I do a bad job, I just go to the next client.

But if we have a doctor or a lawyer who mishandles a file or mishandles an operation or is liable for their actions, they’re held accountable to it. We are not. What I want to be able to do is put in the standards that demonstrate the level of our expertise, that we’re held accountable for our actions, that we maintain our credentials throughout our career, that we’re able to give back to the profession of security, and that if something does happen, we’re actually accountable for the work that we do.

And think that’s important, right? like here in our new house, an engineer stamped our plans. He’s accountable for the work he did. Why can’t we have the same for security? I think we need to, because then that provides executives a greater understanding of how important the work that we do every day to secure your organization so that you can achieve your goals and objectives.

That that’s what I’ve been doing on the side of my desk for the past 20 years. I finally got some breathing room to do it now with a TaleCraft giving me the space to do it. So I’m, I’m looking forward to trying to roll this thing out between now and the end of the year, at least the structure of it, and then we engage more people to get their comments and their perceptions so that we’re trying to reflect and represent as many folks as we can across the security profession.

Andrew Ginter
Well, Tim, this has been tremendous. Again, I look forward to to your book. Hopefully you find some time to work on it. Before we let you go, can I ask you to sum up for us? What are the what what should we take away from from the discussion we’ve had in the in the episode here and and use it going forward?

Tim McCreight
Thank you for that. I appreciate it. And yeah, fingers crossed, I can get working on the book over the summertime. That’s my goal. But for this particular episode, I think a couple of things. One, as security professionals, it’s not our job to accept the risk. It’s our job to identify it, provide a mitigation strategy, and present it back to executives. So that’s that’s one of the things that I want to keep stressing for everybody. Our role is to be an advisor to the organization.

It’s not to accept the risk on behalf of the organization. Second is, We all have a story to tell. We all understand the value and the power of a story. We all see how important it is when we tell a story to our executives, to our leaders, to our teams, and to others.

You need to focus on those skill sets of how to tell a story, particularly in the role of security, because not everyone understands the value that we bring. and the second annual and then And the last point for me is that You need to continue to look for mentors, for instructors, for trainers who can offer you these skill sets and you can provide this type of training for you so that you can continue to build your career.

We can’t do this alone. but You need to make sure that you have an opportunity to reach out to folks that can help you, whether it’s looking at your security program and trying to build it on a risk-based approach or teaching people the value of telling a story and then applying those skills the next presentation you give to executives. If folks remember those things, that’d be terrific.

So for those folks listening to the podcast today, if those points resonate with you, and if you’re looking for opportunities to learn more about telling a story or how to be effective doing that, how to look at your program from a risk-based approach and how to find mentors that can help you in your career path, reach out to TaleCraft Security.

This is what we do. It’s our opportunity to give back to the profession of security, to help organizations build their security programs, and to grow the skill sets of people who want to learn more about telling a story, becoming a better security leader, or understanding the concepts of a risk-based approach to security.

That’s what we’re here at TaleCraft for us, to help, to give back, and to grow.

Nathaniel Nelson
Andrew, that seems to have done it with your interview with Tim. Do you have any final word you would like to say gazelle today?

Andrew Ginter
Yeah, I mean, I think this is a really important topic. I see way too many security teams saying, this is my budget. This is all I have budget to I do not have budget to solve that problem. Therefore, I will accept the risk of that problem. And, especially for new projects, for risks that that we’ve never considered before, you That is often the wrong decision.

When we have new kinds of decisions to make, we need to escalate those decisions to the people who assign budget. We need to tell those people stories so they understand the risk. We have to get the right information, the right stories to the right people so they can make the right decisions. Saying, I have no budget, therefore I’m going to accept the risk many times is the wrong decision for the business. And we cannot afford to be making those wrong decisions time and again.

As the threat environment becomes more dangerous, as consequences of of industrial cyber attacks increase, we need to be making the right decisions. And this seems an essential component of of making the right decisions.

Nathaniel Nelson
Well, thanks to Tim McCreight for that. And Andrew, as always, thank you for speaking with me.

Andrew Ginter
It’s always a pleasure. Thank you, Nate.

Nathaniel Nelson
This has been the Industrial Security Podcast from Waterfall. Thanks to every everyone out there listening.

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post I don’t sign s**t – Episode 143 appeared first on Waterfall Security Solutions.

]]>
NIS2 and the Cyber Resilience Act (CRA) – Episode 142 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/nis2-and-the-cyber-resilience-act-cra-episode-142/ Mon, 18 Aug 2025 08:29:50 +0000 https://waterfall-security.com/?p=35094 NIS2 legislation is late in many EU countries, and the new CRA applies to most suppliers of industrial / OT computerized and software products to the EU. Christina Kieffer, attorney at reuschlaw, walks us through what's new and what it means for vendors, as well as for owner / operators.

The post NIS2 and the Cyber Resilience Act (CRA) – Episode 142 appeared first on Waterfall Security Solutions.

]]>

NIS2 and the Cyber Resilience Act (CRA) – Episode 142

NIS2 legislation is late in many EU countries, and the new CRA applies to most suppliers of industrial / OT computerized and software products to the EU. Christina Kiefer, attorney at reuschlaw, walks us through what's new and what it means for vendors, as well as for owner / operators.

For more episodes, follow us on:

Share this podcast:

“So NIS2 is focusing on cybersecurity of entities, and the CRA is focusing on cybersecurity for products with digital elements.” – Christina Kiefer

Transcript of NIS2 and the Cyber Resilience Act (CRA)  | Episode 142

Please note: This transcript was auto-generated and then edited by a person. In the case of any inconsistencies, please refer to the recording as the source.

Nathaniel Nelson
Welcome everyone to the Industrial Security Podcast. My name is Nate Nelson. I’m here with Andrew Ginter, the Vice President of Industrial Security at Waterfall Security Solutions, who’s going to introduce the subject and guest of our show today. Andrew, how’s going?

Andrew Ginter
I’m very well, thank you, Nate. Our guest today is Christina Kiefer. She is an Attorney at Law and a Senior Associate in the Digital Business Department of reuschlaw. And she’s going to be talking to us about cybersecurity regulation in the European Union. As we all know, NIST 2 is coming and there’s other stuff coming too.

Nathaniel Nelson
Then without further ado, here’s your conversation with Christina.

Andrew Ginter
Hello, Christina, and welcome to the podcast. ah Before we get started, can i ask you to say a few words, introduce yourself and your background, and tell us a bit about the good work that you’re doing at Reuschlaw.

Christina Kiefer
Yes, of course. So first of all, thank you very much for the invitation. I’m very happy to be in your podcast today. So, yeah, to me, my name is Christina Kiefer. I’m an attorney at law working as a senior associate at our digital business unit in the law firm reuschlaw.

Christina Kiefer
We are based in Germany and reuschlaw is one of Europe’s leading commercial law firms specialized in product law. And for more than 20 years, our team of approximately 30 experts has been advising companies in dynamic industries, both nationally but also internationally.

Christina Kiefer
And for me myself, in my daily work, I advise companies and also public institutions on yeah complex issues in the areas of data protection, cybersecurity, but also IT and contract law.

And one focus of my work is on supporting clients in introduction of digital products in the EU market. And also looking at the field of cybersecurity and IT law. Since my studies, I have already focused on IT law and cybersecurity. And yes, I have been involved in the legal development since since then in this area.

Andrew Ginter
Thank you for that. And our topic is, you know, the law in Europe for cybersecurity, its regulation. The big news in Europe is, of course, NIS2. And it’s not a law, it’s a directive to the the nation states to produce laws, to produce regulations. So every country is going to have its own laws. Can I ask you for an update? How’s that going? who’s Who’s got the law? I thought there was a deadline. do the do the Do the nations of Europe have this covered or or is it still coming?

Christina Kiefer
Yes, so it’s the last point, so it’s still coming. Some countries have already transposed NS2 Directive into national law, but also a lot of countries are still in the developing and the transposition yeah period.

And that that’s why we are yeah confusing because NIS2 Directive it’s already or has already been enforced since January 2023. and and also the deadline for the EU member states to impose the NIS2 directive international law was October 2024.

So because of that, because of a lot of member states haven’t transposed the NIS2 directive international law, the EU Commission has launched an infringement proceeding against 23 member states last fall in 2024. And this has led to some movements in some EU member states. So as of now, 10 countries have fully transposed this to international law.

So for example, Belgium, Finland, Greece or Italy. And then another 14 countries have published at least some draft legislation so far. And there you can call ah Bulgaria, Denmark and also Germany. And then there are also two countries, it’s Sweden and Austria, and those two EU member states, they have not published neither a draft or also a final national law. So there we have no public information available on their implementation status yet.

Andrew Ginter
And, you know, someone watching this from the outside with, you know, a command of English and of very limited command of German, is there sort of a standard place that a person like me looking at this from the outside could go to find all this stuff? Or is it on every country’s national website in a different language in a different location? Is is there any central repository of these rules?

Christina Kiefer
No, not yet at least. Maybe there will be some private websites where you can find all the different implementation information. But until until now, when you are a company, either you within the EU or also the EU, when you are providing your services into the EU market, you have to fulfill with the NIS2 directive. And this means you have to fulfill with the national laws in each EU member states.

And this is yeah a big challenge for all international companies because they have to check each national law of each EU member states and they have to check if they fall under the scope of application. And what is also very important that the different national laws have different obligations. So the NIS2 directive has a minimum standard which all national legislators have to fulfill But on top of this, some EU member states have imposed more obligations or ah portal for registration or new reporting obligations.

So you have to check for each EU member state. But here we can also help because we see in our daily work that this is a very, very hard yeah challenge for companies to check all the laws and also understand all the national laws. We offer a NIS2 implementation guide where you can get regularly updates on and an overview of how the different EU member states have transposed NIS2.

And yes, in addition to this, we also have a NIS2 reporting and obligation guide, especially looking at the reporting and registration obligations to see where you have to register in each EU member state, but guide So you can book our full guide, but we also post yeah some overviews on LinkedIn and our newsletter.

Andrew Ginter
So thanks for that. You touched on the yeah the the goal of NIS2 was to increase consistency among the nation states of Europe in terms of their cyber regulations, and in my understanding, to increase the strength of those regulations across the board. How’s that coming? Are the regulations that are coming out stronger than we saw with NIS2? And are they consistent?

Christina Kiefer
Well, it’s… correct that the idea behind NIS2 or the NIS2 directive was to create ah stronger and also more consistent cybersecurity framework across the whole EU and the EU market. And also the NIS2 directive should also cover a broad set of sectors for regulated companies. So there should be some consistency within the EU. but it’s an EU directive and not an EU regulation. So this means the NIS2 directive sets only a minimum standard to all EU member states that they can then transpose into national law. And that’s why EU member states are allowed also to go beyond if they want to. And some of the EU member states have already done this. this So what we’re seeing right now, looking at the national laws which have already been enacted and also looking at the draft of some national laws, we see quite a mixed picture. So we don’t see a whole consistency what a lot of companies were hoping for. We see more like a mixed picture with some countries like Belgium again, for example.

They have pretty much stuck to the core of the directive and haven’t added much on top. So there you are also for you as a company, you can ensure when you’re looking at this two directive or when you have already looked at this two directive, you can be yeah positive that you also fulfill the requirements of the law of Belgium. But on the other hand, looking for example, on Italy, they have expanded the the scope of application. So Italy has, for example, included a cultural sector as an additional regulated area. So the sector of culture hasn’t been mentioned in NIS2 directive at all. But Italy ah had the idea, well, we can regulate also the cultural sector. So that’s why they have also sort in yeah included it into their national law.

And also in France, you can see that they have imposed more obligations and also have broadened the scope of application of their national law. because here they have also widened up the regulated sectors and here they have added educational institutions, for example. We have a minimum set of standards set out in the NIS2 directive, but across the EU, looking at the national laws, we have a lot of national differences. And that’s why it’s very hard for companies to comply with the NIS2 directive or with the national laws within the EU market.

Nathaniel Nelson
One of the more interesting things that Christina mentioned there, Andrew, was Italy treating its cultural sector as like critical infrastructure, which sounds a little bit, it sounds very Italian, frankly.

Andrew Ginter
Well, I don’t know. It’s not just the Italians. The original, you know, this was back in the, I don’t know, the the late noughts. One of the original directives that came out of the American administration was… a list of critical infrastructures. And at the time it included something like national monuments as a critical infrastructure sector. And the justification was, you know, any monument or, you know, cultural institution that was that was seen as essential to national identity, national cohesions,

And then it disappeared in the 2013 update of what were ah critical national infrastructure. So it’s no longer on CISA’s list of critical infrastructures, but it used to be. And, you know, in terms of Italy, oh I don’t, you know, I don’t have a lot of information about Italy, but again, you might imagine that national monuments and certain cultural institutions are vital to sort of national identity. Think the Roman Colosseum. Should that be regarded as critical infrastructure? It’s certainly critical to tourism, that’s for sure. So that’s that’s what little I know about it.

Andrew Ginter
And in my recollection of NIS2, one of the changes was increased incident disclosure rules. Now, i’ve I’ve argued or I’ve speculated. we We did a threat report at Waterfall. We actually saw numbers sort of plateau in terms of incidents. I wonder, I speculate whether increased incident disclosure rules are in fact reducing disclosures because lawyers see that disclosing too much information can result in lawsuits. For instance, SolarWinds was sued for incorrect disclosures. And so they they i’m I’m guessing that that they… they yeah conclude that minimum disclosure is least risk. And if they get partway into an incident and say, this is not material, we don’t need to disclose it we’re not going to disclose it, we actually see fewer disclosures.

Can you talk about what’s happening with the the disclosure rules? are they How consistent are they? Multinational businesses, how many different ways do they have to file? And are we seeing greater disclosure or in your estimation, fewer disclosures because of these rules?

Christina Kiefer
Yeah, that’s a really good question and honestly it’s something we get also asked all the time right now because once we hear again all over if we operate in several and several EU countries do I need to report a security incident in one you member states or via one portal and then I’m fine or do I really have to report a security incident to each EU member states which is kind of affected with the with regard to the security incident.

And yeah, unfortunately, the answer right now is yes, you have to report your security incident to each EU member state or to each national authority of the EU member state, which you fall under the scope of the national law. Because the NIS2 directive does not really require one portal or one obligation registration and also a reporting portal for all EU member states. So it’s up to the national authorities and also up to the EU member states to regulate this field law. And you can see that many national authorities have already recognized this issue and they are also looking at ways to simplify the process of registration but also of reporting security incidents and there you can see some member states try to yeah at least include or to to set up a portal a national-wide portal where you can yeah report your security incident.

Some other national authorities go even further. They say they implement a yeah scheme or structure where you only have to report to them and then they will yeah transfer the report to the other relevant EU authorities. But again, this is each and in e in each EU member state national law, so then you also have to check again all the other national laws within the EU. Yes, but also the authorities of the EU member states have already, well, at least indicated that they are talking to each other. So maybe in the future we will get one portal to report everything. But as I said before, it’s not regulated in the NIS2 directive and is also not foreseen for now.

Yes, and to the other part of your question. You could think that when you’re obliged to report everything and each security incident that the reporting would decrease But you also have to look at a yeah at the at the risk of non-compliance and the risks are very high because the NIS2 directive is imposing high sanctions and also a lot of yeah authority measures, authority market measures. And that’s why in the daily consulting work, it’s better to say, please report an incident because also the national authorities communicate this to the companies. They say, please report something because then we can work together. So the focus of the national authorities, at least in Germany, we see right now is they want to cooperate together.

They want to ensure a cyber secure en environment and a cyber secure market. So the focus is to report something that they can yeah work on together and that’s why it would be better to report and I would say maybe we get also an increase of reporting.

Andrew Ginter
So I’m a little confused by your answer. the The rules that I’m a little bit familiar with are the American ah Securities and Exchange Commission rules. And those rules mandate that any material incident must be reported to the public, any incident that might cause a reasonable investor to either buy or sell or assign a value to shares in in a company.

Which means non-material incidents can be kept quiet. And the SEC disclosures are public. Everyone can see them because reasonable people need information to buy and sell shares. The NIS2 system, is it requiring all incidents to be reported? And are those reports public?

Christina Kiefer
That’s a good point. To your first part of your question, the NIS2 directive and also the reporting obligation is kind of the same as the regulation you mentioned before, because you have to report only severe security incidents. As a regulated company, you are obliged to check if there is a security incident in the first step and then the second step you have to check if there a severe security incident.

And only this security incident you are obliged to report to the national authorities. So that’s kind of the same structure or mechanism. And to the second part of your question, the report will not be published for everyone. So first of all, if you report it to national authorities, only the national authorities have the information. It can happen because we have in some Member States some laws where yeah people from the public can access or can get access to information, to public information. It can happen that some information will be publicly available. But the the first step is that you will only report it to the national authority and that the report will not be available for the public as such.

But next to the reporting obligation to the national authorities, you also have information obligations in the NIS2 directive. So it can happen that you are also obliged to inform the consumers of your services.

Andrew Ginter
So thanks for that. The other big news that I’m aware of in Europe is the CRA, which confuses me because I thought NIS2 was the big deal, yet there’s this other thing that sort of came at me out of the blue a year ago, and I’m going, what’s what’s going on? Can you introduce for us what is the CRA, and how’s it different from NIS2?

21:30.66
Christina Kiefer
Yeah, sure. So, as you mentioned before, the CRA is like the sister or brother and the second major piece. of the new European cybersecurity framework alongside the NIS2 Directive.

Christina Kiefer
It’s the Cyber Resilience Act, or for short CRA. And while the NIS2 Directive focuses on the cybersecurity requirements for businesses or entities in critical sectors, the CRA takes a different angle and the CRA introduces EU-wide cybersecurity rules for products.

So NIS2 is focusing on cybersecurity of entities and the CRA is focusing on cybersecurity for products with digital elements. And also the other difference is also that NIS2 directive, we have an EU directive, so it needs to be transposed into national law by each EU member state and the Cyber Resilience Act is an EU regulation So when the Resilience Act comes into force, it will apply directly in each EU member state.

Andrew Ginter
Okay, so that’s how the CRA fits into NIS2. What is the CRA? What are what are these rules? is it Can you give us a high-level summary?

Christina Kiefer
Yeah, sure. So the CRA is the EU-wide first horizontal regulation, which imposes cybersecurity rules for products with digital elements. So regulated are products with digital elements and this definition is very broad. It covers software and also hardware and also software and hardware components if they are yeah brought to the EU market separately. And products with digital elements are kind of like connected devices and as I said, software and hardware that can potentially pose a security risk. Also, what is very important, the CRA imposes obligations not only to manufacturers, but also to importers, distributors, and also to those companies which are not resident in the EU, because the main point for the geographical scope of application is that you place a product in the EU market, whether you are placed in the EU or not.

Christina Kiefer
So this means also that the Cyber Resilience Act, such as data and such as the General Data Protection Regulation, has a global impact impact for anyone selling tech products in Europe.

Andrew Ginter
So let me jump in real quick here, and Nate. What Christina‘s described here, oh you the CRA, the scope applies to all digital products sold in Europe. To me, this the CRA is, in my estimation, and she’s going to explain more in ah in a few minutes, it’s probably the strictest cybersecurity regulation for products generally in the whole world. it It sounds to me like this might become just like GDPR. This was ah a European regulation that came through a few years ago. It had to do with marketing and the use of private information, in particular my email and sending it. Basically, so it was like an anti-spam act. It’s the strictest in the world. And everybody who has any kind of worldwide customer base, which is almost everybody in the digital world that that’s sending out marketing emails, is now following the GDPR pretty much worldwide because it’s just too hard to apply one law in one country and one law in the other. So what you do is you pick the strictest that you have to comply with worldwide, which is the gp GDPR, and you do that. worldwide instead of trying to figure out what’s what. It sounds to me like the CRA could very well turn into that kind of thing. It might be the thing that all manufacturers that embed a CPU in their product have to follow worldwide because it’s just too hard to to change what they do in one country versus another.

Andrew Ginter
Okay, so can you dig a little deeper? I mean, an automobile, you buy a a ah new automobile from the from the dealership. My understanding is that it has 250, 300, maybe 325 CPUs in it, all of them running software. It would seem to me that ah a new automobile is covered by the CRA. what What are the obligations of the manufacturer? What should customers like me expect in automobiles that that might be different because of the CRA?

Christina Kiefer
Thank you. First of all, looking at your example, automobiles are not covered by the CRA, because the CRA some exemptions. And the CRA says, we are not regulating digital products with the digital elements, which are already regular regulated by specific product safety laws. And here, looking at the automotive sector, we have for sure in the EU very strong and very specialized regulation for product safety of cars and so on. So just for your example, but looking at other products with the chill elements, for example, wearables or headphones, smartphones, for example, you can say that there are kind of five core obligations for manufacturers in the CRA. So the first obligation is compliance with Annex 1, which means you have to fulfill a list of cybersecurity requirements. And you don’t only have to fulfill those cybersecurity requirements, but you also have declare and show compliance with Annex 1 of the CRA. So it’s a conformity assessment you have to undergo.

Christina Kiefer
The other application, number two, is cyber risk assessment. If you are a manufacturer of a product with digital digital elements, you are obliged to assess cyber risks and not only during the development and the construction of your product and also not only during the placing of your product to the EU market, but throughout the whole product life circle. So if you have a product and you have it already placed on the market, you are obliged to undergo cyber risk assessments. Then looking at the third obligation, it’s free security updates.

Christina Kiefer
So manufacturers have to provide free security updates throughout the expected product life cycle. We have also mandatory incident reporting. So we have here also reporting and registration obligations, such as we already talked about looking at the NISS2 directive. And also like in each product safety law in the EU, we also have the obligation for technical documentation. So this is of those are the five core obligations, compliance, cyber risk assessment, free security update, reporting and documentation.

Andrew Ginter
And you mentioned distributors. What are distributors and importers obliged to do?

Christina Kiefer
yeah there We have some graduated obligations. So they they are not such strict obligations such for manufacturers, but importers and distributors are obliged to assess if the product, what they are importing and distributing to the EU market are compliant with the whole set of cybersecurity requirements of the CRA. So they have to check if the manufacturer and the product is compliant and if not, They have to inform and yeah cooperate with the manufacturer to ensure cybersecurity compliance. But also importers are also obliged to yeah impose their own measures to to fu fulfill with the CRA.

Andrew Ginter
Okay, and you said there were five obligations. You spun through them quickly. Some of them make sense on their own. Do a risk assessment, do it from time to time, see if the risks have changed. That kind of makes sense. The first one, though, comply with Annex 1. That’s like an appendix to the CRA. What’s in there? what What are the obligations?

Christina Kiefer
Yes, sure. Annex 1 is, yeah the you can also say, Appendix 1 to the CRA. and And there are you can see there is a list of certain cybersecurity requirements which manufacturers have to fulfill. And the list is divided into two different main areas. And one area is cybersecurity requirements. So it focuses on no known vulnerabilit vulnerabilities at the time of the market placement, secure default configurations, protection against unauthorized access, ensuring confidentiality, integrity and availability, and also secure deletion and export of user data. So kind of all of cyber security requirements such as them which I have mentioned. And the other area is vulnerability management. So manufacturers have to ensure that they have a structured vulnerability management process and they have to yeah install a software bill of materials.

They have to provide free security updates. They have to undergo cybersecurity testing and assessments. there needs to be a process to publish information on resolved vulnerabilities. And again, here we also need a clear reporting channel for known vulnerabilities.

Andrew Ginter
So it sounds like you said that a manufacturer is not allowed to ship a product with known vulnerabilities. Practically speaking, how does that work? I mean, a lot of manufacturers in the industrial space use Linux under the hood. Linux is a million lines of code of kernel. And, you know, the, these devices don’t necessarily do a full desktop style Linux, but they still have a lot of code that they’re pulling from an open source distribution. And in these millions of lines of code, From time to time, people discover vulnerabilities and they get announced. And so it’s it’s almost a random process. Do I have to suspend shipments the day that a vulnerability a Linux vulnerability comes to light until I can get the thing patched and then three days later ah start shipments again? Practically speaking, how does this zero known vulnerabilities requirement work?

Christina Kiefer
Basically, it is like, as you said, because the Cyber Resilience Act focuses on known ah no known vulnerabilities not only in your product but also in the whole supply chain. So the Cyber Resilience Act focuses not only on products with digital elements but also focusing on the cybersecurity of the whole supply chain. So this means looking at Annex 1 and the cybersecurity requirements Products with digital elements may only be placed on the EU market if they don’t contain any known exploitable vulnerabilities. So it’s not any vulnerability, but it’s any known exploitable vulnerability. That is a clear requirement under Annex 1. And also when you’re looking at making a product available on a market, that doesn’t just mean selling it.

Christina Kiefer
It includes any kind of commercial activity. And also what is also a very good question also in our daily work, looking at making a product available on the market. A lot of companies say, well, I have a ah batch of products. So, and if I have placed this batch of products on the EU market, I have already placed product on the market. So I can also place the other products of this batch also in the future. But it is not correct, because looking at EU product safety law, the regulation is focusing on each product. So looking at these requirements, you can say, first of all you really have to check your own product, your own components, but also the products and the components you are using from the supply chain. And you have to check if there are any known exp exploitable vulnerabilities. So you have to yeah impose a process to check the known vulnerabilities and also to ah impose mechanisms to fix those vulnerabilities.

Christina Kiefer
And if you have products already on the market, you don’t have to recall them because first of all, it’s okay if you have a vulnerability management which is working and where you can fix those vulnerabilities. And when you have products already in the shipment process, there it’s up to each company to assess if they have to yeah recall products in the and the shipment process or if they say, okay, we leave it in the shipment process because we know we can fix the vulnerability within two or three days. So in the end, it’s kind of a risk-based approach and each company has to assess what measurements are yeah applicable and also necessary.

Andrew Ginter
So that that makes a little more sense. I mean, the Linux kernel and sort of core functions in my, but I don’t have the numbers, but I’m guessing that you’re going to see a vulnerability every week or two in that large set of software. And if that’s part of a router that you’re shipping or part of a firewall that you’re shipping or part of any kind of product that you’re shipping, Does it make sense that, you know, you discover the exploitable vulnerability on Thursday and you have to suspend shipment until, ah you know, three weeks out when you have incorporated the vulnerability in your build and you’ve repeated all of your product testing, which can be extensive.

Andrew Ginter
And by the time you’re ready to ship that fix, two other problems have been developed and now you have to, you can’t ship until, you know, it, It sounds like it’s not quite that strict. it’s not that That scenario sounds like nonsense to me. It just it would never work. You’re saying that there is some flexibility to do reasonable things to keep bringing product to market as long as you’re managing the vulnerabilities over time. Is is that fair?

Christina Kiefer
Yes, yes, that’s right. Because in the CRA we have a risk-based approach and also you have to… No, the basis for each measure you have to to impose under the CRA is your cyber risk assessment. So you have to check what kind of product am I using or am i manufacturing? Which kind of product am I right now placing on the EU market? What are the cybersecurity risks right now? And also what what are the specific cybersecurity risks of this known vulnerability?

Christina Kiefer
And then you have to check, have i do I have a process? Do I have a process imposing appropriate measures to to fix those vulnerabilities? And if I have appropriate measures, to fix the vulnerabilities in a timely manner, then it’s not the know you are not obliged to recall the product itself. But at the end, looking at a risk-based approach, it’s up to the decision of each company.

Andrew Ginter
So this is a lot of a lot of change in in for a lot of product vendors. Can I ask you, how’s it going? Is it working? Are are the vendors confused? can you Do you have any sort of insight in into how it’s going?

Christina Kiefer
Yeah, sure. So what we’re seeing right now, a lot of companies, both manufacturers, but also suppliers, are getting ahead of the curve when it comes to the Cyber Resilience Act, because they see that there is a change and there there will be new strict obligations, not only on manufacturers, but also in the whole supply chain. So suppliers, distributors, importers are also coming to us and asking if they are under the scope of the CRA. So this is the first point. If you’re a distributor or an importer, you already have to check if you and your company itself falls under the scope of the CIA. And if it is like this, then you are already obliged to ensure all the obligations of the CRA. But it can also happen that suppliers are under the scope of the CRA in an indirect manner.

Because ensuring all those new cybersecurity requirements from a manufacturer point of view, you have to ensure it within the whole supply chain. And the main instrument to ensure this was already in a future in a and the past and will also be in the future is contract management. So you have to impose or transpose all those new obligations to the suppliers via contract management. And there we see different reactions, but there’s definitely a growing awareness that cybersecurity needs to be addressed contractually, especially in relation to the CRA obligations. And yeah looking at contract negotiations, of course, we have some negotiations with the suppliers And one of the main points which is negotiated is the regulation of enforcement.

Christina Kiefer
Because when you have contractual management looking at cybersecurity requirements, you can not only yeah transpose those obligations to the suppliers, but you also have rules on enforcing those new contractual obligations. For example, contractual penalties. And there we see that contractual penalties often sparks some debate during negotiations. But to sum up, in practice, we’ve always been able to find a balanced solution that works for all parties involved.

Nathaniel Nelson
I suppose I could think about any number of potentially trivial electronics products, Andrew, but let’s say that I or my neighbor has ah a smart fridge, a fridge with a computer it. We generally assume that those devices don’t even really have security in mind at all. And a security update is like so far from the universe of how anyone would interact. with such a device and now we’re saying that that kind of thing is going to be regulated in these ways.

Andrew Ginter
I think the short answer is yes. You might ask, what good does this regulation do for a fridge? And, you know, I think about this sometimes. I think the answer is it depends. If, you know, a lot of the larger home appliances nowadays have touchscreens. There’s a CPU inside. There’s software inside. These are cyber devices. You might ask, well, when was the last time I updated the firmware in my fridge? How many times am I going to update the firmware in my fridge? Those are good questions. Most people never think about something like that. But the law might… you know, very reasonably apply to the fridge if the fridge is connected to the Internet so that I can see, for example, how much power my fridge is using on my cell phone app.

Isn’t that clever? But now I’ve connected the fridge to the Internet. We all know what what happened to, what was it, the Mirai botnet took over hundreds of thousands of Internet of Things devices and and used them as attack tools for denial of service attacks. If you’ve got an internet connected fridge, you risk that if you haven’t updated the software. Worse, if someone gets into your fridge, takes over the CPU, you could change the set point on the temperature and cause all your food to spoil. This is a safety risk.

Andrew Ginter
Again, how many consumers are going to update the software in their fridge? Realistically, I don’t think… You the majority of consumers will, even if there is a safety threat. To me, you know, the risk, this this is part of the risk assessment. If there’s a safety threat because of these vulnerabilities, you might well need to… I don’t know, auto-update the firmware. That might be part of your risk assessment so that the consumer doesn’t have to do it. Or better yet, design the fridge so that safety threats because of a compromised CPU are impossible, physically impossible. Make the the temperature setting manual or something. But this is this is a bigger problem than I think one regulation, the the the question of safety critical devices connected to the cloud.

Nathaniel Nelson
Yeah, admittedly, the the notion of a smart refrigerator safety threat isn’t totally resonating with me. And then we haven’t even discussed the matter of like, OK, let’s say that my refrigerator gets automatic updates or I just have to click a button in an app when it notifies me to do so to update my firmware. At some point, you know, fridges sit in houses for long periods of time. I can’t recall the last time that my fridge has been replaced. In that time, any manufacturer could go out of business. And then how do you get those updates, right?

Andrew Ginter
Exactly. So, you know, to me, but this is outside the scope of the CRA, but, you know, to answer your question, to me, the solution you know, two or threefold, we we need to design safety-critical consumer appliances in such a way that the unsafe conditions cannot be brought about by a cyber attack. I mean, we talk about, you know, fixing known vulnerabilities. That’s only one kind of vulnerability. What about zero days? There is, there’s there’s logically no way that someone can, you solve all zero days. It it It’s a nonsensical proposition. So there’s always going to be zero days. What if one is exploited and, you know, a million fridges set to a ah set point that that’s unsafe?

Andrew Ginter
To me, we’ve got to design the fridges differently, but that’s that’s sort of a different conversation. In fact, that’s the topic of my next book, but which is why I care so much about it. but but it’s These are important questions, and I think the CRA is a ah step in the direction of answering them, but I don’t know that it has all the answers.

Andrew Ginter
So work with me. you know, what, what you described there makes sense for, you know, manufacturers like, uh, IBM who can, you know, produce high volumes of, or, you know, Sony or the, the big fish. But, you know, if I’m a small manufacturer, I produce a thousand devices a year. I buy components for these devices. I buy software for these devices from big names like Sony and Microsoft and Oracle. And, you know, I go to Oracle and say, you must meet my contract requirements or I won’t buy my thousand products from you at a cost of $89 a product. Oracle is going to say, take a flying leap. We’re not signing your contract. Is this realistic?

Christina Kiefer
Yes, and we see this also in practice because we are not only consulting the big manufacturers but are also the smaller companies in the supply chain. And there you can have different approaches because when you are buying products from the big companies, First of all, you have to know that they are or they might be obliged also under the CRA. So they are fulfilling all those new cybersecurity requirements. And you also have to take it though there you also have to check their contracts because there you can see already they have a lot of new regulations looking at cybersecurity, either if it’s implemented into the the general contractual documents or implemented into one cybersecurity appendix.

So you see all the companies are looking at the Cyber Resilience Act and then they are taking measures and also looking at their contract management. So if you are lucky enough, you can see, okay, they have a contract which is already regulating all the obligations under the CIA. And then if it’s not like this, We take the approach that we establish a cybersecurity appendix. So when you’re already a contractual relationship with the big players, you don’t have to negotiate the whole contract from the beginning. You can only show them your appendix and then on on basis of this appendix, you can discuss the cybersecurity requirements. So this is kind of a approach which has helped also smaller companies in the market.

Andrew Ginter
So you gave the example of of headphones and smartphones. For the record, does this apply to industrial products as well? I mean, our our listeners care about programmable logic controllers and steam turbines that have embedded computer components, or is it strictly a ah consumer goods rule? Now, and this is a very important point to highlight, the Cyber Resilience Act explicitly applies not only to consumer products but also to products in the B2B sector. so this means that all software and all hardware products along with any related remote data processing solutions fall under the scope of the CRA, either in B2C or also in B2B relationships.

Andrew Ginter
Well, Christina, thank you so much for joining us. Before we let you go, can I ask you, can you sum up for our listeners? What are the the key messages to take away to understand about what’s happening with cyber regulations, both NISU and CRA in Europe, and and what we should be doing about them as both consumers and manufacturers?

Christina Kiefer
Yeah, sure, of course. So let me give you a quick recap. So first of all, you see the EU legislature is tightening the cybersecurity requirements significantly with both the NIS2 directive and also the Cyber Resilience Act. And the new requirements affect any company that offers products or services to the EU market, no matter where they are based. So it is it has a very broad scope of application. Looking at the NIS2 directive, it’s very important to know that the NIS2 directive is already enforced, but it has to be transposed into national law, which has not been fulfilled by all EU member states, and that the national implementation across the EU is still quite varied.

Looking at the Cyber Resilience Act, the CRA brings new security obligations to products with digital elements, so for all software, for all hardware products. And it also is focusing not only on cybersecurity on products, but also in the whole supply chain. So both frameworks require companies to take proactive steps right now, looking at risk assessment, risk management, reporting, and also contract management, particularly when it comes to managing their supply chain. So looking at the short implementation deadlines ahead, both from the NIS2 Directive and also the CIA, it’s very important for companies to act now. And the first step we consult to do is to identify the relevant laws, because we have a lot of new regulations looking at digital products and digital services. So, yeah first of all, check the relevant laws and the relevant obligations which are applicable to your business.

And here we offer a free NIS2 quick check and also a free CRA quick check where you can just click through the different questions to see if you are under the scope of NIS2 and CRA. And then after all, when you clarified that you are affected on the one or both of the new regulations, the company needs to review and adopt their cybersecurity processes, both technically and also organizationally. So it’s very crucial to continuously monitor and ensure compliance with the ongoing legal requirements, especially also looking at contract management and focusing on the supply chain. And yeah, there we can help national but also international companies with kind of a 360 degree approach to cybersecurity compliance because we enter ensure solutions with the range from product development and marketing to reporting and market measures. So, yeah, we we give companies ah practical and also actionable guidance in ah in an every step way.

So looking at the first step to to act and yeah to identify the relevant laws and obligations to your business, companies can yeah visit our free NIS2 QuickCheck and our free CRA QuickCheck, which is available under nist2-check.com and also And yeah, if you have any further question, you are free and invited to write to me via email via LinkedIn. Yeah, I’m happy to connect. And thank you very much for the invitation.

Nathaniel Nelson
Andrew, that just about concludes your interview with Christina Kiefer. And maybe for a last word today, we could just talk about what all of these rules mean practically for businesses out there because, you know, it’s one thing to mention this rule and that rule in a podcast, but sounds like kind of stuff we’re talking about here is going to mean a lot of work for a lot of people in the future.

Andrew Ginter
I agree completely. It sounds like a lot of new work and a lot of new risk, both for the critical infrastructure entities that are covered by NIST or by the local laws, especially for for businesses, the larger businesses that are active in multiple jurisdictions, and certainly for any manufacturer who wants to sell anything remotely CPU-like into the the the European market. It sounds like a lot of work, but I have some hope that it’s also, because it’s such a lot of work, it’s also a business opportunity. And we’re going to see entrepreneurs and service providers and even technology providers out there providing services and tools that will automate more and more of this stuff so that not every manufacturer and every critical infrastructure provider can. in the European Union or in the world selling to the European Union. Not every one of them has to invent all of this the the answers to these these new rules by themselves.

Nathaniel Nelson
Well, thank you to Christina for elucidating all of this for us. And Andrew, as always, thank you for speaking with me.

Andrew Ginter
It’s always a pleasure. Thank you, Nate.

Nathaniel Nelson
This has been the Industrial Security Podcast from Waterfall. Thanks to everyone out there listening.

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post NIS2 and the Cyber Resilience Act (CRA) – Episode 142 appeared first on Waterfall Security Solutions.

]]>
Network Duct Tape – Episode 141 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/network-duct-tape-episode-141/ Wed, 13 Aug 2025 16:31:00 +0000 https://waterfall-security.com/?p=35075 Hundreds of subsystems with the same IP addresses? Thousands of legacy devices with no modern encryption or other security? Constant, acquisitions of facilities "all over the place" network-wise and security-wise? What most of us need is "network duct tape". Tom Sego of Blastwave shows us how their "duct tape" works.

The post Network Duct Tape – Episode 141 appeared first on Waterfall Security Solutions.

]]>

Network Duct Tape – Episode 141

Hundreds of subsystems with the same IP addresses? Thousands of legacy devices with no modern encryption or other security? Constant, acquisitions of facilities "all over the place" network-wise and security-wise? What most of us need is "network duct tape". Tom Sego of Blastwave shows us how their "duct tape" works.

For more episodes, follow us on:

Share this podcast:

“We abstract the policy from the network infrastructure such that you can have a group of devices or a device itself that essentially associates with an IP address that’s an overlay address.” – Tom Sego

Transcript of Network Duct Tape | Episode 141

Please note: This transcript was auto-generated and then edited by a person. In the case of any inconsistencies, please refer to the recording as the source.

Nathaniel Nelson
Welcome listeners to the Industrial Security Podcast. My name is Nate Nelson. I’m here as usual with Andrew Ginter, the Vice President of Industrial Security at Waterfall Security Solutions.

He is going to introduce for all of us the subject and guest of our show today. So Andrew, how are you?

Andrew Ginter
I’m well, thank you, Nate. Our guest today is Tom Sego. He is the CEO and co-founder of BlastWave. And he’s going to be talking about distributed asset protection, which is a fancy name for a very common problem in the industrial space. We have – Stuff – devices, computers, assets, cyber assets all over the place, might be distant in pumping and substations might be local. The stuff was bought, on the cheap. It was the the lowest bidder.

It’s old. It’s ancient. And we have no budget to rip in place. So what do we do about cybersecurity? And this is something he’ll he’ll be walking us through.

Nathaniel Nelson
Then let’s get right into it.

Andrew Ginter
Hello, Tom, and thank you for joining us. Before we get started, can I ask you to say a few words of introduction? Tell us a bit about your background and about the good work that you’re doing at BlastWave.

Tom Sego
Sure, Andrew. Thanks for having me. So my background is I started my career as a chemical engineer at Caterpillar. I also spent eight years at Eli Lilly designing and building processing facilities to make medicine.

I was also a certified safety professional during that period and managed a 24-7 liquid incineration operation, which burned a 30,000 gallons of liquid waste per day.

So a shit ton. And then I went to Emerson, got did business development, corporate strategy there. Then I did product management at AltaVista. Then I went on to do sales support at Apple, where I was at Apple for almost 10 years.

And then that’s when I started my entrepreneurial career. I started a mobile telephony company, started a solar storage company, started a wine importing business, then played professional poker for a few years, and then eventually started this cybersecurity business called BlastWave.

I co-founded that in 2017. And our mission then is the same as it is today, which is to protect critical infrastructure from cyber threats.

And we wanted to kind of come at this with a very different approach than other cybersecurity companies in that We kind of started from first principles thinking about what are the three highest kind of classes of threat and categories of threats, and can we actually eliminate those?

The biggest category is probably no surprise to anybody here, but it’s phishing, credential theft, et cetera. I’m like, well, let’s just get rid of usernames and passwords altogether. And come up with a different model for for MFA that can actually apply to industrial settings.

So we did that. The second category of threats was really CVEs and and vulnerabilities. And could we make those unexploitable? And we came up with a concept called network cloaking, which I’m sure we’ll discuss, which kind of addresses that issue. And then the last one is human error, which is impossible to get rid of.

But if you can make human beings make fewer decisions, they can also make fewer mistakes. So we also incorporated that into a lot of our UI and UX.

Andrew Ginter
That’s, wow, that’s that’s a history like none other I’ve ever heard, Tom. Makes like I’m thinking it makes my own, what I thought, storied background look completely mundane.

You’ve been in lots of different industries. Now, I understand that a lot of what BlastWave does right now is upstream and midstream. And we’ve never had someone on the show explaining how that works. I mean, I think we’ve had one person on talking about an offshore platform at some point.

But when you’re looking at the industry, can we start with the industry? what’s What’s the physical process? Physically, what’s this stuff look like? What’s it do? How does it work?

Tom Sego
Yeah, it’s really interesting because I can talk about the physical process and it’s also evolved quite a bit in the last 20 years. So first of all, just stepping back, looking at the industry, the overall oil and gas market globally generates $2 trillion dollars of revenue per year, and it generates $1 trillion in profit.

So there’s a lot of money in this business. And that also means that there’s a lot of gallons of oil and lot of cubic feet of gas that are being extracted and transmitted and sent everywhere around the world.

And the other thing that’s interesting is that in spite of how old this industry is, there’s between 15 and 20 thousand new oil wells created per year and in fact, half of those were done in the Permian Basin. So about 8,000 wells were created last year in the Permian Basin.

Tom Sego
I don’t think people realize the magnitude of which the oil and gas companies are continuing to create wells and extract oil. The other thing that’s interesting about it is 20 years ago, we had a traditional vertical drilling approach to oil and gas.

And in that to last two decades, we’ve noticed that there are capabilities to actually now drill horizontally. And what’s pretty interesting is you can actually, as you start drilling a well today, you create the initial bore, which is, usually a foot or more in diameter.

And then you can send these kind of devices and drill bits down a relatively sloping curve that over the course of maybe 100 or 200 meters, you’ve now done 90 degree angle.

And then you can start drilling horizontally, which allows you to have higher probabilities of not hitting a dry well. It gives you more capabilities for lower cost extraction.

And so it’s been a great boon for the industry. Hydraulic fracturing, which is another technique that’s been exploited to to get much higher yields out of these wells, also contributed to the the recent boom in oil and gas.

So There are many, many things that have to be considered when you start doing this process. You’ve got to go through site selection, permitting. You’ve got to do all this site prep. And one thing people may not realize is site prep means building roads.

You have to build an entire infrastructure to get to and from these wells. And then once you start building. Actually drilling the well, it’s much like a CNC machine if you’ve been in a factory like Caterpillar or something where there’s a fluid, heat transfer fluid that allows you to cut the metal.

In this case, they use a mud that both stabilizes the wellbore and it also helps you manage pressure. And that that mud flows down through the the drill pipe and then it comes out around in kind of an annulus, almost like a donut that comes back up the outside of that drill pipe to be then cleaned, having the the rock kind of cuttings removed from it using a screening and operation.

And then you kind of reuse the mud and so forth. So there’s a lot to it. And And increasingly, much of this is being automated.

And you’re having connectivity that is absolutely essential to be your eyes and ears in these wells. Because once you start producing oil and gas, these things are hours and hours away from each other.

They’re very remote, very rural areas. And so that connectivity is absolutely critical. And you may have, we have one customer who has 700 sites that they’re trying to manage.

And so they have to have the ability to do this in an automated fashion, which requires not just connectivity, but secure connectivity.

Andrew Ginter
Cool. I mean, it’s a piece of the of the the industry I’d never dug into. So thank you for that. Can I ask you, you’ve said in the modern world,

you know it increasingly everything is automated. I mean, that makes perfect sense. The The example I often use is you buy an automobile, it’s got 300 CPUs in it. It Everything, every every device, but every non-trivial device you you you buy nowadays has a CPU in it.

Can you talk about the automation in these these drilling systems, in these these upstream systems? what does, what’s that automation look like? Is it like built into the device like an automobile? Is it a programmable logic controller? I mean, I’m familiar with, power plants vaguely. I mean, bluntly, I don’t get out much. I’m i’m a software guy more than a hardware guy, but but I’ve had a few tours. I know what a PLC looks like. If if i If I visited one of these well sites, would I recognize the automation? What’s it look like?

Tom Sego
Yeah, you would definitely recognize the automation. So what you see is your classic kind of SCADA tech stack, if you will. So you’ll have remote terminal units. You’re going to have PLCs.

You’re going to have these things mounted on a DIN rail in a cabinet. And there can be various size cabinets at some well locations.

You’re going to have just a few number of devices. And then at some other well sites, again, I go back to the horizontal drilling, you’re going to have a much bigger operation there. You’re also going to have those well sites connected to what are called tank batteries.

so that you can essentially manage the flow of oil and gas into these storage facilities. So there’s there’s a lot of automation that’s necessary using kind of PID control loops to maintain equilibrium within these systems.

And there can also be Oftentimes, challenges that happen, shocks to the system, where let’s say in the case of oil and gas, the price starts dropping.

But when the price starts dropping, the motivation of the business unit is not to just keep cranking production at maximum capacity. And so you actually want to have dynamically, you want to manage your your operation dynamically based on economic conditions that can change over time.

And I’ll tell you something else, Andrew, about what’s happening today. There’s a lot more uncertainty in the business world today than there was four months ago. And I think that is going to affect oil and gas.

It’s going to affect the price of oil and gas. It’s going to affect the supply of oil oil and gas. It’s going to affect the transmission across borders. So these kinds of things can affect the the automation.

I’ll call it like Uber automation. Okay. Not just between the actual plant operations and facilities, but also between different entities in the upstream, downstream and midstream ecosystem.

So there’s a lot of very interesting factors that affect that. And I’ll tell you one other thing that’s kind of interesting. That’s how everybody’s talking about ai and there are some of the larger oil and gas companies that are trying to figure out how to apply AI to optimize their operation.

And everybody knows that there’s there’s automation that’s used to help identify ways to to to deliver predictive maintenance to rotating machines.

But there’s also uses of AI in oil and gas to to prevent things like spills. And one of the big challenges is it’s easy. If you go talk to someone at BP or Shell or Chevron and you say, can I get data to the cloud? They’re going to go, well, heck yeah.

There’s all kinds of great things that can allow you to get data out of your process. And in fact, I think you’re associated with a company that does a really good job of doing that kind of one-way transmission of data.

And the other thing is, but once you have that data, and you’re using it to build AI models, then how do you get, deliver those set points and control variables back to the process?

It scares the crap out of these people. The idea of connecting their control network to a much less secure cloud network or corporate network.

Because as we all know, security is a continuum. It’s not Boolean secure insecure. So I think there’s a lot of interesting things that are happening with that. And I think just to to kind of close the story on that, one company, for example, is pulling that data, they’re analyzing it actually in AWS, and then they are taking some of those control variables and they’re using a human in the loop process so that they’ll say, this is the recommended set point for this this process.

And then the human in the loop then implements that through their control HMI. So there’s a lot of very interesting traditional ways in which automation is applied to oil and gas.

But there’s also some very interesting evolving mechanisms that involve machine learning.

Andrew Ginter
So, Nate, let me jump in and and give sort of a bit of context here. Yeah, AI and cloud-based systems, in my opinion, these are the future of industrial automation in pretty much… Everything.

The question is not if, the question is when, because different kinds of cloud systems are going to be used in different kinds of industries at different times, with different intensities. So, I care enormously about this topic because I am writing my fourth book. The the working subtitle of the book, possibly the title of the book is CIE for a Safety Critical Cloud.

You know, when you have cloud systems controlling, you potentially dangerous physical processes. How do you do that? There are designs that work. I… I’m keen to to to listen to the rest of the episode here. I’m keen to, but when I had Tom on, I was keen to learn from him. When I write these books, I try not to make up solutions myself.

I tend to get them wrong when I do that. I try to learn from experts like Tom and, gather up the best knowledge in the industry and try and trying package it up in a digestible format.

So, yeah, that the cloud is the future and I’m, yeah when When we recorded this, I was keen to to learn from Tom about what the future looks like.

Nathaniel Nelson
And I know we’re about to get right back into the interview. And what I’m about to say actually kind of has nothing to do with what you just said. But before we go, a few times now, it feels like you guys have mentioned the terms upstream, downstream, midstream. And I just want to make sure I’m clear on this before we continue.

Andrew Ginter
Sure. This is This is standard oil and gas terminology. People say, oh, oil and gas, as if it were one industry. It’s not. Really, there’s three industries involved, and each of these these sort of sub-industries have a lot of different kinds of facilities. So the stream is generally considered to be the pipeline.

So we’re talking upstream is producing stuff to feed into midstream, the pipeline. And downstream is taking stuff out of the pipeline to for for refining and such. So, sort of next level of detail, what’s involved in upstream? Exploration is considered part of upstream.

Initial drilling is part of upstream. Offshore platforms are part of upstream. The, onshore pump jacks are part of upstream.

The whole infrastructure, building roads is part of the upstream process. Midstream is pipelines and tank farms. And, in in the natural gas space, you need to do sort of an initial separation and, discard waste from the the product. You might even need this in liquids to take if you can do an initial filter and take water out of the oil and pump it back down, the dirty water back down into the well, sort of waste, or carbon dioxide out of the natural gas, there’s initial processing facilities that are sort of pre-sending stuff into the pipeline. There’s tank farms where the pipelines store stuff sort of intermediate. There’s liquid natural gas ports. There’s oil oil ports. There’s oil tankers. This is all part of midstream, the process of moving stuff and you’re from from place to place and to a degree storing it while you’re moving it.

And then downstream is sort of everything you do after it comes out of the pipeline. So there’s refining, turning it into diesel fuel and and jet fuel. There’s the the the finished processing on on natural gas, taking out all of the the natural gas liquids, making it basically pure methane with not much else.

There’s even stuff like trucking. Gasoline from the pipeline to the gas stations is considered part of downstream.  Midstream kind of rears its head again because, you you might have the concept of a gasoline pipeline. So you’ve got the oil pipeline bringing the crude oil to the refinery. Then you’ve got the, you sort of hit midstream again, taking the finished product, gasoline, and sending it to consumers. Then you’ve got the trucks, you’ve got the gas stations.

Each of these sort of upstream, midstream, and downstream sub-industries has sort of many components. I I’ve lost it now, but I saw a list once of, here’s all the different kinds of things that can be in midstream.

And it was like, I counted, it was 27 kinds of things. So it’s a complicated industry, but very loosely, upstream produces, midstream transports, and downstream consumes, in a sense, refines and produces the goods that we actually consume.

Andrew Ginter
So that’s interesting. I mean, human in the loop, I’ve heard that described as open loop, in power plants, which I’m more familiar with. You you monitor the turbines.

13:42.13
Andrew Ginter
The AI in the cloud comes back and sends you a text message and says, you should really service, the turbine in generating unit number three sometime in the next four weeks. And it goes into my eyes, goes into my brain. I go and double check with my fingers. I type on things. I say, i think they’re right.

And I schedule the service. That’s open loop. And yeah, it it gets scary when you start doing closed loop.

Yeah. Yeah. And And I would say that one of the key things, if you look at some analogous systems where they have actually gone from open loop, human in loop, if you will, to closed loop, you can you I’ll give two examples. One would be autopilot on planes and another would be self-driving cars.

And in both of those cases, you don’t just switch from open loop to closed loop. No, you do an extensive amount of testing and validation.

And you also, in many cases, build redundant systems that allow an an additional level of supervisory control on top of your normal process control loops.

And so like an example that I had heard about was a company that was looking at having, tank level measurements and looking at an AI model that would actually analyze the input feeds to that tank model. So, and and it would pull data from third parties that would look at the truck routes for the tankers that were pulling oil from that tank.

And so you could actually synthesize that data. Now you would have to put in place a lot of, I’ll call it ancillary systems and ancillary testing to make that safe enough to be like an autopilot on a car.

Because theoretically now with all that supporting testing, autopilot on a car is is supposed to be safer than humans.

And with people on their phones, like I see them these days, I think that’s become an increasingly low bar.

Andrew Ginter
Fascinating stuff. The The future of automation, I’m convinced. But if we could come back to the to the mundane, you talked about phishing, you talked about CVEs, exploiting vulnerabilities.

We’re talking about protecting these assets in the the the upstream and midstream oil and gas. Can you Can you bring us back to cybersecurity? How does how does this big picture fit with with what you folks do and and what you’re focused on cybersecurity-wise?

Tom Sego
Absolutely. So one of the things that’s interesting is, I love talking to customers and I try to spend at least 50% of my time and actually listening more than talking to customers and understanding what their challenges are and how we can solve those.

And in the case of oil and gas, there were three customers that came to us and told us the identical story and they became our largest customers.

And this the story they were telling us was that they had these highly distributed assets all over these these very wide geographic areas And they had spotty cellular and they had backup satellite to enable that connectivity that they need. They need the eyes and the ears in the field because it would be cost prohibitive for them to get in a truck and and drive out there to monitor that every few hours.

So the challenge they brought to us was the security team didn’t like the operations team having this insecure connectivity to these remote areas.

And so the security team said, you need to do something about that. And that’s where BlastWave came in. And we said, we can actually use our software-defined networking solution to cloak those assets so they’re undiscoverable to adversaries.

but also segment them so that if there were malware that were to get introduced in one area, it would not spread to others. And then finally, you would have the ability to get secure remote access.

And one of the coolest parts about this is this is not a bump in the wire kind of solution. This is a solution that allows routing and switching between groups of devices and users.

So it cuts across firewalls as if they don’t exist. It doesn’t route traffic based on source and destination. It routes it based on identity.

And this is something I think is very unique to us. And it’s something that I think customers absolutely love. And this has enabled us to address a benefit that we hadn’t even thought about, which was when oil and gas companies acquire other oil and gas companies that one of the first things they face are the need to maybe re-IP this architecture.

Because oftentimes the IP space, there’s overlapping addresses. And the that can be problematic. It can take a lot of time.

It can take a lot of money. And that’s another solution that we’ve been able to deliver calm almost by accident. We had one company, an oil and gas company, that acquired a $30 billion dollars acquisition target.

That’s a big company that you’re acquiring. And they were able to protect that with Blast Shield in three weeks of acquiring them. And they didn’t have to re-IP anything.

Again, that’s just because of the way we do this network overlay. So there’s a lot of cool things that that that use cases that we’ve discovered through the process of listening and talking to customers.

Andrew Ginter
Cool. So, so, you’ve said the the phrase SD-WAN, software defined wide area network. I have never figured out what is an SD-WAN. I mean, I’ve worked with firewalls for 20 years.

I did a lot of different kinds of networking, not not hugely. I mean, and I never worked for a telco, but but can you work with me? What is an SD-WAN? What is your SD-WAN? How does one of these things actually work? What does it do?

Tom Sego
Yeah. Well, first of all, I said SDN, not SD-WAN. So I said software-defined networking, which is a principle, not SD-WAN, which is an architecture.

What I guess the best way for me to think about this, and keep in mind, I’m a chemical engineer, not a software engineer. So I That means i’ll yeah if it takes me it may take me longer to understand these concepts, but when I finally do, I can probably explain them to people.

So the the the way I’ve learned this is that we essentially establish, we abstract the policy from the network infrastructure so that such that you can have a group of devices or a device itself that essentially associates with an IP address that’s an overlay address, much like you get network address translation.

All right, so you have a an original IP address, you have and a translated IP address, and the software-defined network then uses the overlay address to both communicate with each other, to establish the most efficient route,

because performance is very important in OT environments, unlike IT environments. And this allows us to optimize the path for any given packet, which is also very cool. So that’s one of the elements that I think is important in software-defined networking.

um The other thing is, is that it creates this illusion that it is a point-to-point between two different devices or two different groups.

And so that’s part of the abstraction. So if you don’t have to like set the path, which is what firewalls do, path, looking at the routing, how you go from this firewall to that firewall, from this port to that port, when you just abstract that to, I wanna go from this centrifuge to that control room,

It doesn’t matter if the infrastructure changes. And this is a very powerful yeah benefit of software-defined networking. Because if you’re just looking at the device you want to protect and the user who wants to connect to that protected device, as the environment evolves and it absolutely will, you don’t get put in the penalty box like you would in a firewall situation where you could get firewall rule conflict.

And if one thing to think about, Andrew, is when you think about the breaches that occur, about 100 percent of those breaches already have firewalls.

And so that means that the firewall didn’t work properly, which is usually a result of a firewall rule problem or the the environment has evolved in such a way that it’s no longer protected. There’s a hole.

And of course, we all know that adversaries just need to be right once. Whereas us defenders, we’ve got to be right all the time, which is very tough unless you’re my wife.

Andrew Ginter
There you go.

Andrew Ginter
so So Nate, let me jump in here. I’ve, the as I told Tom, I’ve wondered about this space of software-defined networking, wide area networking for some time, and i’m I’m beginning to wrap my head around it.

um he gave the example of, you you might imagine that we’ve got oh the internet, local area networks, wide area networks were designed so that devices have internet protocol addresses and they talk to each other and, routers move messages from one network to another. So they get from the source to the destination.

Why is any of this complicated? Why do we need any more than that? One example that that Tom gave was acquisitions. If company A, i mean, there’s there’s internet addresses, the 10-dot series, two to the 24th addresses are private addresses.

Private businesses can assign them to their, ad written to to assets on their private networks and never show those those ad addresses to the public, to the the public internet. That’s fine.

There’s another set, 192.168 is a 16-bit address range that everyone uses. So you might say, so so what? Company A uses, let’s say 10.0.1 through 10.0.20.

They’ve got a lot of assets. They use up a bunch of the address space. And then they buy company B that’s used the same addresses because they’re private addresses. You don’t have to register that you’re using them in public.

And now all of the equipment has the same IP addresses. For For each IP address, there’s two pieces of equipment in the network. How do you route messages from from these subnetworks, from these assets to each other?

um This is the problem of renumbering when you acquire a business. Often you have to renumber it’s it’s a pain in the butt on on IT t networks.

It can shut you down until you’re done and tested the renumbering on OT networks and nobody wants to shut down. So you if if there’s a piece of technology, i mean, the the the textbook technology is network address translation, part of most firewalls.

It lets you hide some private addresses and assign a different address to sort of that set of of private addresses. You’ve got to set up a whole bunch of firewall rules You can do that sort of manually painfully, but it gets worse than that.

I mean, I was talking to Tom after the recording. He gave me an example that I didn’t capture on on the recording, but he said, Andrew, they’re they’re working with an airport and the airport’s building a new wing.

I mean, this is common. Airports expand. And in every, let’s say there’s 27 gates in the new wing. Every gate has got one of those machines, those those ramps the that sort of snuggle up to the aircraft and the door opens and people come out and step onto this device that has, I forget what the name of it is, moved up to the aircraft and then they they walk into the into the airport building.

Every one of these devices has automation, has computers.

Every one of these devices, when you buy it from the manufacturer, the manufacturer assigns the same private addresses to every one of their products. So now you’ve got 27 of these ramps in the new wing, and every batch of 20 computers or devices that are built into the ramp have the same IP addresses.

How do you route this stuff? Again, you can put firewalls in place. You can do So now you need a firewall in every ramp. You need you need technology. And it gets it gets more complicated than that.

Andrew Ginter
For example, many years ago, I worked with a bunch of pipelines. I remember one pipeline, thousand kilometers long, pumping stations, compressor stations, all the way down the pipeline. Communication was important.

You have to communicate with these these stations or you have to shut down the pipeline. It’s illegal to operate a pipeline in in that jurisdiction unless there’s human supervision.

And so you had, there there was a fiber laid along the right of way for the pipeline. And from time to time, some fool would run a backhold through it.

So you’d need backup communications. I kid you not, this pipeline had something like seven layers of backup communication. There was satellites, there was DSL modems to the local internet service provider.

There was cable modems when there were a local internet service provider. There was… I don’t think I think this was before the era of of cell phones.

there were There were analog modems. We’re talking 56 kilobit, 100 kilobit per second modems that you can route in an emergency internet protocol down very slowly.

And they had built their own by hand. They had rolled their own, what today I think would be called a software-defined wide area network, where the task of that component was to say, I need to send an internet protocol message from the SCADA system to device 500 kilometers away

what infrastructure is up, what infrastructure is dead. If a piece of the infrastructure, the communications but infrastructure has failed, then activate another piece of the, one of the backups and change all the routes, change all the firewall rules so that

All of the messages that have to get from a to B can get from a to B. It was it was it seemed to me ridiculously complicated, but in hindsight, it it sounds like the same kind of need that modern software-defined wide-area networks address.

They address security needs as well as just the basics of getting the messages from one place to another when the underlying infrastructure changes from moment to moment.

Andrew Ginter
um So so that that kind of makes sense. You’re I think of wide area network, I think of routing. So there’s a routing element. You’ve got multiple paths. The system sort of auto-heals and figures out the best paths or presumably the cheapest paths.

But you’ve also talked about users and and security. How does How does this routing concept work with security?

How is security part of this? You’ve also mentioned firewalls. Can you can you can you dig a little deeper?

Tom Sego
Yeah. Well, I think I think we in a way are disrupting firewalls that are used for industrial, lots of industrial applications.

There are great uses of firewalls. They’re a fantastic tool, but it’s it’s kind of been used like the if you have a hammer, all the world looks like a nail. And, especially again, I’ll talk about these remote oil and gas locations where you may only have five or 10 devices.

And so the idea of having a firewall to segment that is ridiculous. The expense would be prohibitive. So that’s one of the other reasons why it’s so cool about the way we can scale dramatically from protecting five devices at a very remote well site to 2000 devices with a single gateway.

So there’s a lot of flexibility that we have that, that firewalls can’t deliver. And when you look at a comparison of a project that involves a firewall as a solution versus blast shield, we are, we take one 10th the time, cost one fourth as much.

We can deliver this with half the administrative lift. It’s much easier to deploy as well. And it actually works. So there’s a lot of benefits that we bring over a firewall kind of solution.

Andrew Ginter
Okay, so so I understand these are these are powerful benefits, but can we come back to the technology? Can you tell us what does this stuff look like? I mean, you said it’s not a bump in the wire.

Physically, what does it look like? Is it a DIN rail box at each of these sites? Is it a DIN rail box on on a central tower? is it what Is it something in the cloud? Can you talk about what is it that that is solving these problems?

Tom Sego
Sure. So there are basically five components that we have to our platform. The first two create the authentication handshake. One is a client that runs late locally on on your HMI or on your machine.

And then you also typically have either a mobile application that provides the and MFA without passwords. And that was patterned after Apple Pay.

So again, I spent a decade at Apple. And so the idea was, let’s try to use some of that technology to provide stronger authentication. The other thing that we have is we have a gateway.

And the gateway is a software appliance. And it can be deployed on x86 bare metal. It can be deployed… On containers. It can be deployed on Kubernetes clusters.

It can be deployed in the cloud, AWS, GCP, Azure. It’s very flexible and it can be operated both in passive mode and active mode. So in the pat traffic path or outside the traffic path.

We also have an agent that can run locally on a machine, which most people know what agents are. And then finally, there’s an orchestrator that is used to drag and drop devices and people into groups and then establish policies between those groups.

So that’s a little bit about the way that the but technology is set up. And one of the things that that we found is that you can have people who are, I’ll say, less sophisticated than many CCNA trained professionals.

So they don’t even need to know how to use command line to deploy our solution. So it’s relatively simple. We have an example where one person is managing 22,000 devices.

So again, that provides a benefit to them in terms of OPEX reduction ongoing. So that’s a little bit about the way technology work and these the and the way these components fit together. Does that answer your question, Andrew?

28:55.44
Andrew Ginter
ah That’s close. I mean, what what you’ve described is sort of the the pieces of the puzzle. But, I’m still a little weak on on on how they work together. I mean, you again, we’ve we’ve used the word routing a couple of times.

29:09.02
Andrew Ginter
um To me, there’s there’s two ways to do routing. You can either take the message messages into one of your components, I’m not sure which one, and figure out where they belong and send them on the way yourself. You can be a router.

29:24.15
Andrew Ginter
Or, and I understand sometimes some software WANs can do this, they reach out to routers like firewalls and just routers and who knows what else that can route messages.

29:38.01
Andrew Ginter
And they send commands to those devices when things need to be routed differently. Is one of these models what what you use? how How do you guys do the routing?

Yeah, so let me talk about how these pieces all fit together. So the software appliance that is the gateway sits upstream of the switch and usually downstream of the firewall.

And what it often will do is it will provide what we call layer two isolation. And so what that is, if you think about, we can essentially turn a 48 port switch into 48 VLANs so that each one of those is its own encrypted unit that can’t see their neighbors and can’t talk to their neighbors in unless the policy allows that to happen.

And so that level of very granular control is something we can deliver because of the way the gateway controls and manages the routing that you’re discussing.

Now, there’s two other components I didn’t really talk that much about. One was the authenticator, and the second was the client. And the client is different than the agent. And so the what the client does essentially is a challenge response between either the SSO, the FIDO2 compliant key, or the mobile authenticator.

And so what it’ll do is essentially produce a QR code that the mobile application would scan and then apply your face ID, and then you would be into the system, but not authorized or permitted to see anything unless the policy had already been allowed.

So that’s the way we manage both the authentication and the authorization. And that’s also the way we manage routing of traffic between devices, gateways, and the groups that that those devices are in kind of encapsulated in.

Nathaniel Nelson
So in his answer there, Tom was was trying to describe things, but admittedly I was getting a little bit mixed up because there were certain things that were upstream from other things and downstream from other things and layer two and switches. And be like Can you, Andrew, just help simplify everything we’re talking about here?

Andrew Ginter
Yeah, sure. So in my understanding, they have a few different kinds of components. And And I might have got this wrong. But, what I got out of it was, imagine… Um

You know, firewalls can do network address translation. They can say, I’ve got a bunch of addresses here. I’m going to show you a different address to the world. But, managing them in sort of scale, at scale with tens of thousands of devices can be a real challenge, especially if each firewall is only managing a handful of devices. That’s a ridiculous number of firewalls to manage.

So what Thomas got, I believe, is a, I think he called it a gateway device. It’s something that sort of sits between, let’s say, a small network of five to 10 devices and the infrastructure.

And you can assign whatever IP address you need to to that gateway. Oh It might, in fact, have two addresses, one on sort of the infrastructure side and one on the device side.

So it has a device address that is compatible with whatever stupid little network of five local, always reused, ramp IP addresses, the, the, the airport ramp addresses, it’s, it’s compatible with that bit of address space.

It talks to those five devices. And when those devices send it messages, it forwards those messages into the infrastructure and it figures out the addressing. It figures out the, it does encryption.

If you’ve got sort of more conventional, um, Windows or Linux communications, you can put his software on those devices. They that That software will do the crypto, the software will connect sort of natively into the infrastructure and and sort it all out.

And then, the the thing of beauty is, okay, those pieces kind of make sense. The thing of beauty is what I heard was they’ve got a management system, which says, okay, you have 20,000 devices.

um half of them have exactly the same IP address. That doesn’t matter. This device over here in this building in this country can talk to that device over there.

It’s allowed. But when that device wants to talk to Andrew’s laptop, because I’m a a maintenance technician, Andrew has to provide two-factor authentication.

So you can, you basically, you you you stop caring what IP addresses these devices have you don’t have. You’re not configuring routing rules. You’re configuring permissions in a sort of a high-level user-friendly permission manager.

And all of the routing nonsense and the encryption nonsense is figured out for you under the hood. So you can you can think about… Your your big picture of devices that need to talk to each other, who should be allowed to talk to each other, instead of how do I route this when the IP address is conflict? You don’t have to ask that question anymore.

Andrew Ginter
Cool. So that that starts to make sense. I mean, can you talk a little bit about, you’ve been doing this for, 2017, this eight years. Can you talk about, can you give us some examples to to to help us understand, how this stuff works?

Tom Sego
Well, I think the, having run this for almost eight years now, the the journey was not a straight line. We went through, we originally started out, believe not, Andrew, as a hardware company.

And the the thesis was to build an unhackable stack. So this sounds naive, and it was. We were going to start with a chip, a new chip, that we had a partner developing that would have an onboard neural net.

It would create 17 key pairs and it would encrypt the bootloader in the factory and burn a fuse so it couldn’t be reset. And that was the foundation of our product. And then we were gonna write our own kernel, write our operating system. And this was from someone who helped write the OS 10 kernel.

We were gonna write that in such a way that it used byte codes and would not be exposed to buffer overflows and other issues. So it could, we were going to use formal methods to even prove the kernel.

And then we’d have our networking layer, which is what our company is now. And then we’d have our own SDK to manage applications that would also use formal methods. And then finally, we would have the authentication layer that we also have today. So we went from a five,

very ambitious levels of of tech stack to two. And then we have other people doing some of those other things. I think the market really wasn’t ready for something that complex, maybe that secure from a, on the higher end of the security spectrum, if you will.

um the market just really wasn’t willing to pay that. And so we simplified, we pivoted. And then by the way, once we did come out with our hardware product in February of 2020, there was another global issue that hit everyone that caused us to then pivot to a software as a service model, which then required some more development and everything else. So we didn’t really launch our product until late in 2021 and started getting our first customers very shortly thereafter.

And since then, we’ve grown very rapidly to the point where this most recent year, we quadrupled our our revenue and tripled our customer count.

So it’s been an exciting ride.

So let me give you an example. The one one customer, again, an oil and gas customer who was, again, trying to, they were faced with a challenge where they were going have to build their own cell towers, essentially become their own wireless ISP. And this is not unique to this oil and gas customer.

There are many that are facing that. And I don’t know if you or your audience knows, but it’s about a quarter million dollars to build a cell tower. And you have to have many of them. So in in in a relative sense, we are not just delivering security to this customer, we’re also so helping save them a ton of money.

So instead of 10 to $20 million, dollars they’re spending a fraction of that, which is also very interesting. One of the When they did this acquisition, there was another company that did an acquisition.

They wanted to sell off certain components too. So they wanted to sell off the saltwater rejuvenation or… It I don’t know exactly what the right word is, but they wanted to offload this asset.

And one of the things that they were able to do very quickly, because all of our segmentation, all of our granularity and access is done in software.

We can essentially just take that new entity. Put their users in a group, put the devices that they control into another group, and they would have complete control of just their newly acquired saltwater assets and no visibility, no access at all to the oil and gas parent company.

So that was another great example of using this in a creative way.

Andrew Ginter
So you’ve mentioned acquisitions a few times. I mean, I live in Calgary. This is oil country. I hear about these acquisitions all the time. Is this Is this sort of part of the the the the genesis of your organization? is is this How often do these things happen? How complicated are these sort of mergers and acquisitions technology-wise that happen all the time?

Tom Sego
Well, they happen very frequently, especially, again, in oil and gas. In the In the case of oil and gas, because one customer sorry one asset owner has a certain tech stack that can only profitably make money up to a point.

And then they can sell that asset to someone else who has a richer skillset that can extract more profit, more money, more revenue from that same resource.

and And I would say an example that we’ve also seen where people are pleasantly surprised about Blast Shield is when there yeah there’s one one oil and gas customer that acquired a company.

And their biggest fear was they were going to have to do an IP space assessment and figure out whether there were overlapping IP addresses. And so instead of having to do that, which they didn’t have to do at all, they just deployed our software overlay and immediately were able to segment using software each one of these devices, even regardless of whether the underlay IP address was the same.

That saved a lot of money in truck rolls. That saved a lot of money and hassle and headaches in managing that that IP space, which which they were very happy about. And the way they described it, actually, they described it two ways to me.

One way was, my God, this is like a Swiss Army knife. And the other guy said, this is like duct tape. It’s like networking duct tape. It has It provides lots of different purposes and is very versatile to basically deliver the network they want with the network they have.

Andrew Ginter
So let me just sort of emphasize, Tom has said, you talked about changing IP addresses a few times. I talked about it a few times. I’ve actually, from time to time had to change IP addresses on stuff, not so much in an industrial setting, just, just internet protocol networks, just, business infrastructure.

And here’s the tricky bit. It’s very hard to do that remotely.

You know, Imagine that you you want to remote into a remote substation. There’s nobody there, but there’s 100 devices. And you have to log into each device with, I don’t know, SSH or remote desktop.

And you’ve got to change the IP address on the device. And at some point, you’ve got to tell the firewall that it’s talking to a different network of IP addresses.

And if you do that in the wrong order, if you, let’s say, hit the firewall first, now you can’t send messages to any of the devices because the firewall doesn’t know how to route to those devices anymore. They have different IP addresses. So you have to undo that. Now you go into the device and you give the SSH command a Linux box. You give the that that command line command to change the IP address, and it stops talking to you because you’re connected to the old IP address. You’ve got to try and connect to the new IP address.

Only the firewall won’t connect you to the new IP address because it its IP address hasn’t been updated. So now you have to sort of blindly change all these addresses. Then you change the firewall, and then you see if you can still talk to these devices, and three of them have gone missing.

Why? Did I fumble finger the IP address? Is there some other problem? It’s just really hard to do this remotely. And so, again, if you have 700 sites, you’ve got to put people in trucks and drive out to these wretched sites to make these changes.

If there’s a way to avoid that, you can save a lot of money. So, yeah, I kind of get that it’s really useful to avoid doing that.

Andrew Ginter
so So this is starting to come together for me. I mean, you can do the network address management in your, what did you call them?

The gateways.

Tom Sego
Gateway, yeah.

Andrew Ginter
And that gives you an enormous amount of flexibility. But And it’s it’s the the client that does the the crypto. Or maybe it’s the agent.

39:22.07
Andrew Ginter
I’ve i’ve i’ve lost track.

Tom Sego
The client is used to authenticate.

Andrew Ginter
Right.

Tom Sego
The agent runs on typically a server in the cloud, those kinds of maybe a historian type of use case. The gateway is the workhorse because so much of OT infrastructure cannot run an agent.

And so because it can’t run an agent, you need to have a gateway that can do the encryption and decryption of traffic. Now, when you think about the way a lot of these processes are controlled, they use PLCs.

And the PLCs, we don’t encrypt the traffic below the switch.

We don’t interfere with that. However, with the traffic that is upstream of the switch, all of that’s encrypted wherever it may go.

So I think that’s that’s the way it’s done.

Andrew Ginter
One other technical question, you mentioned CVEs and exploits and vulnerabilities earlier.

I mean, i’m I’m familiar with, let’s say firewalls that that say they do stuff like virtual patching, meaning if there’s a vulnerability in a PLC, the firewall, if it sees an exploit for that vulnerability come through, will drop the exploit and will protect the, the prevent the exploit from reaching the the the device. Is Is that the kind of thing you do when you talk about about protecting from exploits or are you doing something else?

We’re definitely doing something else. And I think the the approach that we take is we use this networking cloaking concept where you have to authenticate first before you can see anything.

There’s no management portal. So there are zero exposed web services. If you run a network scan on a factory, that’s protected by blast shield, you’re going to come up with nothing.

And what that means is if there are CVEs, and I guarantee you there will be, there will also be zero-day viruses, okay which may not be on anyone’s list.

And so in those both of those cases, as well as ancient devices that are never going to be patched, you’ve got a way to deal with these unpatchable systems because they’re unaddressable. And so it’s going to be very difficult to exploit those.

Andrew Ginter
Cool. So, I understand you’re you’re you’re heavy into oil and gas with all of the examples we’ve been talking about oil and gas, but I’m guessing you you are active in other industries as well. Given your personal background, are you active in other industries? what Can you give me some examples of what’s going on there?

Tom Sego
Yeah, absolutely. I think manufacturing is a fantastic kind of industry for us. They oftentimes have our little bit early adopters with with as it pertains to machine learning, predictive maintenance, those kinds of things, advanced analytics.

And we had one a manufacturing customer, in fact, who was hacked and many manufacturers do get hacked from time to time. They were hacked and the board asked the CISO to have an assessment to figure out what their risk posture was.

And before they could complete that assessment, they were hacked again. And so this really lit a fire under the entire kind of security team.

And they basically came up with a list of findings. And with those findings, they started implementing those findings. And they were testing various kinds of solutions.

And in one facility, they had 10 different lines, manufacturing lines. And they had deployed blast shield on one of those manufacturing lines.

They got hacked a third time. Now, this time, though, nine of the 10 lines shut down, whereas the line that was protected by Blastshield continued to run.

And what was really interesting about that is how quickly the organization responded. The CFO of this company responded and elevated that to the parent private equity company.

And now that’s leading to us becoming the default standard for not just that one company and all of its 17 plants, but also the parent private equity company and all the other manufacturing facilities that they’re trying to manage. Okay.

Andrew Ginter
Cool. I’m I’m delighted to hear it. The world needs more cybersecurity. Um

I mean, I’ve learned a lot. Thank you so much for joining us. Before we let you go, can we ask you to sum up? What what are the key concepts we should be taking away from from our conversation here?

Sure. So I think the company, as it was founded, was trying to establish protecting critical infrastructure based on first principles. And the first principle was to try to eliminate entire classes of threats if possible.

And so our solution then tries to eliminate phishing credential theft. So we we have an MFA passwordless feature. We also allow you to segment using software.

We cloak your network so it’s undiscoverable. 35% of all CVEs discovered last year are what are called forever day vulnerabilities. And so that network cloaking capability means that they’re not exploitable.

And then finally, we also have a secure mode access component in there. So we’re trying to deliver a lot of value to our oil and gas manufacturing customers so that they when you couple this with a continuous monitoring and visibility tool like a nozomi dragos dark trace armis SCADAFense industrial defender the group clarity so when you combine those two you get a ton of protection at a very low price

Nathaniel Nelson
So that just about does it, Andrew, for your interview with Tom. Do you have any final words to take this episode out with?

Andrew Ginter
Yeah, I mean, I really like Tom, the the the customer that gave the duct tape analogy. You have lots of little networks, sometimes thousands of devices.

Half of them have literally the same IP address or half of these, tiny little subnetworks of of five devices on on airport runways or on, on webbages.

ah networks that you’ve acquired with, acquiring an oil field, they all have the same IP address. They all have the same IP address range. None of it’s encrypted. It’s just a mess.

And, this is something that lets you patch it all together. You need crypto, you need authentication, you passwordless is good. Use certificates instead. They’re harder to phish. You need to hide all of these repeated subnets with the same IP addresses.

You need a permissions manager, saying A can talk to B.

You need infrastructure underneath the permissions manager to make the messages from a go to B. You need to to have some synthetic IP addresses so that when you set everything up, your SCADA system can talk to an address and a port, I don’t know, probably on the gateway or or some piece of the infrastructure rather than the real address that’s repeated a hundred times in your infrastructure.

This just makes… A lot of sense. I It seems to me there’s there’s a a bright future for this kind of, of again, duct tape or just patch it all together and make it work and throw some security on top of it. Crypto authentication, this is all good. I’m i’m i’m impressed.

Nathaniel Nelson
Thank you to Tom Sego for speaking with you about all that, Andrew. And i always, gotta say that again. Well, thank you to Tom Sego for speaking with you about all of that, Andrew. And Andrew, as always, thank you for speaking with me.

Andrew Ginter
It’s always a pleasure. Thank you, Dave.

Nathaniel Nelson
This has been the Industrial Security Podcast from Waterfall. Thank you to everybody out there that’s listening.

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Network Duct Tape – Episode 141 appeared first on Waterfall Security Solutions.

]]>
Credibility, not Likelihood – Episode 140 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/credibility-not-likelihood-episode-140/ Wed, 06 Aug 2025 20:52:59 +0000 https://waterfall-security.com/?p=34651 Explore safety, risk, likelihood, credibility, and unhackable cyber defenses in the context of Norwegian offshore platforms.

The post Credibility, not Likelihood – Episode 140 appeared first on Waterfall Security Solutions.

]]>

Credibility, not Likelihood – Episode 140

Safety defines cybersecurity - Kenneth Titlestad of Omny joins us to explore safety, risk, likelihood, credibility, and deterministic / unhackable cyber defenses - a lot of it in the context of Norwegian offshore platforms.

For more episodes, follow us on:

Share this podcast:

Large scale destructive attacks on big machinery is, not something that I would consider a credible attack.” – Kenneth Titlestad

Transcript of Credibility, not Likelihood | Episode 140

Please note: This transcript was auto-generated and then edited by a person. In the case of any inconsistencies, please refer to the recording as the source.

Nathaniel Nelson
Welcome everyone to the Industrial Security Podcast. My name is Nate Nelson. I’m here with Andrew Ginter, the Vice President of Industrial Security at Waterfall Security Solutions, who’s going to introduce the subject and guest of our show today. Andrew, how are you

Andrew Ginter
I’m very well, thank you, Nate. Our guest today is Kenneth Tittelstad. He is the Chief Commercial Officer at Omni, and he’s also the Chair of the Norwegian International Electrotechnical Committee of Subgroup working on 62443. So this is the Norwegian delegation to the IEC that produces the widely used IEC 62443 standard.

We’re going to be talking about credible threats. What should we be planning for security wise? And by the way, I happened… I had opportunity to be in Norway and I visited Kenneth at the Omni head office where they have a lovely recording studio. So we recorded this face to face in their in their studio in their head office.

Then let’s get right into your conversation with Kenneth.

Andrew Ginter
Hello, Kenneth, and welcome to the podcast. Before we get started, can you tell our listeners, give us a bit of information about your background, about what you know, what you’ve been up to and and the good work that you’re doing here at Omny Security

Kenneth Titlestad
Thank you so much, Andrew, and welcome to Norway and our office. It’s, I’m so glad to have you visiting us. So my name is Kenneth Titlestad and I’m working as a Chief Commercial officer in Omny and I’ve just started as a commercial officer here in Omny. I went over from Southwest area where where I was heading up OT cyber security for. I’ve been doing that for six years.

Before that I was working in Ecuador also working on OT cybersecurity, so I’ve been working in the field now for almost 15 years and also for the last five or six years I’ve been chairman for the Norwegian Electrotechnical Committee, the the group that is handling IEC 62443. I’ve been diving deep into the cybersecurity now for quite many years.

And at Omny, we are developing a software platform for for handling cyber security and security for critical infrastructure. It contains security, knowledge graph and. AI that provides actionable insights into security for critical infrastructure. So it’s about it out and physical infrastructure.

Andrew Ginter
OK. Thank you for that. Our topic today is credibility. Now this is talking about risk. You know a lot of people think risk is boring. OK, a lot of people when they enter the industrial security space, they they want to know about attacks. They want to know about the technical bits and bytes. You tell me that you got interested in risk. Very long time ago. Can you talk about that? Where? Where did that come from?

Kenneth Titlestad
Absolutely. I’m I’m not sure if I when I when I considered it as as a as a risk or as a as a field of expertise. So when I was just a small boy, actually my dad, he worked as a control room technician offshore in Conoco Phillips or back then it was called Phillips. So when I was only two years or three years old in 1977. He was working at the Palau offshore oil and gas. Before and I don’t remember this of course back then. But it it, uh, it was always a topic around the dinner table at my my home where he talked about how it was working in the oil and gas business. So in 1977 he was on his way out to the platform when the big horrible blowout happened. He was not actually. He hadn’t arrived at the platform, but he was on his way out there. So it it really was a big topic around the dinner table all the time about safety risks involved in oil and gas.

So I was always listening with my my small ears back then being a bit fascinated about this world, I didn’t see the real danger in it, but I I was trying to picture it in my mind what it was to actually work on in these kind of environments.

So it I was kind of primed back when I was just a small, small boy and later on when I moved into the I I was more into computers. So I did a lot of gaming and programming on Commodore 64 and I started to work in Ecuador on the IT side. But I was still fascinated, fascinated, about the core business being oil and gas and production and exploration. So when I actually got my first trip offshore. I kind of felt that the the circle was closed and I saw the big world, the industrial world that my dad was had been talking about for several years and the kind of the risk perspectives also kicked in. The first thing you meet when you step on board, such a platform is the HSE focus a lot of focus on HS.

OK. And it’s for a reason and I fully got to understand that first, when I actually came on board such a facility, I understood why it’s so important, because it’s it can be really dangerous if you don’t have control over what you’re doing. So that’s when I actually saw the big scale of risk as a perspective.

Andrew Ginter
Yeah. Offshore platforms are intense. I’ve never set foot on one myself, but I’ve I’ve heard the stories quite the environment. And this is I mean, we’re talking about industrial cybersecurity, so you know offshore platforms are intense in terms of physical risk. Can you talk about cyber?

Kenneth Titlestad
It’s it’s an emerging topic. So when I was working in, in Statoil when it was called stator, now it’s equinor, we started to look into that area Around 2010 two 1011 I I still remember the day when people came charging into the meeting room and they started talking about the news of Stuxnet. So that was I I think we got to hear about it in 2010. I was working on the IT side and I I was responsible for large part parts of our Windows infrastructure in the company and we started to I I started to look into what what this SCADA things, what what is it I didn’t know about. PLCS I had never seen a PLC. I didn’t know that there was actually other kind of digital equipment operating critical infrastructure. So so with Stuxnet I started to to dive into the landscape of cyber security.

Kenneth Titlestad
And also as a company, we started a big uh journey back then on on really making uh OT much more cybersecurity. And Stuxnet was kind of a kickstart for it.

Nathaniel Nelson
Andrew, it feels like maybe there are certain kinds of seminola cyber security incidents in the O2 world. We talk, we reference off in the 2007 Aurora test. Maybe, you know, Triton and destroyer. But Stuxnet is that foundational thing that, you know, set the timeline for everybody, right?

Andrew Ginter
Indeed. And you know I was active in the space. I mean, I was leading the the team at Industrial Defender building the world’s first industrial SIM at the time. So Stuxnet was big news. I did a lot of work on Stuxnet. I had a blog at the time, you know, every time I learned something new about it because somebody had published a report, somebody had published another blog.

I’ve done a little research on my own. I published a paper on how Stuxnet spread because, you know, analysis had been done of the artifact. You know, the malware. But it had been done by IT. People at Symantec at I think he said, a bunch of people had analyzed the malware and you know, that’s work I couldn’t do. I’m not a I’m not a a reverse analyst.

But I sat down with Joel Langill. I sat down with Eric Byers and we investigated the impact that Stuxnet would have in a network. What would what would happen if you let this thing loose in a network? Given our understanding of the the Siemens systems, Joel was nexpert on the Siemens systems. You know, Eric and I were sort of more expert more generally, firewalls and industrial systems. So we all contributed to this paper and said here’s what happens if you let loose Stuxnet into an industrial network.

And in hindsight, I have to wonder if we didn’t do more damage than than good, because a lot of people learned stuff about Stuxnet, but there was only one outfit that benefited. And that was Iran’s nuclear weapons program. That was the only, site in the world that was physically impacted.

Why? I regret some of the stuff that I published about about Stuxnet.

Nathaniel Nelson
Do you recall if that research got traction, whether it might have gotten over there or is there no way to tell?

Andrew Ginter
I have no way to tell. I do recall a conversation, sometime later, because I’m a Canadian, I I work with the the Canadian authorities. I remember a conversation with Canadian intelligence services. And I remember, asking them. I’ve stopped, but at one point when I figured out that there’s only one place in the world that’s physically benefiting from my research, I stopped publishing anything about Stuxnet. And I remember some time after that talking to Canadian intelligence saying, I’ve stopped publishing anything about Stuxnet. You don’t have to tell me nothing. In the future, if you ever see me putting out information that’s helping our enemy, tap me on the shoulder, would you? And tell me. Shut up, Ginter. You’re doing more harm than good, and I will shut up. So, yeah, I, I look back on Stuxnet with with mixed emotions. It it was a wake up call for the industry. a lot of people learned about cyber security because of Stuxnet, but who benefited because of all that research?

OK. So that’s Stuxnet is. A lot of people got started in the OT space it was the big news years ago.

Andrew Ginter
Can I ask you, let’s let’s talk about industrial security and the work you, the work you’ve been doing. Stuxnet is where it got started. Where have you wound up? What are you up to today?

Kenneth Titlestad
Yeah, it’s. It’s as you say, it’s 15 years and it’s been, it’s for me. I think it’s been a very interesting journey. So but back in 2010 when when Stuxnet hit the news, I wasn’t immediately immediately diving into OT cybersecurity full time. I was working on the IT side, trying to secure Windows environment in a large oil and gas company.

But uh short, uh, after a while I move more and more over to outsider security, and I had my first trip offshore to oil and gas platform. I think that first trip was in 2013, so actually three years after the Stuxnet. But then I was going out just to to do some troubleshooting on a firewall. So, but more and more, I was moving into OT cybersecurity, and at the end I was. I moved over to Super Steria and I think it was in 2017. And at the end I was really working hard on finding really proper solutions for OT cybersecurity when when potential nation states are targeting you, what do you then do? If you must sort of have their mindset of assume breach and these kind of systems with the PLCS and all they are really, really vulnerable. What do you do when you are being targeted so then then I started to look into. I heard rumors that could there could be something that was non hacky.

So I started investigating into unidirectional data. Diodes was exposed to to waterfall. That was one of the first examples of of where I heard about non hackable stuff. And also I got to to to hear about the, the the Crown Jewel analysis, Cyber informed engineering. Back then it was consequence driven, cyber informed. Hearing. But those kind of topics really, really sparked an extra interest for me because then then I saw on some attack vectors on some of the risks I saw actually a solution that could remove the risk instead of just mitigating it.

Andrew Ginter
So your first sort of foray, everyone was interested in Stuxnet, but you started working on the problem you said with a firewall and to a degree that makes sense. I mean the the firewall, the Itot firewall is often the boundary between the engineering discipline on the platform in the industrial process and the IT discipline, where information is the asset that needs to be protected. And so that boundary is something that both the engineers and the IT folk care about, so that that kind of makes sense. I’m, I’m curious, you got out to the platform you were tasked with the firewall. What did you find?

Kenneth Titlestad
There. Yeah, it was actually kind of a long, long lasting ticket we had in our system, there was a firewall between it and OT that was noisy, so it was causing creating a lot of events and alerts on traffic that it shouldn’t have so I was tasked to go out there and try to troubleshoot this. We we absolutely didn’t think that it was a cyber cyber attack or kind of evil intent, but it was incorrectly configured firewall rule. But when I got out there I could see that it was. It was just incorrectly configured firewall.

There’s nothing, not, not anything dangerous or cyber attack involved, but I also got to to think of of a scenario where if it had actually been a cyber attack and one that created so much noise as well on a security boundary, a security component. Sitting on the outskirts of OT, shouldn’t the OT environment do something to sort of shut down or go into a more fail safe situation? So I got kind of interested in in actually the instrumentation behind your security components on the outskirts of OT. So that’s a topic I continued to explore for for several years, having in the back of my mind cyber informed engineering, non hackable approaches unidirectional systems and on on S4 last year I talked about the the safety instrumented system because safety has always been a particular interest of mine. So I talked about the cyber informed safety instrument. The system shouldn’t the safety instrumented system. At some point, when you’re under an attack, shouldn’t the the the sort of the big brain? Uh, in the room? Shouldn’t that actually take an action? An instrumented automated action and going into not necessarily. A fail safe only, but a more fail failover to a more safe and secure situation.

Andrew Ginter
So that makes sense in theory. I mean if the firewall was saying help help. I’m under attack over and over again. Should some action not have taken place on the OT side. But let me ask you this. It was a false positive. It would have shut down the platform. a very expensive that form unnecessarily, can we detect cyberattacks reliably enough to prevent this kind of unnecessary shutdown, and have if if we do shut down whenever there’s a bunch of alarms? Is that not a new sort of denial of service vulnerability? The bad guys don’t even need to get into OT. They just need to launch a few packets. That firewall generates some alarms in the shuts down without them even bothering to break in the OT. Is that really the right way forward?

Kenneth Titlestad
No, I totally agree. It’s not a good approach going forward. But at the same time I think to shut down one too many times, is is better than not actually doing it, so we should be kind of overreacting and and going into fail safe situation and it could cause unnecessary down time and it could. It’s vulnerability on the production side, but I think it’s much more dangerous with the false negatives where we actually don’t see any attacks and but it’s it’s actually happening. So false positive we need to reduce them, but it’s much more important to actually reduce the false negatives.

Andrew Ginter
So just listening to the recording here. I mean, this is not something I discussed with Kenneth, but we were talking about automatic action when we discovered that an attack might be in progress, for example, because there’s a lot of alarms coming out of the firewall, you know. He agreed with me that shutting down the platform was probably an overreaction because that introduces a new attack vector. The bad guys just need to send a few packets against the firewall, generate a few lines and the whole platform shut down, I agreed with him that something should be done, but we didn’t really figure out what. Here’s an idea in hindsight, a number of jurisdictions are introducing what they call islanding rules, meaning if IT is compromised, you need to, basically, I don’t know, power off the IT firewall, nothing gets through into OT anymore.

For the duration of the emergency, you have the ability to shut off all communications into OT. This is part of, the regulation says you must be able to island. So now you have that capability. I wonder if it isn’t reasonable to trigger islanding when you automatically discover a whole bunch of alarms coming out of anything, because the modern attack pattern, most of them of of modern day attacks, are not like Stuxnet, where you let it loose and it does its thing most of modern day attacks have remote control from the Internet, and if you island, if you break the connection between it and OT.

If there was an attack in the OT network, the bad guys can no longer control it. They can no longer send commands. So and this is not, this is not new. The the term islanding is a little bit new. The concept of sort of an automatic shut off is has been bandied about for for many years. But again, given that the regulators are demanding an islanding capability. maybe engaging it automatically from time to time is not the worst thing that can happen. It increases our security and the impact on operations is is minimal because you’ve you’ve deployed the ability to island already.

You’ve developed the capability of running your OT system independently, and so interrupting that communication for a period of hours at a time while you track things down and say, oh, that was a false alarm. I’m guessing is, minimal cost. So there’s an idea.

Andrew Ginter
OK. Well, let’s come back to our our topic here. The topic is credibility. we’re talking about the risk equation, the typical risk equation is consequence times likelihood. generally we do it qualitatively, but we we wind up with a number coming out of that to compare different different kinds of risks, high frequency versus versus high impact risks. can you talk about that? Where does credibility fit in that equation?

Kenneth Titlestad
I think it fits very well into that equation because when we we, especially when we talk about the likelihood or the probability part of it, the left left side of the equation it it’s always a very, very difficult conversation to have when you try to identify the risk or the the risk levels we are talking about or you try to identify the consequence levels involved. It’s sad to see that a lot of the conversations they go astray due to not being able to put the number on the probability or the likelihood, and I think it it the the conversation gets to be much more fruitful if we can get rid of that challenge on trying to figure out the number on the probability or the likelihood.

Credibility gives us tools in our language to actually be able to talk about the left part of the. So it’s something that is a bit more analog and analog value where we can move more towards the consequence approach, the consequence driven where the the right side of the equation is is more important to talk about as long as you get, if you consider it being credible.

Andrew Ginter
Well, I have to agree. Uh, I’ve argued in my previous in my last book that that likelihood is flawed, that at the high end of cyber attacks, not the low end, the low end likelihood actually works. The high end. The outcomes of cyberattacks are not random. If the same ransomware hits a factory twice and we’ve all we’ve done is restore from backup, it took them down the first time we restore from backup. We make no changes. It hits. Again, they’re going to go down the same way. It’s not random.

I argue that on the high end nation state, targeting is not random either. it’s not that they they they try for a while and if they if they don’t succeed they, go try somewhere else. Nation state threat actors keep targeting the same target until they achieve their mission objective. It’s not random. Once they’ve targeted you, it’s not random. Randomness to me doesn’t work at the high end. Credibility makes more sense. We know is is the threat credible? Is the consequence credible? If this threat comes after us, is this attack comes after us? Is it reasonable to believe credibility is what’s reasonable to believe, not who what’s reasonable to believe? Is it reasonable to believe that the consequence will be realized?

I think it makes a lot of sense, but it’s it’s new. I don’t see the word credibility in a lot of of standards. where does this sit? What what you know. Is this? Is this something people are talking about?

Kenneth Titlestad
Yeah, absolutely. In my work with the clients, I’ve been working with and also the professionals I’ve been working with, we have discussed for some years now that the, the OR we have discussed the big challenge of the the likelihood or the probability part of the equation. And we’ve we’ve without actually having having without following standards or best practices, we’ve seen that we need to skip the discussion on the probability or the likelihood and and talk about the consequent side of it first and then we revisit the likelihood and probability afterwards. But I also see in IRC 6243, especially with the 3-2, it actually talks about consequence, only cyber cyber risk analysis.

So that’s giving a opportunity to actually move away from the discussions on on probability and also of course with the consequence driven approach with cyber informed engineering, we start to see more focus on the far right side with the. The consequence consequence side but leaving out what to do with the likelihood, and I think with credibility we we get some some language based tools to actually play. Is it where we talk about it in a qualitative manner? Instead of having to force it into a number?

Andrew Ginter
So that makes sense to me. I mean, I have the sense that over time in the course of time, cyber attacks become more sophisticated, more sophisticated attacks become credible attacks that were dismissed A decade ago as theoretical have actually happened. Do you see that? what? What do you see coming at us in terms of sophisticated attacks in in the near?

Kenneth Titlestad
I think that’s a really challenging question looking far into the future or or far into the into the history to try to extrapolate what could we expect from the future we see with with the Stokes net, the against Ukraine. Triton, Colonial Pipeline. We see incidents that have had a really high impact, but there’s not very many of.

So, but we see it’s those kind of capabilities are being explored and are being put into different tools, so they can be used by not only nation states but also criminal groups. So with with that kind of analysis we can expect more and more sophisticated attacks and also by more and more non sophisticated groups. So we should expect increase in high impact incident.

Andrew Ginter
OK, so if we’re not talking likelihood, we’re not talking probability, we’re talking credible. How do we decide what’s credible? How do we decide what’s reasonable to believe?

Kenneth Titlestad
Yeah, that’s a that’s a good question. So we need to have some grasp of of what is credible and what is not credible. I’m also of the opinion that that the credibility part of the equation. It’s a qualitative thing. It’s not a zero or one, it’s something that is attached to a kind of a a slippery slope not easily defined. But what we could say if we are trying to to see credibility as a zero or one, what is credible things that have happened actually have happened once or twice or three times. They are credible, so the twice on incident or a safety only type of cybersecurity. That’s now a credible attack because it has happened.

And also near misses. That’s something that Triton was kind of a near miss. They didn’t actually cause it this this destructive attack, but it could have happened. And so we also have other near misses, incidents that we should be considering.

Andrew Ginter
So that makes a lot of sense to me. Credibility versus likelihood. How do we decide though credibility sounds like a judgment call. How do we decide? What’s?

Kenneth Titlestad
That’s a that’s a good question. I I I think there’s a good recommendations in 62443, for instance the 3-2 it it talks about the like I said, the consequence only as an example on how how you can approach the risk equation but it also talks about the need for focusing on worst case consequences. So it talks about essential functions, which basically could be the safety functions. For instance, you need to investigate the consequence if those are actually attacked and compromised. What could be the worst case consequence? So you begin there and then once you identify the worst case consequences, then you move over to the probability or likelihood dimension.

And then you need to consider all the factors. So what are the vulnerabilities involved? What are the safeguards and or what the the standard is talking about? You’re compensating countermeasures. You consider that you consider the function or the asset as well, that if there’s. If there’s no actual interest in the assets, then the vulnerability could be also non interesting to address or analyze. But you start with the consequence side, then you start to look at the likelihood and probability and then you are informed by the the consequence approach.

Andrew Ginter
OK, so let me challenge you on that. I’ve read the CI implementation guide. It says start with the worst case consequences. It says those words. I’ve not seen those words in three Dash 2. Are you sure that that you’re you’re not reading into 3-2?

Kenneth Titlestad
No, I’ve been searching for for that specific part of three dash too many times because because I’ve, I’ve heard others say that the same and it’s actually there. It’s really gold Nuggets in 3-2 talking about essential functions, specifically saying the worst case consequence and also specifically saying that you can choose to do a consequence only risk assessment, so that’s really important. Single words or single sentences in three after. So worth highlighting in the three Dash 2.

Andrew Ginter
OK. So that that makes sense in the abstract. Can you give me some examples what applying these principles? What what should we regard as credible?

Kenneth Titlestad
Yeah, interesting question. I think that the things that come to mind first is for instance the, the, the Triton incident. Before 2017, where when it actually happened, we didn’t think it was credible that someone would actually target a safety only system or cause a safety incident with a cyber attack with with Triton it we actually saw the first first of its kind and the threat became obviously credible. And then SolarWinds as well. It’s a very interesting study where the way they actually compromised the solar winds update mechanism, suddenly massive, massive deployment of kind of malware within critical and non critical infrastructure became really credible threat as well and also near misses. Of course we should be informed by things happening out there and coming on the news that are near misses that can talk about talk to us about what is a credible threat.

Another kind of near miss that I think or is not a near miss, but it’s scenarios or incidents that could talk about credibility is is where we actually have a safety incident. For instance, we we had have had lots of them in Norwegian oil and gas and in oil and gas gas. In general, is safety incidents where we, which is not cyber related at all, but where we see that it it could be able to be replicated by a cyber attack. So that’s something that we should be considering as a credible threat going forward where we actually could replicate the cyber or the incident with the cyber cause.

On credibility, I also think that we need to have in the back of our mind or in the analysis we have to have focus on on the technology evolution, the development and sharing of new technology. So we I see it as a graph where where we are exposed to more and more heavy machinery or heavy software that can be used on the adversary side.

Kenneth Titlestad
So with Kali Linux Metasploit now there’s also AI. So what is being about becoming a credible threat threat is more and more sophisticated stuff due to development of technology. So AI now is on on both sides of the table, or both as an attacker as a tool that makes more more attacks credible, but also on the on the defensive side where we actually need to use it to protect against more and more sophisticated attacks.

Andrew Ginter
So Nate, I was, let me go just a little bit deeper into into Kenneth’s last example. I remember talking to him about this two days before I recorded the session with Kenneth. I was at another event. I had 1/2 hour speaking slot. I was, listening politely to the other speakers. I remember. And one of the speakers was a a penetration tester. I remember asking the pen tester a question about AI and his answer alarmingly.

And, I discussed it with Kenneth. I discussed it with with others. Since the future is is difficult, I asked the AI the the pen-tester so you, you touched on AI. What should we look for from AI going forward? And I asked, should we worry about about AI crafting phishing attacks because I’ve I’ve heard of that happening. Should we worry about Ai helping the bad guys write malware to write more sophisticated malware because I’ve heard of that happening.

And I paused and his answer was Andrew, you’re not thinking hard enough about this problem, you know? Yeah, that stuff’s happening. But what you need to worry about is somebody taking a Kali Linux ISO image. This is the Linux disk image that everybody uses. All the pen testers use. Lots of attack tools, he says. Taking that GB of ISO image. coupling and adding it together with two gigabytes of AI model and the model has not been trained on natural language and creating phishing attacks. The model has been trained by watching professional pen testers attack OT systems, mostly in test beds. I mean, this is what pen testers do. They take a test bed that is a a copy of a system that they’re supposed to be, doing the pen test on no one that does the pen test on a live system. They do it on a test bed.

They use the Kali Linux tools. They attack the system and demonstrate how you can get into the system and cause it to bring about simulated physical consequences. So you’ve taught this AI model how to use the Kali Linux tools to attack OCF OT systems to brick stuff and bring about physical consequences. You take that training model, couple it with the image.

Wrap it up in enough code to run the image as a sort of kind of embedded virtual machine to run the the AI model the million by million matrix of numbers that is a neural network run the neural networ. Run the the the Kelly Linux image and have the AI operate the tools to attack a real OT system. Drop that three, 3 1/2 gigabytes of attack code on an OT asset, start it and walk away and it will figure out what’s there? It will figure out how to attack it. It will figure out how to bring about physical consequences.

I heard that and I thought crap. That’s nasty. back in the day, Stuxnet was autonomous. It did its thing, but it was a massive investment to to produce an an asset, a piece of malware that did its thing without human intervention. This strikes me as again something that will do its thing without human intervention, and it will figure out as it goes. It’s one investment you can leverage across hundreds of different kinds of targets.

I was alarmed. This is something I’m I’m thinking about going forward, it’s to me this is a credible threat. This is something we all need to worry about. I don’t know that the this thing exists yet. But I’m pretty sure it will in five years.

Andrew Ginter
OK. So that’s that’s a lot to worry about. Can I ask you know? Is everything credible? What? What in your mind is not a credible threat at this point.

Kenneth Titlestad
I would think that large scale destructive attacks on big machinery is not something that I would consider a credible attack, but it also goes back to the motivation of the threat sector, for instance, if you have a small municipality, I would lee that really heavy, sophisticated cyber attacks, a lot of them wouldn’t be actually credible due to the target not being interesting for such a threat actor. So large scale destructive attacks is something that in a lot of scenarios wouldn’t be a credible attack.

And then we have for, for instance, large large scale blackouts is quite an interesting story nowadays because a couple of weeks ago, I would think that it wasn’t actually a credible attack. Once we now see that it can happen, for instance, with Spain, it was probably not a cyber attack, but it was something that happened on the consequence side. If we can show that or or identify that it actually can be caused by a cyber attack, then that suddenly nowadays within the last week has become a credible attack.

And also swarm kind of attacks we I hear the discussions on that from time to time where where they see talk about whether it’s a credible thing where you attack millions of cars. As of now, I don’t see that as a credible attack, but things can change.

Nathaniel Nelson
You know, that’s an interesting statement he made there. That large scale attacks on heavy machinery. It isn’t credible. when I think about what we’re talking about on this podcast, the purpose of OT security presumably is that there are significant risks to really important machines. Large scale, but maybe at this point we’ve covered that.

That’s a good point. I think one of the the lessons here is that determining what is and is not credible is a judgment call. OK? Different experts are going to disagree. I’ve, few years ago I saw research published. Saying, look, here’s let’s take for the sake of argument, the possibility of attacking a I don’t know, a chemical plant and causing a toxic discharge. And the researchers concluded that it was theoretically possible, but it was such an enormous amount of effort on the on the part of the adversary, all of which would have to go on undetected by the sight, they said. in the end, I just don’t know that this is reasonable to believe that this will ever happen. So, that was one site.

But again, there are the experts, experts disagree. This is the the what I learned on the very first book I wrote. I got wildly different feedback from different internationally recognized experts. Here’s here’s an insight. To me, this means that when we make judgments about credibility, we probably have to be we have to make if we’re going to make a mistake, make a mistake on the side of caution, err on the side of caution because different experts have different opinions. We might be wrong. every expert has to be honest enough to admit that we might be wrong and build a margin for error into their judgment of what’s credible.

So even if we don’t believe that an attack that I don’t know destroys a turbine is credible, we might want to take some reasonable defences to against, such a not terribly credible attack in our opinion, but we might want to to deploy defences anyway.

Just because we might be wrong and this, this is something that that is also being discussed. It’s how big a margin for error do we need to build into our our planning. I mean I talked to a gentleman who produces who who designs pedestrian bridges. I said how do you how do you calculate the maximum mode? He says that’s easy. Andrew you you you build a barrier to either side of the bridge so vehicles can’t get on the bridge.

Most people are less than two meters tall. Most people are mostly water. You model 2 meters of water. The width of the bridge, the length of the bridge. That’s your maximum load. And then he says. And then he says, you multiply that by 8 and you build the bridge to carry the multiplied load. Because these are people we’re talking about, it is unacceptable for the bridge to fail under load. And so this is the margin for error that engineers routinely built into their safety calculations. I believe, we as as experts in cybersecurity need to build a margin for error into our security planning as well.

Andrew Ginter
So this all makes sense. One of the things that appeals to me very much about the credibility concept is using the concept to communicate with non-technical decision makers like boards of directors. You do this, you have experience with this. Can you talk about your experience?

Kenneth Titlestad
Yeah, I think it’s interesting. When we talk to board members and the the CXOS in different companies, they they don’t necessarily go into details about risk, but they know that they have a special accountability.

So so when we talk about credibility for for those kind of people, they are getting more on board with the discussions, they know they have a special accountability, they draw the line in the sand. For instance if if if the potential consequence is that somewhat somebody to die then that’s a non acceptable risk and they they take on that kind of position due to their accountability as as board members or or heads of of the company.

And they also are being accountable for from from the the government and from the for the society. So the some, some risks when it comes to the consequence side if if we talk about people dying then that’s absolutely and not acceptable risk for this?

Society and the representatives for for that kind of approach is is elected persons in the government and they put the the heads of the company or the Board of Directors as accountable for that on top of the company.

Andrew Ginter
So that makes sense. Boards care about consequences that the business or the society is going to find unacceptable. You didn’t use the word credible. How does credibility fit into acceptability when you’re communicating with?

Kenneth Titlestad
Yeah, we don’t have to defend against all possible cyber attacks. What we do have to protect against is the credible ones. So when we bring credibility in as a concept, then it’s something that communicates, communicates much better for the the Board of Directors and the heads of the companies.

Andrew Ginter
This has been good, but it’s it’s a field big enough that I fear we’ve missed something. let me ask you an open question. What? What should I have asked you here?

Kenneth Titlestad
We’ve been talking about credibility. Credibility is what is reasonable to believe. But it’s not enough to talk about reasonable attacks. We also need to be talking about reasonable defence. So what is a reasonable defence? We then need to be considering or or taking all the tools.

We need to use all the tools at our disposal for a reasonable defence, and nowadays that also obviously includes AI on the defensive side, not only on the offensive side.

This is also a very important part of me, of the reason for me joining Omny. So Omny is is built on our security knowledge graph, so it’s a data model where we can put all information we need about our assets on the vulnerabilities on the network, topologies, on the threats, the threat actors. So it becomes a digital representation or a digital twin of our asset. Combining that with AI which we have built in from the beginning, we get a very strong assistance on security where it matters most.

Andrew Ginter
Cool. Well, this has been great. Thank you, Kenneth, for joining us. Before I let you go, can I ask you to sum up for our listeners, what should we take away from this episode?

Kenneth Titlestad
Thank you, Andrew, for having me and and thank you so much for being here in Norway and and visiting us at our office. So we’ve we’ve had a good conversation about consequence, the focus on on the worst case consequences we’re we moved over to talking about credibility, replacing the the likely good concept with credibility, especially for high impact stuff where we don’t have the probability or the data to talk about it. We also talked about reasonable attacks and reasonable defences. So what is a reasonable defence against increasingly credible, sophisticated attacks with high consequences. So it’s been a really good discussion about all of these topics.

Kenneth Titlestad
If people want to know more about these topics or they want to discuss them, please connect with me on LinkedIn and message me there. I’m more than happy to discuss these topics and please visit our webpage Omnysecurity.com. Our platform addresses most of these topics we talked about today.

Nathaniel Nelson
Andrew, that just about does it for your conversation with Kenneth Title. Scott, do you have any final words you would like to take out our episode with today?

Andrew Ginter
Yeah, I mean we’ve we’ve talked about about credibility and this is a concept that is is relevant to sort of the high end of sophisticated attacks, the high end of of consequence. But I’m not sure let me.

Let me try and give a very simple example. I mean I was I was raised in Brooks, Alberta, little town, 10,000 people in the middle of nowhere. Literally an hours drive from any larger population centre. In terms of cyber threats, do let pick. Let’s pick on, I don’t know, the Russian military, does the Russian military have the money to buy three absolute cyber gurus, train them up on water systems, plant them as a sleeper cell in the workforce of the town of Brooks water treatment system. Have them sit on their hands for three years and after three years.

Using the passwords they’ve gained, the trust they’ve gained and the expertise that they have. Have them launch a crippling cyber attack that that damages equipment that takes the water treatment system down for 45 days is that a credible threat? Well, the Russians have the money to do that. It’s, they have the capability to do that.

But you have to ask, why would they bother? I mean, this is a little agricultural community. There’s a little bit of oil and gas, activity. Why would they bother? That does not seem to be it. It. It does not seem to be reasonable to launch that kind of attack against the town of Brooks. It just makes no sense. I don’t see that as a credible threat.

Is that a credible threat for the water treatment system in the city of Washington, DC, home of the Pentagon? I do think that’s a credible threat. So the question of what’s credible is an important question that I see more and more people asking in risk analysis going forward. we have to figure out what’s credible for us, what are what, what, what capabilities do our adversaries have? What kind of assets are we protecting? What kind of defences we have deployed what makes sense, what’s reasonable to believe in terms of the bad guys coming after us. This is an important question going forward and I see lots of people discussing it. I’m I’m, grateful for the the the chance to explore the concept here with with Kenneth.

Nathaniel Nelson
Well, thanks to Kenneth for exploring this with us. And Andrew, as always, thank you for speaking with me.

Andrew Ginter
It’s always a pleasure. Thank you, Nate.

Nathaniel Neson
This has been the Industrial Security Podcast from Waterfall. Thanks to everyone out there listening.

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Credibility, not Likelihood – Episode 140 appeared first on Waterfall Security Solutions.

]]>
Experience & Challenges Using Asset Inventory Tools – Episode 138 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/experience-challenges-using-asset-inventory-tools-episode-138/ Tue, 27 May 2025 16:28:48 +0000 https://waterfall-security.com/?p=32564 In this episode, Brian Derrico of Trident Cyber Partners walks us through what it's like to use inventory tools - different kinds of tools in different environments - which have become almost ubiquitous as main offerings or add-ons to OT security solutions.

The post Experience & Challenges Using Asset Inventory Tools – Episode 138 appeared first on Waterfall Security Solutions.

]]>

Experience & Challenges Using Asset Inventory Tools – Episode 138

Asset inventory tools have become almost ubiquitous as main offerings or add-ons to OT security solutions. In this episode, Brian Derrico of Trident Cyber Partners walks us through what it's like to use these tools - different kinds of tools in different environments.

For more episodes, follow us on:

Share this podcast:

“Trying to build a vulnerability management program when you don’t know what’s out there is a fool’s errand…you’re never going to be able to understand your total risk.” – Brian Derrico

Transcript of Experience & Challenges Using Asset Inventory Tools | Episode 138

Please note: This transcript was auto-generated and then edited by a person. In the case of any inconsistencies, please refer to the recording as the source.

Nathaniel Nelson
Welcome listeners to the Industrial Security Podcast. My name is Nate Nelson. I’m here with Andrew Ginter, the Vice President of Industrial Security at Waterfall Security Solutions.

He’s going to introduce the subject and guest of our show today. Andrew, how’s going?

Andrew Ginter
I’m very well, thank you, Nate. Our guest today is Brian Derrico. He is the founder of Trident Cyber Partners, and he’s going to be talking about using asset inventory tools. I mean, we’ve had a lot of people on vendors mostly talking about what’s available, how it works.

He’s going to look at the problem from the point of view of the user using these tools and why using these tools turns out to be a little harder than you might expect.

Nathaniel Nelson
Then without further ado, here’s your conversation with Brian Derrico.

Andrew Ginter
Hello Brian, and welcome to the podcast. Before we get started, can I ask you to, say a few words of introduction, tell us a little bit about yourself and about the good work that you’re doing at Trident Cyber Partners.

Brian Derrico
Good morning, Andrew. I’m Brian Derrico. I’ve been in the critical infrastructure sector for about 15 years. i Spent my entire career at a large utility solely focused on the cybersecurity requirements for nuclear power plants.

And my last role there was actually, it was the program manager responsible for the entire cyber program across the fleet. Again, all really dealing with OT type stuff and regulatory requirements.

I left in October, started my own business, tried in cyber partners, and mainly aimed to help other critical infrastructure sectors with their cyber problems.

Andrew Ginter
Thanks for that. And our topic eventually is going to be asset inventory. But, let me ask you, you’ve spent a lot of time working at nuclear.

You’ve worked, in in very old plants in, you’ve done some work recently with a very modern plants. Can you talk about, in terms of automation, what’s the difference between sort of very old automation and very new automation that that you’ve been exposed to?

Brian Derrico
So there’s there’s a lot of similarities, right? At the end of the day, whether it’s a new plant or an old plant, it is still a nuclear power plant. So there is a nuclear reaction that is heating some water. That water is heating some other water in a secondary loop that is flashing to steam, spinning a turbine, making electricity.

So that is nuclear power 101. It doesn’t matter how new or old the plant is. They’ve all generally worked that way for a long, long period of time. To your point, what you do see is the amount of digital assets in those plants is drastically different from new to old.

So in my previous role, I had done some industry benchmarks to try and figure out what is sort of the average number of digital devices that are in a plant. And it came in around 1700 or 1800 per unit.

These new plants that they’re building, they’re an order of magnitude larger than that. There are potentially 10,000 devices on a single unit because everything is digital.

I don’t know how many people have had an opportunity to tour a nuclear plant. I would certainly advise if you have that opportunity is a really, really cool thing to see. And most plants are all analog. There is a lot of analog equipment, a lot of analog indication.

And the new plants, that’s not that case anymore. So trying to keep track of all of your digital devices becomes a very important and critical problem.

For example, in some of the older plants that we worked in, as you’re going through getting asset inventory, you open up the cabinet, you kind of look for what is digital, what are the blinky lights, and you go through and that is generally a manual way that we did a lot of asset inventory.

These newer plants, you open the racks and everything inside is digital. Everything inside could be considered an attack pathway. And there were some discussions and and there’s some thought process out there that essentially calling locations critical.

Is going to be an easier way to do it because saying this entire rack, no matter what’s in it, is going to be a critical digital component is an easier way than trying to label an inventory all 50 or 60 devices. So that was a thought process that was considered.

But again, at the end of the day, every device was considered on a case by case basis. But it kind of gives you an idea of just the scale of how much digital equipment there are in newer plants nowadays.

Nathaniel Nelson
Andrew, I’m glad we’re getting the opportunity to talk about nuclear because it seems like a pretty relevant and highly important field.

And yet it never seems like we get a guest on who wants to talk about it. So where does nuclear stand in the panoply that is industrial security for you?

Andrew Ginter
Well, we’re we’re going to be talking mostly about asset inventory, but let’s talk about nuclear for a while. I mean, Brian said a few words. in a sense, he’s lived a lot of this stuff, without even knowing how unusual it is.

Nuclear is an extreme. When we talk about worst case consequences of of compromise, what’s the worst case, the worst thing that can happen in a a coal-fired power plant? A boiler blows up, people die.

What’s the worst thing that can happen in a nuke? The nuclear core explodes, Chernobyl, and hundreds of square kilometers become unlivable for centuries.

Oh, that’s very bad. So the consequences drive the intensity of your security program, and and nukes are an extreme. I mean, the only thing I can imagine that’s possibly more sensitive than nukes is, I don’t know, nuclear weapons, targeting systems, launch launch protocols. It’s just it’s that extreme.

What does that mean for cybersecurity? Well, let’s start with physical security. In different parts of the world, there’s different rules. In a lot of the world, you need a security clearance to visit the site.

So In North America, you can get tours of the site. But in a lot of places, you you a lot of stuff is classified. I don’t have a security clearance. I’ve never seen network diagrams for a nuclear site. I’m guessing a bunch of this stuff is classified. it It’s national secrets. It’s it’s it’s that intense.

On the cybersecurity side, again, I talk to people, uh, we, we serve nuclear customers at waterfall, And they do things that, seem again, seem extreme.

They might have all of their OT systems in one room, in one building, and all of their IT systems, all their IT servers, email servers and whatnot, they do have IT networks in in nuclear plants. you need to You need to schedule work crews. got to pay your people.

So they have IT and OT networks. And all of the IT servers are in a different room in a different building. Why? Because they cannot afford someone any time, someday to make a mistake and plug a cable from an IT network into an OT asset. That’s completely unacceptable cybersecurity wise.

And so they physically separate it so that as much as possible, they make these kinds of errors impossible. You can’t do it. You can’t plug the wrong cable and it’s in a different building.

Another example, you might imagine that there would be multiple security levels. You might imagine that the technology that controls the core, the control rods into the core that keeps the core from exploding is more sensitive than the the OT systems that control the steam turbines. I mean, a coalpower a coal-fired power plant has steam turbines.

Steam turbines have steam turbines, you imagine. In fact, again, when I talk to these people, a lot of nuclear sites, in my understanding, have only two security levels. Absolutely highest critical and business and nothing in between.

Again, why? Why would the steam turbines be protected to the same degree as the core control system? In part, it’s because, the physics of these systems, the steam, there are… distant physical connections. the liquid from the core heats up the liquid in the steam. And so, there’s theoretically a risk that something happening to the steam turbines could leak back into the core.

But more fundamentally, these people just say we cannot afford to make mistakes with security. And so we’re going to dumb it down. We’re not going to have seven or eight or 13 security levels. And you have to remember which is which and apply the right policies to the right equipment.

It’s going to be absolutely critical, end of story. And which room you’re in. That’s the policy you apply. Again, as much as possible, they eliminate human error.

Regulations. I’m most familiar with the the North American regulations. You might imagine, I mean, NERC SIP handles the power grid. if you If you fail to live up to your obligations under NERC SIP, what happens? You can be fined as much as a million dollars a day.

It’s never been levied, but you get fined. With the nukes, if they fail to live up to their regulations, they’re shut down. They lose their license to operate. that’s it’s It’s that simple. If you cannot operate safely, you cannot operate. Bang, you’re down. So again, intense attention is paid to the detail of cybersecurity and cybersecurity regulations.

Another example. I’m not aware of any nuclear generator. now I might I don’t know all the generators in the world. I’m not aware of any nuclear generator that has any kind of OT remote access, period.

Nothing remotely gets into OT. You want to touch OT, you walk over to the server room. So again, intense. In a sense, though, what I what I what I see of of the nukes is that they are leaders in the cybersecurity field.

They they do things extremely intensely. And as other parts of the field, other power plants, other refineries, other high-consequence sites, as the threat environment continues worsening, as cyberattacks keep getting more sophisticated, they look over at what is nuclear doing, and they pull one after another technique out of the nuclear arsenal, and start applying it in in their in their circumstance. So even if you’re not required to follow the nuclear rules, I would encourage people to read NEI, the Nuclear Energy Institute 08-09 standard, or the NRC Nuclear Regulatory Commission 5.71,

I’d actually recommend NEI 08-09. It’s more readable. It’s got more examples. The NRC 5.71 is sort of more terse and saying, here’s the regulation, follow it. But they are leaders in the space. And over time, I see people drawing on their expertise and and the way they do things.

Andrew Ginter
And our topic is asset inventory. And so, we’re talking about how much automation there is. We’re talking about how hard it is to count. Can we back up a minute?

In principle, the truism is you cannot defend what you don’t know you have.

And so that’s why we do inventory. Is that it or is there more to it? Why are we doing these inventories? What good is an asset inventory?

Brian Derrico
So it’s a great question and I’m going to give two answers, right? So one is on the nuclear space. The first answer is we have to, right? And sometimes that is, it’s an an answer. I don’t think it’s a good one, but it is answer. So we do have regulatory compliance around an asset inventory because to your point, it does sort of fuel other aspects of your cyber programs, such as supply chain, vulnerability management, configuration management, et cetera.

The flip side is it’s just, it’s a smart thing to do, right? You can’t build a vulnerability management program if you don’t know what software is out there that you’re potentially vulnerable to.

So trying to build a vulnerability management program when you don’t know what’s out there is it’s it’s a fool’s errand because you’re never going to be able to understand your total risk.

And that’s really the key is understanding your assets gives you the ability to understand your attack surface. And once you understand your attack surface, you can then figure out what are my vulnerabilities? What do I need to mitigate? What is a possible threat vector an adversary could use to attack this device or this process?

And you can’t do any of that without having the asset inventory first.

This brings us back to our topic. We’re talking about asset inventory. We’re talking about tools. There’s tools out there to do asset inventory. We don’t have to do a manual walk down and count the blinky lights in the cabinets.

Do the tools not solve the problem? is Is there still a problem when you’ve deployed one of these tools?

Brian Derrico
So there are a number of tools that do this and some are better than others right nature of the beast, but they do a great job of asset inventory. So I currently do professional services for a software company and a lot of their deployments in the OT space are generally for people that want to use the tool as their asset inventory.

Now, the issue is sort of becomes a couple of pieces uh that comes up can come up often and I i saw this in nuclear all the time is a lot of those tools that we’re talking about they depend on network traffic right so they’re looking at source and destination and they’re passively trying to piece together these are their assets on your network and this is what they do and how they do it so one problem is going to be you have assets that are not networked so If you have safety critical devices, they may be isolated. So you’re not going to be able to deploy a tool to do that. So you are going to have to manually enter those in and manually keep track of those in some way, shape or form.

And then the second piece is a lot of these tools that we talked about, they can’t just be deployed instantly. You can’t just throw a box in a rack and call it macaroni. There are architectural changes that have to happen to your network. You have to get traffic from switches. You have to open span ports. You have to deploy sensors.

And that’s where things can get a little difficult on the OT side of the house.

Andrew Ginter
So work with me. modern switches, any kind of managed switch has got a span port or a mirror port.

You log into the switch, you turn on mirroring and and off you go. You can start seeing the traffic and a lot of these these asset inventory tools can start figuring out what are the assets based on their traffic.

I get that some systems are are not on the network, the safety systems, that makes sense. But is it is it more complicated than that? I mean, I imagine you’re working with some older systems, older switches, or do any of these plants use non-managed switches?

Brian Derrico
So I’m sure there are some non-managed switches out there. I would not be surprised if there are some hubs that are still out there and kicking.

While in theory, yes, opening up a span port is is a simplistic idea. Where that turns into and where it becomes difficult is a lot of these OT vendors and and even environments that you’re in, nobody wants to change the system without vendors’ involvement, because everybody’s scared about what are the consequences. Because again, this isn’t an IT system, this is an OT system. There could be some huge process changes and huge impacts and risk if whatever you wanna do doesn’t go according to plan.

And that’s where I have seen the most amount of struggle come from is, you wanna get some a span port, you reach out to the vendor, you say, hey, this is what we’re looking to do. We just wanna span this traffic and the vendors don’t wanna budge.

The vendor hasn’t deployed that. They don’t know what that’s going to look like. They tell you that, hey, we’re going to have to refat the entire system after making this change. now Now, meanwhile, is is there going to be an impact?

No. we We can look at switch utilization and see, hey, even if we double, we’ll double the switch utilization. you’re not gonna see a huge impact to that because your switch is only at five or 10% utilization.

But it’s just, it’s there isn’t an understanding on the vendor side. So for some of these big control system vendors, it becomes difficult for them to bless as it were making these changes. And that’s where we have seen the most amount of struggle.

And we even had projects where we had to provide a lot of the testing and we provided, this is what needs to happen because the vendor just didn’t have the knowledge.

And think as time goes on for those control system vendors that are out there, I think that’s gonna be more and more of an issue because more and more of their deployments are gonna have a requirement for some form of higher detection capability, but We can’t just say, these things are they’re in an ot environment they’re safe uh that this’s just this is not the case right there there needs to be higher level of detection and the vendors need to be more willing to work and as time goes on I think it’ll be easier but retrofitting this sort of technology in existing systems becomes increasingly difficult because nobody wants to touch the system that isn’t broke

Andrew Ginter
So A couple of quick points there. Brian used a couple of of acronyms people might not recognize. He said you might have to refat the entire system. What’s that? Fat is factory acceptance test.

It’s set everything up and test every function of the system. Emergency recovery, every function of the system and make sure that it meets the requirements that were laid out when you you issued the contract to get the system built.

Typically takes days. You have to shut the plant down to do it. So nobody wants to refat anything. So that’s that’s what the vendors are threatening, saying, well, if you make a change that we haven’t tested, we have to retest it, don’t we?

Another point he made was about, uh, bandwidth and, for anyone who, who’s not real familiar with how mirror or span ports work, you got a switch with, I don’t know, 24 ports on it, 48 ports.

It has to be a managed switch. You log into the switch with a username and password and you can configure the switch. And one of the things you can configure is it’s called a mirror port or a span port. Um,

It’s a port or, multiple ports where you send copies of stuff. So typically, if you’re going to do an asset inventory, you configure one port and say every message that anybody sends to anybody else on the system, send a copy of the message out this port.

And now… The asset inventory system can look at the messages and say, oh, there’s IP addresses in use. I wonder what kind of machine this is. It’s using this TCP port number, and it figures out what kind of stuff is on the network based on the network traffic. And the mirror port gives you that traffic.

And the throughput consideration is, I thought, and now I’m not an expert on switches, I assume that modern switches, you would put, they they have ports, 24 ports out the front, and every message that comes in goes onto to a backplane. It’s a very high-speed backplane.

And I thought that the message went to every one of the other ports, and the ports decided, do I send this out or not? And so it would go to the mirror port as well. That’s what I assumed. And so, turning on the mirror port would not, in fact, increase the, you the amount of traffic on the backplane because every message is visible to every port.

But what I didn’t get clarification from from Brian, but what it sounds like is at least some of the switches he’s dealing with, if you enable the mirror port, then the source. if If port A is sending a message to port B, it first puts on on on the backplane address to port B, and a second time puts the same message on the backplane address to the mirror port, because it’s been configured to send everything to the mirror port. And that would tend to double the amount of traffic on the backplane.

But these backplanes are massively high speed because they have to support all of the 24 ports simultaneously. So he’s saying, look, your average backplane is barely loaded and doubling the load is immaterial.

What he did not say was that configuring the switch causes the switch to malfunction. I would imagine ancient switches that were connected were around sort of at the beginning of the concept of mirror ports and and span ports might have defects in their software that if you turn on the mirror port, it might malfunction. But, he didn’t say that. I forgot to ask him. And the fact that he didn’t say it says to me he’s never run into it or, he would have mentioned it. So that’s I’m putting words in his mouth there, but I’m guessing that’s not so much a concern. The concern is throughput. The concern is testing. That’s just, people worry about

Things working the way they’re supposed to if you make a change that has not been anticipated. This is the essence of the engineering change control discipline that is, again, used intensely at at nuclear sites and used, but maybe just a little less intensely at at other critical infrastructure sites. Pause. Pause.

Andrew Ginter
So work with me. In the modern day, you’re saying, the control system vendors don’t get asset inventory. I mean, span ports, mirror ports, they’re also used for intrusion detection systems.

This is what Dragos uses. This is what Nozomi uses. the six pillars of the cybersecurity framework, the NIST framework, include detect, respond, recover. You’ve got to be able to look at what’s happening on the hosts. You’ve got to be able to look at what’s happening on the networks.

Really, the the vendors in the modern day don’t get this.

Brian Derrico
And I credit where it’s due, some do get it better than others.

However, there have been some vendors we’ve worked with that did not want to make any changes because they just wanted to give us the same system that they gave us 20 years ago. with one version, higher than than what we deployed, again, decades in the past.

And, when pressed, while the people on the vendor side are experts in what they are doing, they are experts in safety design, they are experts in PLCs and how all of these things talk together.

They’re not IT people. So when you start talking, hey, I want to open up a span port, it’s different. They don’t understand. They think it’s going to cause an impact to the system. Meanwhile, as people with an IT t background, we can see that, hey, you’re using managed switches. you can enable a span port.

The inputs are 100 meg. And, even if if all of your PLCs are, completely maxing that throughput the back plane of the switch is going to be nowhere near utilization and even doubling that you’re not going to see a decrease and it just it takes a long time to get the vendors on board and again we even offered to to do some testing and show what the utilization changes were

And, we have seen that again with some vendors are better than others. But, I feel like at the end of the day, it’s we just want to give you the same system that you’ve already had. And making changes to that is scary.

And, we’re an isolated system. So, we don’t need to deploy a lot of that technology because we’re just going to stay isolated and and not connected to anything. And the reality is that isn’t as effective either because you While you lose the sort of network attack path, you still have several others, such as physical supply chain and portable media.

So having detection capability is actually, in my opinion, it’s worth the risk of plugging that thing in as long as you have a sound architecture. And that’s where some of the struggles begin with changing sort of that mindset from on the vendor side.

So for example, some of the control system vendors that there’s workstations and stuff there, they understand that, yes, there are detection pieces. You’re going to deploy some level of network intrusion detection.

You’re going to deploy some level of SIEM agent, right?

So I need to send Syslog and we’ve had good luck, and again, with particular vendors there. Some vendors will actually included with their control system, they will also include a security suite.

So they will have their own HIDs, their NIDS, their SIEM, and that’s all included. They have a patching server that distributes Microsoft Quick Fixes and all that stuff. It’s great.

However, when you get to that lower level of your PLC type stuff where, again, we were working with a PLC vendor and they would not budge. They did not want to change their design.

They thought that the switch, there would be a loss in time of communication, which would affect the safety related aspect of the design, and they did not want to budge.

And it took two years for us to to work with them for them to understand that we have requirements and when the programs were implemented specifically across nuclear it was understood that you’re not going to go in and bolt this stuff onto existing systems but when you’re starting fresh when you’re building a system from the ground up it has to have all of these components there is no longer an excuse to say, oh, it’s and <unk> already working. we’re not going to go play around with it. It’s going to that obviously cause issues.

Everything has to be baked in from the ground up. The cybersecurity piece has to be foundational. And again, with the PLC vendors, we found it to be, again, one particular vendor, very difficult.

For us to get that through and it took a number of people, trying to work their, the PLC engineers through why this is, we promise here, here’s some data to back it up.

And they finally did agree to to use the architecture that that we were, we had kind of specified from a design perspective.

Andrew Ginter
So we we sweat blood, we fight with the vendors, we get our asset inventory system deployed, we augment it with with manual inventory for the air-gapped or the isolated networks, and we use it for managing patches and vulnerabilities.

Is there anything else we use it for?

Brian Derrico
Absolutely. To your point, Vulnerability management’s a big one, right? Because I think at the end of the day, your asset inventory is going to give you what your what your risk profile is, what your attack surface is.

Vulnerabilities is one part of that. There is another piece of it that is supply chain, right? So we talked about that a little earlier, being able to understand what are the important devices that I am going to produce procure and procure those with certain sets of requirements. That’s also critical.

Another thing that we would use it for is configuration management. So understanding what is your configuration. You can build tools, you can use tools. That tell you this is the configuration on the device.

And some of those tools out there, some of those network intrusion systems that are OT-centric can also give you alerts and understandings on what is when changes happen. You have a code download to a PLC.

Is that expected? And then also, this is the running code of that PLC, and this is what changed, and you would have visibility into all of that. And again, all based on your asset inventory and having as much information as you can about those assets.

Andrew Ginter
And if we could sort of bring it into the modern world, the, the latest automation systems have a lot of devices and asset inventory counts them. This is great.

But there’s a lot more we need to do with the information. So you’ve talked about patching. There’s a lot of We’ve had people on the show talking about SBOM, software bill of materials, keeping track of sort of embedded software when vulnerabilities are announced.

Is there automation for tracking SBOMs and vulnerabilities and doing the mechanics of patching and patching? Arguably, counting the asset is is the easiest part of managing the inventory.

Is there more in sort of that we can expect of modern tools?

Brian Derrico
I think there is. And, vulnerability management is always going to be one of the most difficult things to conquer because if you don’t have an updated software inventory, you’re never going to know what’s out there. You can do all the Windows patches in the world, but, there are obviously tens and tens of thousands of non-Windows vulnerabilities where if you’re running again, insert whatever software product, right? There are huge vulnerabilities around a lot of those. So can you automate it?

I think it comes down to you can automate the visibility. Right So you can at least understand and have up-to-date dashboards of this these are the devices that you need to worry about. Right This particular device has five critical vulnerabilities. And then that gives your your internal cyber engineers something to go after to mitigate to overall reduce that risk.

I also think it’s important from a business perspective to understand what are we going to do, right? On the IT t side, there’s a lot of patching processes and there’s, SLAs associated with is your, is the vulnerability critical, high, medium, low, et cetera.

On the OT side in general, OT is very adverse to patching and mitigation. And I agree with that in some senses, and I don’t agree with that in other senses. And I think as a business, you guys like you need to understand what is your tolerance for that risk? What are you willing to accept?

And are there areas where, yes, we we’re comfortable, we’re not patching because we have all these controls in place. And in order to get to the device, there’s guns, gates, and guards in the middle of it.

But, but hey, maybe if something really, really, really big comes out, we are going to take care of it. And We do have to come up. So I I don’t think there is a way to fully automate it, but you can at least automate the visibility.

So you don’t have people, just manually searching NVD with a software list that they don’t even know is accurate. You can get that part out of the way. There are tools out there that will help you. And then becomes a business decision and sort of a business process around, with all that information, here is your overall risk profile. What are you going to do about it?

And that that becomes the deeper discussion, again, around what specifically the business is, how much risk tolerance you do have, how much risk avoidance you want to have, and kind of go from there.

Andrew Ginter
Well, Brian, thank you so much for joining us today. Before I let you go, can I ask you, can you sum up for our listeners? What should we take away in in terms of what we’re doing with asset inventory?

Brian Derrico
Absolutely. I would say asset inventory is the most important part of your program, because if you don’t know what assets are out there, you’re never going to be able to protect your organization from somebody that maybe they know what’s out there and you don’t.

So asset inventory is critical. You cannot build upon your internal program without understanding what your attack surface is. I think another point is there are tools to help you.

This is not something that we need to do manually anymore. You do not have to go into cabinets and count every single blinky light. There are tools and you know products out there that will help us get closer to where we want to be.

And then at the end of the day, you still need an internal team that understands what the information coming back is. So if if you you know if you do need help in deploying these tools or selecting tools or understanding what the risk is, I’d be happy to help.

You can connect with me on LinkedIn. Brian Derrico, think I’m the only one. And I can help you with those problems because, again, once we once we conquer assets and get the tools in place, a lot of pieces of the program become a lot easier.

And my goal and what I love is just driving efficiency. So let’s automate, automate, automate, use tools to kind of help us see what we can and just do what we can to protect critical infrastructure.

Nathaniel Nelson
Andrew, that just about concludes your interview with Brian. Do you have any final thoughts about what he talked about there that you can leave our listeners with?

Andrew Ginter
I mean, I think what I took away from here is is, the importance of inventory and the need for automation. I mean, if a modern nuclear generator has, 10,000 plus devices in it that have CPUs in them that have to be managed, that have software that have to be managed, then you know I don’t know that a nuclear generator is that much more heavily instrumented than the average industrial thing. If you buy a steam turbine, it’s a modern turbine is heavily instrumented. If you buy any kind of physical equipment, it’s going to be heavily instrumented. This is you know There’s plus CPUs in a modern automobile.

And that’s, that’s something that fits in your living room. We’re talking about massive installations. I would imagine that a big refinery has as many as 100,000 plus devices if it’s been upgraded recently.

When was the last time you tried to manage a spreadsheet with 10,000 rows in it? When the last time you tried to manage a spreadsheet with 100,000 in it? Just manually counting the blinking lights takes a long time.

Automation to me is is essential. I mean, this is, you look at the NIST cybersecurity framework, sort of the grand compendium of everything that is cyber. What’s the first thing you do? Well, the first thing you do is figure out who’s responsible for the program and you know assign budget and responsibility.

What’s the second thing you do? You take asset inventory. You got to understand what you’re protecting. So, this this all makes sense that you need the inventory and in the modern world, you need automation. There’s no way you can do this anymore manually. So, my thanks to to Brian Derrico and, learn something here.

Nathaniel Nelson
Yes, our thanks to Brian and Andrew, as always, thank you for speaking with me.

It’s always a pleasure. Thank you, Nate.

Nathaniel Nelson
This has been the Industrial Security Podcast from Waterfall. Thanks to everyone out there listening.

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Experience & Challenges Using Asset Inventory Tools – Episode 138 appeared first on Waterfall Security Solutions.

]]>
Needles in Haystacks – Recruiting OT Incident Responders – Episode 137 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/needles-in-haystacks-recruiting-ot-incident-responders-episode-137/ Thu, 13 Feb 2025 10:07:58 +0000 https://waterfall-security.com/?p=31064 OT incident responders need to know a lot. Doug Leece of Enbridge explores what is OT incident response and what do you look for recruiting people into that role.

The post Needles in Haystacks – Recruiting OT Incident Responders – Episode 137 appeared first on Waterfall Security Solutions.

]]>

Needles in Haystacks – Recruiting OT Incident Responders – Episode 137

Industrial incidents can be cyber attacks, or equipment failures, or physical equipment leaking product because of metal fatigue or incorrect welds. OT incident responders need to know a lot. Doug Leece of Enbridge explores what is OT incident response and what do you look for recruiting people into that role.

For more episodes, follow us on:

Share this podcast:

When physical processes are controlled by computers, if there’s a mistake, there’s a physical outcome and people are affected.” – Doug Leece

Transcript of Needles in Haystacks – Recruiting OT Incident Responders | Episode 136

Please note: This transcript was auto-generated and then edited by a person. In the case of any inconsistencies, please refer to the recording as the source.

Nate Nelson
Welcome listeners to the Industrial Security Podcast. My name is Nate Nelson. I’m here with Andrew Ginter, the Vice President of Industrial Security at Waterfall Security Solutions, who’s going to introduce the subject and guest of our show today, Andrew Hario.

Andrew Ginter
I’m very well. Thank you, Nate. Our guest today is Doug Leece. He is a longtime security practitioner. He’s the technical manager of detection and design at Enbridge. And Enbridge, if you’re not familiar, runs what I believe is the world’s largest petrochemical or longest petrochemical liquids pipeline and a very large network of natural gas pipelines as well. So we’re talking oil and gas and Our topic is staffing. It’s finding people who can work you know on cybersecurity in these environments.

Nate Nelson
Then without further ado, here’s your conversation with Doug.

Andrew Ginter
Hello Doug and welcome to the podcast. Before we get started, can I ask you to you know say a few words about yourself and your background and about the good work that you’re doing at Enbridge?

Doug Leece
Oh, thanks for having me on this morning. Uh, yeah, I’ve been actively involved in it and telecom for almost 30 years now. It’s been a while. And because I’ve always been working out of Western Canada, I’m really, uh, acquainted with a number of different oil and gas operations and telecom providers and the, rather adventurous things we had to do in Alberta 20, 30 years ago to get businesses to work. 

And over the last 18 years or so, I’ve been actively involved in cybersecurity as my only job. But when I started doing this, there was no separate cybersecurity discipline. It was just part of being a system administrator. You also took care of the security of your systems.

But like I said, being in Alberta, a number of my customers over the years are oil and gas or electrical producers. And currently I’m at a company called Enbridge, who are the second largest, I believe, oil and gas pipeline company in North America. I don’t represent Enbridge here, but I’m very proud of the work that they do do. And I’m well acquainted with the cybersecurity challenges that that company and another large oil and gas company that I worked for for five years before that are facing every day.

Andrew Ginter
Cool. And our topic is finding people, finding the right kind of people to do OT security for these you know big, important physical processes. At Enbridge, you’ve been doing this kind of recruiting. What does this mean? Who are you looking for?

Doug Leece
Well, I think the first thing you’re looking for is people that understand cybersecurity challenges, but the special fit here is that We’re not, you know, although we have a significant IT infrastructure to support the business itself, we’re not a bank, you know. Our physical processes are controlled by a lot of technology choices and every large, that you know, some people will call them SCADA systems, some people call them DCS, some people just call it OT, but in the end, you’re using a computer to manipulate electricity to turn on big motors and compressors and valves, and you’re also taking measurements from physical processes. 

You know, like a previous place I worked at, they they extracted bitumen from sand with you know chemicals and heat. and you know These are big processes the size of you know giant buildings and all of that stuff’s controlled by computers.

So I’m always curious when we and you know, when we’re talking to somebody about cyber in the physical world, like, what do you know about OT? And, you know, you’re quite right, there’s not very many people that even know what those terms like RTU and PLC mean, but I think there’s even fewer that grasp. It’s controlling the something the size of a jet engine sometimes. 

And what if that’s the wrong instruction? Then what happens? Well, it blows apart. Grasping that physical part of it is is a challenge. And we don’t find too many people that walk in the door with that kind of skill.

But it is something that, you know, we’ve been you working on. As an industry really here in Calgary, we’ve been training for this for probably eight, 10 years, getting people very aware of these processes and what’s going on. And occasionally somebody will put their hand up and say, I find this very interesting and I’d want to learn more. And at that point you invest time in helping them learn.

But a lot of it you can pick up just by reading and you know watching know presentations from I and&L and a few others. So conceptually you get it, but I think the best fit is bring them out to the field and let them see firsthand what’s what’s really going on.

Andrew Ginter
Okay. So it, it, it sounds like you’re saying, uh, it doesn’t matter who you recruit. Anybody you recruit, there’s going to have to be some learning that goes on. It might be, training and might be on the job. so learning. Yes. Let me ask you though. if, if you’re going to train people on the job, what are you selecting for then? If you’re going to teach them what they already, what they need to know?

Doug Leece
That’s a good question. I think one of the first things we we look for is people that are at least familiar with what is what is going on. So if somebody comes to interview you and they don’t even understand the nature of your business and how OT fits into there, you know it’s that’s a problem.

I’m always looking for somebody that’s going to be interested in doing some upfront research and taking some of that initiative on their own. And that’s an indicator that they’re trainable, because everybody’s agreeable in the interview. But, do they have a history or a habit of that? 

um Looking at, we’ve had a number of people hired over the last few years where I’m working and I’ve sat in on a lot of the interviews and one of the things we do is even in the interview we provide a like a pop quiz and a scenario and ask for the answer and it’s not really even where they whether they get the answer it’s the willingness to take that challenge on spur the moment and, come up with something that appears there was some thought behind it.

Even if it’s the wrong path, that’s not as important as art is somebody willing to think on their feet and, change their mindset immediately because in cybersecurity operations, everything’s going along great and two minutes later you’re in the middle of something. 

It happens that fast and especially at the start of it, it’s very unclear what you’re in the middle of. It could be fairly benign or it could be very serious and over the last 20 some years of incident response work, i’ve of I won’t say I’ve seen it all but I’ve seen a lot of different gravity of situations. So are is their head even capable of making that quick pivot and focus on the job?

Nate Nelson
So Andrew, our thoughts on Doug’s process for finding the right kinds of people for industrial security jobs?

Andrew Ginter
Well I don’t hire a lot of technical people. I run a small very small technical team at Waterfall. But you know in the past, not so much cybersecurity, just general development. I mean, I at one point led a large team, 30, 40, 50 people of technical people, a lot of whom were developing products. Actually, some of it was security product. 

Others of it was control system product, product that you know organizations like Enbridge used to automate their pipeline. Millions of lines of code, very complicated. you know I could never figure out pop quiz wise what would be a useful useful pop quiz. like I could never wrap my head around that. I did something different. you know I would ask people if they were interested in something, something technical. What was that? Could they explain to me what they’ve been doing that in that space?

And they you know some of them would would look at me a little bit embarrassed. yeah i Yeah, I write games in my spare time. Really? What kind of games? Well, you know there’s some graphics. There’s some some you know some simulation behind the scenes. It’s multiplayer. There’s communications involved. I’m going, that’s gold. I need all of those skills in my team. you know Or they might say, you know I’ve been doing stuff with, I don’t know, audio editing.

In a sense, it didn’t matter what they were doing. The field was so broad. What we needed was to find people who were interested in something and they could migrate sort of naturally within the organization to tasks, to development tasks that involved the kind of thing they were interested in. 

Why is this useful? Because in my experience, you learn faster, you learn more thoroughly about things that you’re interested in. So it’s really useful to have something that you’re interested in. 

That was my trick for sort of weeding through the applicants, from the people who who really didn’t care what they did all day, every day. And they they turned the whole thing off at five o’clock versus people who actually would sort of grow and expand and and excel in in the job because they loved the piece of it that they were doing that was that was my trick and I think everybody needs something because you know when you’re when you’re hiring you put the job posting out and you know if you’re lucky you get a hundred people applying now you got to reject 99 of them how do you do that it’s just it’s hard

Andrew Ginter
I would hope that there’s a fair pool of people out there who can think on their feet. How hard is it to find the people that you’re looking for? is this you know Do you have lots of candidates to choose from or are you are you digging here?

Doug Leece
I think for the most part we are, which is surprising because you keep reading about the, uh, we as an industry, not we specifically at Enbridge, we as an industry because I’m also involved with Calgary B-Sides and a couple of the local education institutions here. So, uh, like yourself, I talk to students quite regularly.

And without a doubt, it’s the number one question is how do I get into cyber? And my answer is often disappointing for them is like, go get into it first and understand it. Or if you want to do OT cyber, go do some OT fieldwork and learn how to do some of those things. But it’s it’s kind of hard when they’ve already spent a good deal of time trying to navigate a curriculum that says they’re going to be guaranteed a job at the other end.

I think there’s a lot of requirements in the industry for technologists and people who understand how computers work, but every company is interested in hitting the ground running. 

And when you’re bringing in somebody that’s out of school, it’s and they’ve not ever worked in the field i think it’s it’s really an investment on the organization’s part to to make that person you know more uh more useful so to speak and you know it’s not their fault we’ve all started at the beginning and i think when i got into it there was even less people willing to do this so i got the chance but i think it is a I think there is that expectation that you’re going to want to hire people with experience and the people that don’t have experience yet have no way to get it until they get that job. 

And I’m thinking that some of these labor issues are a catch 22 invented by this whole supply demand curve. And there isn’t as much of an entry level way in cyber as people think.

And I’m not sure that’s a bad thing because we are talking about protecting organizations. And in the case of an industrial control system company, literally billions of dollars worth of stuff that is, you know, dangerous to work with and everything. But even if it was a smaller company and it was just their credit cards and HR records, that can still ruin a company. So do you really want a junior person starting there or do you want them starting on the help desk where, there’s a lot of recovery wiggle room?

Andrew Ginter
So if we can, let’s so let’s get specific. I understand that you were recently looking for some, or you know this is what you do, you always look for, I don’t know, OT incident responders. Can I ask you, you know how how does that how does that work? How do you you know How did that work for you?

Let me take a side trip for a second. It’s possible to do some back of the envelope calculations. When I do that, very rough numbers, it seems to me there’s 50 times, five zero times as many IT t security experts in the world as OT security experts. If you put out a call for incident responders, I’m guessing you’re going to get a lot of it respondents how do you deal with that does is there what’s the what’s what’s the difference in terms of what you’re looking for between an it instant responder that presumably there’s lots of them out there and it is responders that might be in short supply.

Doug Leece
Right. They’re definitely in short supply. yeah I still question whether I’m one of those people some days. I think I am. Most people think I am, which is good. But I’ve talked with other people at other companies. And a lot of people don’t put this together, but there’s industrial control systems everywhere. I have a friend of mine that works up at a large airline and they have, he said, five flying skater systems on every plane. It’s like, great, what could go wrong here? 

And absolutely, when, physical processes are controlled by computers, it’s all the same. If there’s a mistake, there’s a physical outcome and people are affected. And if anybody ever answers an interview question like what’s the difference between IT and OT with something as succinct as computers will affect physical processes, I would cancel all the rest of the interviews because that is the problem, but I don’t think we’re very good at articulating that as an industry.

I think the the bigger challenge is that an official OT incident responder and an IT incident responder aren’t necessarily distinguishable on the outset unless you look at their resume and say, well, previously they were a SCADA controls engineer or something like that, but This field doesn’t tend to attract people that are building the equipment, so we’re always kind of an add-on. So far, I only know of one person who was well into the operations side and then moved over to cyber. It tends to be the other way around where cyber folks get interested in OT.

And so we look for people with relatable experience and then train accordingly. Because especially at the start, the the equipment we’re using is exactly the same. A log analytics platform at a bank is exactly the same one that is running in a, in an OT shop. But the difference is what the context of those incidents mean, that computer is experiencing an issue. What’s it it controlling? Is it just a PI historian that nobody cares about? 

Or is it a, an extraction controller of some sort or or a flow computer. So getting that context switch is something you can train for, but if somebody doesn’t understand how to hunt through data and separate operational events that are unusual, but not outside the normal, compared to something like, uh, an actual attack, it’s, it’s not going to be distinguishable.

Um, we, we often start as I’m training people on this area. And it’s worked out well, we’ve had a number of people go through, it’s like one simple question, isn’t it intrusion or not? And if you’re not sure, what’s the first question you would ask to try and start narrowing that down. And so I take more of a binary decision tree approach. And We’ve turned that into a very repeatable process. So we’ve had some good success with that. 

But the trick with that is bringing people that understand the technology on the OT side into the equation. How do I tell these two things apart? And then you start to get into stuff like, was it happening at three in the morning? Yes. Okay. That’s not unusual in an industrial control platform, but it’s outside their normal change windows. Okay. Was there an incident? Where would I go check for that? And then you kind of work your way backwards, right?

So it it takes longer. You certainly don’t have a blinky light on a screen saying, Coker number 47 is on fire. You have a fire system for that, right? So it’s, it’s harder in the digital world to see that.

Nate Nelson
So I know it was a reference in passing and not mathematically accurate as meant to make a point, but you were talking stuck there and you said something to the effect of how there are like 50 to one IT security professionals out there compared to OT. And that also rings with my experience too. I’m wondering, is it that the threats to IT are so much more common that you just end up with so many more IT professionals? Or is there some reason why, relatively speaking, OT struggles to attract talent compared to how many people we need relative to IT, which seems to do a little bit better?

Andrew Ginter
um I think the short answer is I don’t know. I mean, I can speculate. The back of the the of the envelope that that I did was I went to, there’s a thing called Google Trends, and it doesn’t give you hard numbers, but you can put a query in there and it’ll show you sort of interest in the query over time. Who’s searching for that? And so I put in OT security, industrial security, any combination of that as as I could, and then I just put in cybersecurity generally.

And it it won’t give you hard numbers, but it will give you a comparison. And like I said, that tool suggested there were 50 times as many people searching for cybersecurity generally versus industrial cybersecurity, any variation of it specifically. So it was more a measure of interest than of of available talent. So I’ve inferred that there’s a relationship there. To your question,

Are there Are there more attacks on IT? Is there something else going on? I think there’s just a lot more IT infrastructure in the world than OT infrastructure. I’m guessing that the 50 to one is not where it should be. I’m guessing that it reflects sort of today’s interest in the topic. And over the last 15 years, what I’ve observed is that interest in the topic is steadily growing.

so hopefully 10, 15 years from now, it might settle out at a smaller ratio. I don’t know, 20 to one instead of 50 to one. But, it’s a crude, it’s it’s and a very imperfect tool, but it’s something. And, so that’s that’s the number I threw out.

Andrew Ginter
I’ve never been in IT t responsible for a large organization. But in in my understanding, if if I’m in an enterprise security team in in an organization with 100,000 employees, each of which have a desktop computer or a laptop, I’ve got hundreds of thousands of cyber assets I’m managing.

They’re all exposed to the internet. My understanding is that these teams assume constant compromise. They assume we are compromised. They are out there systematically trying to identify the compromised equipment and take a forensic image, erase it, restore from backup, repeat. Constant activity.

In the OT space, I would hope that there’s less to do incident response wise, but your, your OT systems are behind so many layers of defenses that you just don’t see a lot of activity. Uh, in your experience, let me, let me just, and I don’t want to ask you about, about incidents in, in the businesses you’ve worked in, at that’s, that’s confidential. but let me ask you, how hard is it to stay in practice as an OT incident responder?

Doug Leece
I don’t think it’s as hard as people think because there’s plenty of operational events that go on every day. Equipment fails all the time when you’ve got a lot of it. There’s always going to be something that’s not operational and in a widely dispersed environment and or a hostile environment, like you look at something like Fort McMurray in the wintertime, it’s a wonder anything works. But, there’s a small city up there at every every plant where there where they’re doing that work. Enbridge goes across North America, same with Trans Canada.

Like these are big operations and so there are literally thousands and thousands of assets just like you have with the the commercial stuff. So by all means I think hunting for incidents is very important. That’s a very unique skill and kind of hard to find but you’ll often find that equipment is misconfigured or something like that and just through a change, they forgot to change something and and you’ll start picking up events. 

And the number one thing you got to do then is figure out was this as a result of an operational change with but a mistake in it or, a default setting that never got unchecked or something like that versus this is an actual attack.

Because I think what people don’t kind of get about OT security is all you got to do is stop the process and you’ve met the adversarial goal. the In an IT t world, you have to steal some kind of data and then monetize it. But in OT, the minute you’re stopping that process, if the planes can’t launch off of the runway because the air traffic control systems are down, or they can’t load the planes because the baggage is broken. Yeah, all of those things are disrupting the operation and that costs the company money. 

And as a result, you know, your security goal is to maintain availability and a trustworthy process. So instead of confidentiality, integrity and availability, your availability, integrity, and there really isn’t a lot of confidentiality, but there’s enough errors that occur with this complex array of systems that those same detection capabilities go off and you’ll be investigating every day. almost never is it a real attack, but there’s enough events going on. You definitely stay in practice around the investigation processes and the validation.

Andrew Ginter
Okay, so it, correct me if I’m wrong, it sounds like what you’re saying is that your team is not just OT incident response. You’re also the the automation troubleshooters. When something goes weird, is there a separate troubleshooting team in the organizations you work at or are you it? You’re the troubleshooters for OT and, let’s call it, let’s call you, deeply paranoid troubleshooters.

Doug Leece
Absolutely. And what, if you’re not, just because you’re paranoid doesn’t mean they’re not after you. We also assume breach 100%. But the the the difference, I think, is there isn’t one team that does troubleshooting in an industrial control system. There are so many complex parts. There are literally thousands of people working at some of these large companies that I’ve worked at that have various parts of the equation. 

There’s people that only look after wide area networking. There’s people that only look after measurement. There’s people that only look after vibration monitoring, for example. In the pipeline business, it’s leak detection. in In other areas, it’s the integrity of the extraction process. and so There’s literally hundreds of people. We just get a view at tip. And part of what we do is we identify those things and we’ll try and let the appropriate party know, Hey, we saw something.

Maybe maybe it’s an operational related, if it’s not, or yeah or if you can’t explain it, please bring us back in and we’ll will treat this like a cyber attack until. And yeah, we’re deeply paranoid, I think you have to be, because only a sophisticated actor is going to be able to penetrate a a large corporation like here in Calgary. 

I think there’s six or eight fortune 500 companies that are Industrial control system first right and I’ve worked at most of them, but what I’ve seen that’s common across the board is there’s not only a lot of people, they have very sophisticated incident response processes because a lot of things break mechanically or, injury wise and things like that. thankfully a lot less injuries than before, but physics is physics.

Things can still break and we’ve We’re very practiced at responding to incidents. So what I noticed at different companies is they all had a fairly robust incident response process. So, cyber is just one more thing that can go wrong. And so you, when you think it’s a cyber event, you try and inject yourself into that incident response process. And conversely, when something else goes on, we’ll get called in and say, is it cyber? And so we work as a group with certainly not one individual departments responsible for the whole thing.

Andrew Ginter
And I’m thinking a little earlier in the interview, you mentioned a decision process that you had worked out for trying to distinguish between operational failures and deliberate operational failures in terms of cyber attacks. Can you go a little deeper on that? Can you tell us something about what what does that process look like?

Doug Leece
Yeah, sure can. Now, again, I’m not disclosing specifically how my company does it today, but I teach this methodology publicly, occasionally, and I’ve been doing so for about 10, 15 years, so it’s not a secret secret and before it was even a title, we were thinking along this concept of living off the land. Are there are there tools or capabilities that are already there for the attacker that they could use to thwart your behavior?

And when you look at the work coming out of Dragos, they’ve articulated that as insecure by design. The protocol itself will accept the command to shut down the PLC or reset to factory default. And, once they started adding these, kind of payload click paint by numbers ideas into Metasploit, that was a pretty clear sign that, the genie was definitely out of the bottle. So you when the equipment or the, the, the capability is already there, built right into the operating system or built right into the control protocol, you now have to take a step back and look at the context of why that event is occurring. And is there an indication that it’s malicious?

So if we were to look at something like a unusual command going against the PLC, ideally, it would be great if you had a firewall that said that’s not an allowed command in my path. And if it’s an important enough piece of equipment, there you go. But then you should also be looking at all the commands that failed because the attacker’s not gonna get it right the first time. You’re gonna get a couple of warnings. 

So you you have to do similar to a HAZOP or something. You have to kind of walk the process and figure out where things could break. And you look at where where that would be done digitally. And you have to think through what indicators would be that.

And then ideally you do data mining and you go look through, what does it look like now when things are okay? And then you have to work against that process. I get an event. Is this the same account that I see every day doing this event and for the last 30 days,

Yes, that doesn’t protect me against somebody who’s an insider on the payroll of a nation state, but it’s also far less of a credible risk because they’ve been here for for quite some time. So walking that decision tree through, you wind up seeing an event, you look at the attributes of that, think about the context and then you work through what would normal look like? What would abnormal but safe look like? And what’s unexplainable? And when it’s we’re not sure, the answer is no, that’s not normal. You go to kind of the next criteria.

And the minute it looks a little weird, we get other people involved that are experts close to that system. And like we may have something here. So our job number one is not to be the crying wolf department all the time, but if it’s done in good faith, you’re really figuring out, no, this is unusual. Usually they’ll tell you, yeah, we don’t, we hardly ever log in at three in the morning to do this. So yeah, thanks for that. But we had an MI.

So yeah, it’s a yeah when you look at the attacker is going to have to disrupt your equipment the same way that you operate it in order to do any real damage and that’s that’s going to leave some marks and if you’ve instrumented or you’ve got the right observability in that environment you can start to trace through the path and so I tend to take an attack path approach to it and I look at logical steps because you’re 100 right like we don’t None of the major companies out there have their infrastructure set up so that if somebody opens a phishing email, it’s all over. Like that’s, that could be the start of it, but that attacker is going to have to have a lot more steps to get anywhere near a physical destruction of something. And so if we understand that path.

When we’re monitoring those paths, we can look at certain key checkpoints and choke points, have baselines of how stuff works, and work against those things. It’s going to need to be a very patient attacker with an incredible amount of insider knowledge to get through all of that without making a mistake. so You see it every now and again, people talk about something called a home field advantage or the the blue team advantage. We know all the path the attacker doesn’t, so they’re going to make mistakes. And that’s, that’s the idea as you try and monitor for that.

I’m going to respond accordingly, but the minute it looks funny, get help. that’s Take one thing away. That’s it. what normal is, and if it’s not normal, get help.

Andrew Ginter
So Nate, what what struck me in in Doug’s answer there We’re diverging a bit. We’re talking about the process for incident response rather than recruiting incident responders. But the the process tells us something about the kind of person that we that we need, that we’re looking for. What I’m reminded by in the in the description of the process, what struck me was that he’s describing what sounded very similar to what we had Sarah Friedman describe, I don’t know, a few dozen episodes ago, and where she was talking about the book that she and Andrew Bachman wrote. 

The book was Countering Cyber Sabotage, and the subtitle is Consequence-Driven Cyber-Informed Engineering. And the book was about a bunch of stuff. Most of it was about a methodology for risk assessment, and the the heart of that methodology was System of Systems Analysis. Sounds very fancy.

What were they looking for when they’re analyzing these systems? They’re looking for choke points, just like Doug said. And so, what struck me is Doug, someone who’s been doing incident response for a very long time in the oil and gas industry, what struck me is that when When Idaho National Laboratory writes this stuff up, when Sarah Friedman and Andrew Bachman write this stuff up, they’re not making it up. This is stuff people have been doing for a long time. 

This is arguably the right way to do it. It’s it’s arguably the best way to do it. So that just that just rung bells with me going, oh, so we actually can believe what we leave what we read in that book because here’s a man who says, yeah, I’ve been doing that forever. It’s it’s not that you’re making this stuff up. It’s a question of of writing down what leaders in the field have been doing for a long time.

Andrew Ginter
So thanks for that. You’ve touched on this a couple of times throughout the interview here, but but let me ask you outright. I have a lot of people coming to me saying, hey, Andrew, I have shouldn’t shouldn say a lot. I occasionally have people coming to me saying, Andrew, I’d like to get into OT security. How do I do that? What’s your advice to people who are are asking that question?

Doug Leece
ah Yeah, I would love that question. I get it occasionally, but I don’t think a lot of people even know that there’s a giant need for that capability. oh What I would do for sure is I would recommend them recommend to them that they do go get other practical IT experience, whether it’s in maintaining server equipment or a couple of complicated applications that realize utilize databases and workers with interfaces, wide area networking, local networking,

All of the same components that we use to control computers in IT are the same ones that they’re using in OT. The differences are around both the impact and then the service expectations. you can’t just reboot it at will and you can’t just let it not run for the weekend and any upgrade needs to be tested impeccably and ideally on a a staged approach. Like a lot of this operational rigor, yeah you’re not playing with a desktop. You’re playing with a computer that is controlling a very expensive, complex physical environment. So go get experience on computers and networking and application support.

I want to say in a safer environment where there’s fewer physical consequences. And after you’ve got a couple of years of that, it’s a lot easier to make the pitch to say, I want to do something like this in the physical world. I’ve looked around for specific training on this and probably the best stuff out there is coming out of Idaho National Labs and ISA.

And that would be an excellent addition, and they’re reasonably accessible. But there’s also some online training and books and things like that that you can get. There’s a very good book on cyber-informed consequence-driven engineering. And even though that’s a little advanced for how to deliver, the first four chapters will teach you a lot.

There’s another guy I know. In fact, it’s you who’s written three great books on this whole problem. read those. Yeah, like I think studying that, but also getting your hands dirty, working with the technology day in and day out. And I hate to say it, but even just build yourself something that does a little physical process. Like if somebody were to say, I’m working with embedded devices and, software radio and things like that. It’s like that tinkering mindset. That’s somebody that’s going to be a lot more useful in the field.

Andrew Ginter
Well, thank you for the mention of my books. I appreciate that. Let me return the favor. I mean, you are not only an expert OT incident responder. you are also the co-host of the Caffeinated Risk podcast. And yes, I’m interviewing you, but a couple of weeks ago, you interviewed me and I was impressed. You and and your co-host asked me questions that no one else had ever asked me. So can you talk a bit about your podcast? What’s it all about? Cause I, I’m recommending it to, to our listeners as well.

Doug Leece
Oh, well, thank you. Yeah. It was a COVID thing that so I kind of came up with, but I’ve, I’ve known Tim for a long, long time. And we’ve worked at different companies and, a lot of them were industrial control companies. So our, our heads were both kind of there, but I’ve learned over the years that cybersecurity is really about risk management. And it’s funny, I was scrolling around this morning as I’m getting coffee going and, on LinkedIn, resilience is, protection is not feasible at the scales that we work at. So resilience is everything. Oh, you mean like risk management.

And it’s got a new brand with resilience, but businesses have always been running risk. And I think what people have missed in the cyber security equation is no company president or board of directors ever woke up and said, let’s take 30 to $50 million dollars a year and go buy a bunch of computers and apps and do cool things with it. Like that wasn’t their goal. They had a business function that needed to be done. And over time that digital elements fed into it.

And after that, it becomes a target because that’s how you disrupt the business. That’s where the data about your customers is stored. That’s where the effective controls of the product are. so it’s always about crime and money and power and all the same things that have been driving the world for, I don’t know, five, 10,000 years. And risk management has always been part of that equation. how big your army needs to be, how long you’re, how much food you need to store in case they siege your castle to modern things like, the banks obviously were some of the first people involved in cybersecurity because people figured out you could steal money from them. But it’s it’s an evolving field, but it’s fairly immature compared to something like medicine or engineering.

But risk management has been going on since day one. It maybe wasn’t a formalized practice, but they’re, let’s, you fast forward and now it’s got a bunch of different branches and we’re a lot more sophisticated at it. But in the end, it’s still managing the risk to the organization to be successful because nobody ever starts a business hoping they go out of business and waste a lot of money.

And as we digitize, we have to protect that digital capability just the same way we lock the door at the end of the night when you close up shop so that people don’t come in and steal all your stuff. So it’s, it sounds more simplistic, maybe the way I’m explaining it, but we’ve interviewed a lot of different people on that podcast over the years in a lot of different disciplines, definitely some brilliant people like yourselves and others in OT, but also people that are dealing with physical things like buildings catching on fire. We had one episode where they were dealing with drones identifying shooters and all kinds of crazy stuff, but it’s all risk management.

Because you’re always balancing how much you’re going to invest to protect and preserve versus how much of a chance you’re willing to take. Because if it does come to pass, you have enough, money left over financial reserves or safety tolerance that you can repair the damage.

So it’s a, you know. Risk management’s a very interesting field and now it’s branded a little bit more like resilience, but in the end, I can tolerate this level of a cyber intrusion because if it happens, I know I can rebuild it. And you had mentioned at the start, I think we were talking about hundreds of thousands of computers and you take a forensic image and they, not typically, we’ll just pave it and move on. 

Cause there’s nothing on that computer that we care about. So it’s a dumb TV set. All the data is elsewhere. And that’s backed up in a very different, way than an individual desktop. Doesn’t mean we don’t put protection on stuff like that. There’s a lot of great products to do a pretty good job now, but the number one thing was taking away people’s admin rights.

And now there’s not much value to the attacker on that laptop if they do get on kind of thing. But sometimes we’ll take a forensic image of a laptop. Like let’s say the CFO lost their laptop on a plane. And then it comes back. We’re not plugging that back in, but we may just take an image of that one because he didn’t accidentally lose it, right? So yeah, there’s risk management is complicated. any Any of the advanced digital stuff is expensive and time consuming, so it better be worth it.

But there are a number of things that happen every day that you can absorb. Like a lot of companies don’t bother chasing people port scanning the outside of their company anymore because they’re not going to get anywhere. And you would bury people in paperwork, trying to get things shut down with, abuse. Now, somebody comes at you in a denial of service attack. That’s a different story, right? You’ll address that. 

But yeah, individual port scanning, nobody cares anymore. But that used to be a thing. A long time ago, we’d run around, try and block them at a firewall. I was like, yeah, they’ll tire themselves out. There’s nothing there to hit.

So it’s a, it’s a different way to go about it. And I think if I was to look at how do I, how do I want to sum things up, to me, risk bandagement is cyber, we’re just managing that through digital means. And the best value that you can bring to an OT security scenario is understandable security and the IT technologies that are controlling these physical processes. 

And, you know, really be humble enough to accept the gravity that a lot of the people that have been developing and building these very amazing technology driven plants and stuff like that, that they are experts in what they do. And there’s a time to listen and a time to talk, but mostly listen, especially if you’re new to the field.

Andrew Ginter
Before I let you go, you’re a public figure, you’re a podcaster, you’re you’re teaching. If people want to get in touch with you to ask you how to get into OT security, how how would they reach you?

Doug Leece
Uh, well, probably the easiest is to find me on LinkedIn. I’m very bad at immediately hitting the reply, but I definitely go through them a couple times a month and and accept. And I will answer questions through there without a doubt.

And then, you know, here in the here in kind Calgary, Western Canada, like you say, I’m pretty visible. I’m, you know, six three and white hair kind of stick out. And I’m very approachable on this, especially if somebody is is interested in this at all. I think this is such important work that we’re doing. Like I said, I don’t represent Enbridge here. I don’t represent Suncor or any of the other companies I work for, but I’m really proud of the work that we are doing here in Alberta and the education institutions are taking it very seriously. the there’s ah There’s a lot of momentum in this area of securing our way of life that is controlled by a lot of digital stuff. So I’m easily very approachable on this. 

Find me on LinkedIn. and I’ve got a couple things out there online but the other one like you say is caffeinated risk. We have have a website and Doug at caffeinated risk would find me if you if you wanted to send me an email and LinkedIn the other best way to do it.

Nate Nelson
Andrew, that just about concludes your interview with Doug Leece. And as we exit this episode here, I figure in a show about recruiting, some of our listeners will want to know, how do I get a job in the OT industry? So Andrew, how do I get a job in the OT industry? What are recruiters looking for?

Andrew Ginter
Well, what I heard Doug say, and I agree with him, is that if you want to be effective in the world of OT security, you’ve got to understand cybersecurity. You’ve got to understand IT, because a lot of that technology is in the OT space. And you have to understand OT. You have to understand something about engineering, something about the physical process, something about automating the physical process. So you need cybersecurity, you need the IT, you need OT. what I heard Doug say is it’s it’s a hard fit to have someone come straight out of school and drop them straight into OT cybersecurity. He would rather people come straight out of school and do one of the three.

Do some cybersecurity on the IT side, do some server administration on the IT side or telecoms or network stuff to just to learn about those tools and how to apply them to different kinds of problems. Or do something on the engineering side and and learn then about cybersecurity and the other stuff, server administration and so on. So start with something and grow into or get recruited into the space that you’re really interested in. 

Again, my own experience is I love to hire people who are interested in something. If your interest is in OT security and I’ve hired you into any of these other functions, I’m going to work as your manager to give you opportunities to move into the field that that you’re interested in, that’s how you’re going to be the most effective for my organization because you keep naturally learning more about the stuff that you’re interested in. So start somewhere and working in OT security over time is what Doug said. And it it kind of makes sense. it It might be frustrating for people who have come out of the very few OT security programs in the world, but

If you’ve come through one of those programs, I think there’s there’s there’s opportunities for you as well. But maybe maybe it doesn’t hurt for you to grab something related for a couple of years and then move into sort of your your first love as well. So it’s complicated. Sorry.

Nate Nelson
Yeah. Well, thanks to Douglas for speaking with you about this, Andrew. And as always, Andrew, thank you for speaking with me.

Andrew Ginter
It’s always a pleasure. Thank you, Nate.

Nate Nelson
This has been the Industrial Security Podcast from Waterfall. Thanks to every everyone out there listening.

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Needles in Haystacks – Recruiting OT Incident Responders – Episode 137 appeared first on Waterfall Security Solutions.

]]>
Would You Rather Use a Control System That’s Proven Correct? – Episode 136 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/would-you-rather-use-a-control-system-thats-proven-correct-episode-136/ Wed, 12 Feb 2025 10:40:18 +0000 https://waterfall-security.com/?p=31074 Daly Brown and Nick Foubert of Metropolitan Technologies look at a new approach to designing OT systems.

The post Would You Rather Use a Control System That’s Proven Correct? – Episode 136 appeared first on Waterfall Security Solutions.

]]>

Would You Rather Use a Control System That’s Proven Correct? – Episode 136

For safety-critical operations or for critical national infrastructures, would you rather base your system on a code that people have tested as best they can, or would you rather base your system on a platform that has been proven correct? Daly Brown and Nick Foubert of Metropolitan Technologies look at a new approach to designing OT systems.

For more episodes, follow us on:

Share this podcast:

“With digital transformation there’s a lot of possible new cyber threats to the existing infrastructure and architectures of OT networks.” – Daily Brown

Transcript of Would You Rather Use a Control System That’s Proven Correct? | Episode 137

Please note: This transcript was auto-generated and then edited by a person. In the case of any inconsistencies, please refer to the recording as the source.

Nate Nelson
Welcome listeners to the Industrial Security Podcast. My name is Nate Nelson. I’m here with Andrew Ginter, the Vice President of Industrial Security at Waterfall Security Solutions, who’s going to introduce the subject and guest of our show today. Andrew, how’s it going?

Andrew Ginter
I’m very well thank you. Our guests today – we have two of them – are Daily Brown and Nick Foubert. Daily is the CEO. Nick is the chief technology officer, CTO. They are both co-founders of Metropolitan Technologies and they are working on a new and more secure platform, a whole new way of doing industrial control systems.

Nate Nelson
Then with without further ado, let’s jump right into your interview.

Andrew Ginter
Hello, Daly. Hello, Nick. Welcome to the podcast. you know Thank you for joining us. Before we get started, Ken, I ask each of you to tell our listeners a little bit about yourselves, about your background, and about the good work that you’re doing at Metropolitan Technologies.

Daly Brown
Yeah, sounds good. So I guess I’ll start. Thanks for having us on, Andrew. I’m Daly. I’m the co-founder and CEO of Metropolitan Technologies. Just a bit about my background. So I have about 15 years of experience in the aerospace and defense industry as a system and software engineer. Prior to founding our startup, I worked for a big company called General Dynamics Mission Systems, and I had roles such as product owner, technical lead, and senior engineer there.

Daly Brown
I was responsible for design, development, testing, and deployment of various mission-critical applications on airborne platforms. And I also led research collaborations with academia in artificial intelligence, machine learning, target tracking, and information fusion. And I’ll let Nick introduce himself.

Nick Foubert
Yeah. Hi, Andrew. Uh, thanks for having us on the podcast. I’m Nick Fuber. I’m the other co-founder and the CTO of metropolitan technologies. I have a roughly 14 to 15 years of experience in industry as a systems and software developer. And like Daly before founding metropolitan, um, I also worked at general dynamics mission systems as a technical lead and senior software developer.  

I worked on mission critical applications on airborne platforms and Daly. And I actually worked pretty closely together there for four or five years before leaving to start metropolitan. And before general dynamics, I had done some other work in biometric security and biomedical applications of machine learning. So yeah, that’s me.

Daly Brown
Yes, I guess I’ll talk a bit about our startup or I’ll introduce it anyways. So Metropolitan Technologies is an early stage Canadian startup. We’re based in Ottawa, Ontario, Canada. We founded the company to build reliable and secure commercial products based on our experience in the aerospace and defense industry. When we first started the company, our first idea was to build smart city products with a focus on privacy and equity.

And after doing a bit of market research for for a platform to build upon, we didn’t find anything that met yeah actual our actual standards for security, privacy, and reliability. So we decided to build our own. It also became apparent at the time that the market opportunities for our own platform were greater than the smart city applications we first thought to build. So we did a bit of a pivot and to focus our concentration on building up the platform and expand beyond cities to the broader critical infrastructure and industrial security market.

And so consequently, we ended up building a secure by design and default decentralized IoT connectivity and cybersecurity platform to help organizations connect and secure their OT networks. And yeah, so that’s a brief introduction about us.

Andrew Ginter
So thanks for that. And you know you guys are doing some stuff that sounds really interesting. I mean, this is why I i asked you to to to join us on the show. You’ve mentioned Zero Trust and you know IoT, Internet of Things. You’re talking about a platform. you know I know that you’re also touching on stuff like mesh networks and formal methods. It’s a bit of a buzzword soup, but you know if you’re doing this all, I thought, I gotta have these people on. Can you break it down for us? you know You have a product line. What do you have? what What is it? What does it do?

Daly Brown
Yeah, so I’ll start a bit about that. I get carried away actually sometimes with the buzzwords and slogans. I think it’s indoctrinated in me for my time working in the defense industry. I’m pretty sure there’s conversations we actually used to have where we only spoke in acronyms or buzzy slogans. And so old habits die hard, but I’ll try to speak like more of a human so people can understand and be cognizant of it. So like I mentioned in the opening, we’re building a decentralized IoT connectivity and OT cybersecurity platform.

We’re also working on a pre-integrated edge appliance to simplify the integration of our technology with existing OT networks. And so many of the ideas that are built into our platform are based on our experience in defense and aerospace industry. We wanted to combine the resilience and security of tactical battlefield networks and the reliability of safety reability and safety of avionics software that we used to work on. And so it just so happens that equation leads to a parade of buzzwords. And I’ll let Nick maybe go into a bit more about what that means right now.

Nick Foubert
Yeah, so we’re using a number of techniques to build our platform. And I guess these are kind of getting back into buzzwords here, but we can dive into some of them as we continue the conversation. But so things like zero trust, security model, data-centric encryption, formal methods, mesh networking, among other things. We’re using similar types of technologies you might find in battlefield networks in the military.

So one example of that, we’re a software platform, but we’re building our platform to support different networking topologies like mesh networks that you don’t typically find in a traditional enterprise IT network. So our our software components communicate peer to peer and that helps us minimize the amount of centralized infrastructure we need to rely on.

So even when the peers in the network need to communicate with a central service, like a cloud service, for example, and they might need to do that to do things like help discover other peers in the network. Even those more centralized services are designed to be distributed and and tolerant to network outages and network changes.

The data plane in our platform uses a publish-subscribe paradigm. What that means is that our software components don’t need to know specifically which other components they’re communicating with, but rather they just advertise what types of data they can provide and what types of data that they want to consume. And then our software takes care of actually moving the data between the components. This lets us do things like tune quality of service and enforce security controls among a bunch of other benefits.

And the reason we’re building it this way is because we want our platform to be usable in the most challenging industrial environments, whether that’s on a battlefield, deep in a mine, or monitoring some remote asset in the Arctic. So yeah, I think that kind of gives you a high level picture of what we’re doing as far as mesh networking is concerned.

Nate Nelson
Okay. So Daily Just There promised us a parade of buzzwords and they very much followed through. One of them that stood out to me, Andrew, the publish-subscribe paradigm. Do you want to help me out with that one?

Andrew Ginter
Sure. I got sort of two things out of it, MeSH and publish subscribe. Let me start with MeSH first and then I’ll come to PubSub. MeSH is sort of the concept that not everything, I mean, on an IT t network, generally speaking, give or take a firewall, everything can talk to everything. Anything wants to send a message to anything else, you open a connection and there you are with with industrial networks, frequently you have devices in the field, but solar powered. They might not be on the cellular network. They might have sort of a local radio link to an aggregator that’s on the cellular network across blah, blah, blah. It gets complicated.

And so it’s generally not the case that things can talk to each, rather can talk to anything. They can talk to their neighbors and they can pass messages along. And this is the the essence of me mesh networking. You see it used sometimes in meter reading, where not every meter might have a SIM card that lets you on the Internet or not every meter might be wired into something.

And a local community of of smart meters might talk to each other and find the one that has the connection to those the fiber optic backbone and send all of their readings into there. So this this idea of a mesh network where devices cooperate in a challenging communications environment is something you see in sort of limited applications of industrial networks. and These folks at Metropolitan Technology, they want to make this sort of intrinsic. It’s the natural way that everything in their system communicates. and When they communicate,

They don’t make connections like TCP connections. They don’t connect to each other. It’s hard to figure out who to connect to. When they communicate, they just say, here’s what I’ve got. I’ve got meter readings for this address. Here they are. And anybody who wants that information subscribes to it. So sending it out is called publishing. You give it a tag, meter reading dash four dash this address and you push it out. And anyone who wants that subscribes, they say, I want all of the tags that start with meter reading. 

And because this would be the the consumer, the accounting system. So this is the concept of of mesh, this is the concept of publish, subscribe, you don’t connect to things, you just push out what you have and other people, consume it. And this The PubSub is also used in industrial networks. Some, a small number of of big name industrial vendors like 20, maybe even 30 years ago when PubSub just sort of was invented, adopted PubSub wholesale and one or two of the big vendors out there use it internally everywhere.

But even everybody else in the industrial world most of them use Publish Subscribe to talk to the cloud because the MQTT protocol has emerged as the the dominant way to talk to the industrial cloud or the Internet of Things cloud. And MQTT is intrinsically Pub-Sub. So when, I don’t know, a smartwatch talks to the cloud or any smart device talks to the cloud, three times out of four, it’s using MQTT, it’s using Pub-Sub. So these are not alien concepts in industrial automation. But what metropolitan technology has said is, this is the right way to do this. And they’ve made it the default. It is the way their stuff communicates.

Andrew Ginter
So, if if I may, a clarifying question. I heard you use the phrase data plane and I hear people use that phrase from time to time and I’ve never figured out really what it means. In my understanding, in deep history, it it might have come from telecoms where you tended to have maybe two sets of wires, one for communicating the voice communications, the phone calls back 50 years ago, and a separate kind of communications mechanism for communicating metadata like call setup or billing or who knows what. Today, we’re talking the internet. What’s the difference between a data plane and any other plane in the internet if you can?

Daly Brown
Yeah, so I can jump in right here. So we we kind of divide our system up into two different planes, or we call them planes. We call it, one’s a data plane, and one’s a management and control plane. And the reason we differentiate this is because the actual means of communication are slightly different. So when we say our systems decentralized, we mean the data plane of our system decentralized. And the we consider the data plane all the operational technology data. So sensor data, actuator and control data,

Another type of data you would find when when, for example, working with an industrial control system. The management and control plane, we we we consider that things like access control, security policies, remote, the health and monitoring of the actual application, things like that. And so that part of our platform can be centrally managed and locally enforced, but but that’s why we differentiate between the two. And I don’t know, Nick, did you want to jump in there and clarify anything?

Nick Foubert
Yeah, I think you covered most of the points and and we’ll get into a little bit more about our zero trust security model. But I think Daly mentioned our platform is a software platform, but we organize it in two layers as far as the communication infrastructure goes. And we have like an outer layer that kind of provides a level of perimeter security. So there’s an encrypted outer layer.

Nick Foubert
And then the inner layer of that is another separately encrypted layer of data. And that’s just that’s typically what we refer to when when we’re talking about the data plane.

Andrew Ginter
Okay, so so just so I’m clear, like I said, I’m i’m old school. i never i For decades, I’ve wondered what this stuff means. What I’m hearing you say is that in the modern world, it’s more or less all internet protocol at the core, but we’re talking maybe a different set of TCP ports or maybe even UDP ports, different set of protocols for the data plane, which is sort of a collection of protocols and services that are focused on moving the data around or managing the data, and the management plane that is more a set of protocols and services focused on managing the system, configuring the system rather than dealing second by second with the data. Is is that fair in terms of terminology?

Daly Brown
Yeah, I’d say that’s a pretty good way of describing it.

Andrew Ginter
Okay, sweet. Because I’ve always wondered if it’s something much more exotic. So thank you for that.

Daly Brown
Well, you have it right. And it’s a good the example you gave earlier about the wires and the metadata for the telephone system. And then the actual voiceover, the voice part of it is is a pretty good analog to that. So I think that describes it pretty well.

Andrew Ginter
So let’s dig into some of your your your other concepts. So, you’ve you’ve mentioned mesh. you’ve mentioned mesh, you’ve mentioned cloud. You’ve defined a mesh communication system. What are you using it for? Sort of what’s the next layer of of functionality you’re building in?

Daly Brown
Yeah, so let’s maybe talk about the Zero Trust security model of it, because that’ll that’ll describe a bit about the kind of the the shell of how it works, and then we can kind of dive deeper into some of the other technologies that we’re applying to make the system secure. And so i just related to Zero Trust, our platform, we built it from the beginning to have a Zero Trust model. And the idea of relying on something like perimeter security for a software system never sat well with me, even before the term Zero Trust became sort of mainstream.

And so it’s one of the reasons we sought to build our own activity platform is that when we’re doing market research, we found that there’s too much implicit trust in many of the existing solutions. So we built our platform, as Nick mentioned, to consist of two independent security layers, each with their own zero trust security model. The the outer mesh network layer that we’ve built can overlay untrusted and unsecured networks. And so each node in that network is mutually authenticated continuously, whether it’s a service, user, or device. and so This provides broad protection against what we’d call like outside threats to an OT network. 

Then we have an inner peer-to-peer layer that provides data-centric encryption, ensuring that all data in our OT network is accessed on a need-to-know basis. And so this inner layer provides very fine-grained control over who sees what and who can connect to whom, helping protect what we’d say the OT network against insider threats. And so these access control policies are locally enforced at each node in our network,

And this ensures that the zero trust security model is enforced, even if we face network partitions or outages. So we take the idea of zero trust even further than that, actually, further than the conventional definition that includes only users, assets and resources. And we bring it to the actual granular data level so that even within a software process, there is zero trust regarding what data can be read or right read read or written by that software process.

And I’ll just say there’s actually some other practical benefits of our approach to this too, especially at the convergence of IT and OT networks. The outer layer provides like a well-defined perimeter in which to hunt for threats. So nodes in the and the network outside of our our software-defined perimeter, I’ll say, can be considered outside our threats. And we are mostly concerned about preventing sort of like denial-of-service attacks there and those types of of those types of threats. 

Then nodes that inside the perimeter it could be considered insider threats. In addition to this sort of denial of service attacks, we’re concerned about the confidentiality and integrity of that data that’s being passed around. But because of our security model, it makes a problem of intrusion detection easier inside are inside our mesh network. The data centric security part of our system preserves the integrity of the data, even if somehow some sort of node were to be compromised. And so we have a pretty, our defense in depth architecture provides, a lot of, I won’t say guarantees, but as much to the extent as possible, protecting the actual integrity and and of the data that’s being passed around.

Nate Nelson
At this point, I think the term zero trust has been used at least a dozen times in your interview, Andrew. And it always makes me cringe because of how that term is thrown around in IT. Are we using the term zero trust here in the same way that I’m used to it in IT spaces?

Andrew Ginter
Zero Trust has evolved. My original understanding of Zero Trust was basically what you do on the internet. If you want to log in if you want to connect to anything sensitive that that involves money, you have to give a password. You have to have an encrypted connection. That was Zero Trust. you don’t give someone money just because you like their IP address, the way you might trust someone on an IT t network, old school. The modern sort of vision for Zero Trust has evolved into something that’s loosely yeah sort of marketing talk for Active Directory.

If you look at a lot of the zero trust standards that are coming out of NIST, the US National Institute of Standards and Technology, they’re talking about zero trust as single sign on, where instead of sending your username and password around every to every machine, everything you want to do, you sign on once to a zero trust broker. know which is an Active Directory server, and you get back a Kerberos ticket, which is sort of an encrypted thing that represents you and your credentials. 

And now you can go to the print server or you can go to the SAP server and and not have not be challenged for another password. That’s sort of the the thing on IT networks.

What I heard Daly and Nick talking about here was sort of zero trust taken to an extreme, where every message that is exchanged in the system is authenticated somehow, not just every log in, every message. Not just every connection, there are no connections. It’s all published, subscribed. 

So you can do really fine-grained permissions. You can say, these kinds of users have permission to subscribe to these topics, this data that I’m putting out, but not that data that I’m putting out. Every topic can have different permissions. And every message where you exchange a topic and a piece of data has to be signed. And so in a sense, it’s the IT t style of of zero trust, let’s say taken to an extreme.

Andrew Ginter
So thanks for that. So we’ve we’ve talked about mesh, we’re talking about authentication, constant authentication within the mesh. This is, in a sense, the the nature of zero trust. You’ve also, but you I know that you guys touch on formal methods and this drew my attention. I mean, correct me if I’m wrong. Can you tell us, what are you doing with formal methods? 

If you might sort of correct my misconception if there is one. When I hear formal methods, I imagine we’re proving things correct. Now, I know formal methods might actually be a little different from that. Can you talk about, for you, what is formal methods? And what are you applying it to? What’s what’s the goal? What are you achieving with that?

Nick Foubert
Yeah, so in short, you’re you’re you’re right. In essence, formal methods is about proving things correct. So formal methods essentially are rigorous mathematical techniques to specify, analyze, design, implement, or or verify a system.

And I know a lot of people get scared or maybe bored when the topic of math comes up. So I’ll try to keep it more high level here for your listeners. So under the umbrella of formal methods is another concept called formal verification. And that’s that’s where you’re proving the correctness of the system with respect to some formal specification or or property of that system. So and examples of that typically are like safety or security properties.

And traditionally, outside of academia anyways, formal methods have been used mainly in the most safety and security critical systems like like avionics. And that’s mainly due to the expertise and the specialized tools that are needed or or were needed anyways. But we’re starting to see more traction across industry as awareness grows of these tools and and the tools are actually becoming easier to use and to apply. So one example of of their use in industry actually comes from our home province of Ontario, where formal methods were used from the design through the verification of a software-based shutdown system for the Darlington Nuclear Generating Station. 

So I think they spent about a decade working on formal methods, again, across design through verification to ensure that the shutdown system was in fact safe. So there’s many different techniques that fall under the umbrella of formal methods. and today, there’s lots of tools that actually help developers automate those techniques. 

Some of the ones we’re using at Metropolitan include things like static analysis, model checking and automated proof tools. And I’ll dig into these a little bit so your listeners understand a bit what those are. So static analysis is is quite widely known actually in the software development world.

And it essentially consists of automatically checking certain properties of a computer program at compile time. So before you’re actually running it in a test environment or running it in a production environment. So examples of the types of properties that can be checked by static analysis include things like that the programmer who wrote the program isn’t using language features that are potentially unsafe.

Because programming languages in general allow you to do a lot of things with the with the underlying hardware and in safety critical systems, sometimes you don’t want to use that that full feature set because you can introduce errors into the program that can cause safety or security issues. Some other things you can check with static analysis are that well-known program weaknesses or vulnerabilities aren’t actually in the program.

So theres databases that are available publicly that actually list the types of weaknesses and vulnerabilities that are often found in software. And some of these static analysis tools can actually check those databases and check it against and your source code to make sure that the programs aren’t actually implementing those weaknesses or vulnerabilities. 

Also things like linters, which essentially means analysis tools that look at the source code of your program and make sure that they need a certain quality specification. So this is often used to make sure that the the source code can be read, maintained, and updated by somebody other than the original programmer. And this kind of thing is really important in software systems that have to live for quite a long time. So the original developers of the system might not be around anymore.

And you need programmers to make updates or to make fixes to the software. So you want to make sure that they can actually read and maintain that software. So we have tools that help us ensure the quality even of the source code. So another one that I mentioned was model checking. So that refers to automatically and exhaustively checking that certain logical properties of a system are true or false for all reachable states in that system or for some specific state of that system.

And usually we use simplified models of the system, but we ensure that they include the like essential states of that system and and how they might change over time. So in model checking, one type of property you would want to prove is called a safety property. And that’s something that the system should not do, should never do. So examples of that might be like in a financial transaction system, you want to prevent double spending. So someone can’t spend the same money twice simultaneously on different transactions.

In an electronic medical record system, you want to ensure that you’re not leaking private personal data. Or in an industrial control system, you want to make sure that you’re not issuing your system is not issuing a command that could cause physical harm or system damage. And then automated proof tools layer on top of that, and they can do things like automatically prove the absence of any runtime errors in your software implementation.

So most people familiar with software development are aware of software testing, and software developers spend a lot of time writing tests against their software, and that’s great. But software testing cannot be exhaustive, but we do have proof tools that actually can prove conclusively and exhaustively that there are no bugs in your software that will cause runtime errors.

So, and you can prove other things, like specified data dependencies and flows in the program. So you want to ensure that certain software modules data only flows from one to the other and doesn’t leak back out the other way. Or you can prove that a software implementation is correct with respect to like a functional specification. So your customer has some functional specification of what they want the piece of software to do. You can write that specification in a programming language.

And then that same programming language could actually be used to prove that your implementation of that is correct with respect to that specification. So again, typically that’s done with with testing and demonstration to your customers and sometimes by analysis or or inspection of the the code itself. So these proof tools add another level of and assurance that because they can do sound reasoning, you can you can get assurance that your software actually does what the specification wants it to do.

So the last thing I want to say about formal methods is that awareness of formal methods is growing pretty rapidly in industry. So for instance, last year, the White House released a report called Back to the Building Blocks, which is part of the United States national cybersecurity strategy. And it explicitly calls on industry to start adopting formal methods into their software engineering. And if your listeners do a quick Google search, they’ll be able to find examples of how formal methods are being adopted by some of the giants in computing, like Amazon, Google, Nvidia and of course, Metropolitan Technologies.

Andrew Ginter
If I might dumb it down, I mean, if I have a superpower, it’s dumbing things down, sorry. If I might dumb it down, in my understanding, it’s very difficult to apply formal methods to very large software artifacts. I mean, the the Windows operating system is said to have, I don’t know, something like 100 million lines of code in it. A web browser has, I think, more than 10 million lines of code in it.

The industrial control system products I worked on back 20 years ago in my youth were two, three million lines of code. It’s difficult for me to imagine applying formal methods to a body of of of software that large and so in my dim understanding, dumbing it down, we use these techniques on smaller software artifacts or possibly even with a larger artifact with a specific goal. So for example, waterfall produces a unidirectional gateway. Now, we don’t, to my knowledge, I’m i’m not part of the dev team, to my knowledge, we’re not doing formal methods, but we, we have been certified against but common criteria. Common criteria is a kind of certification. 

The way it works is the vendor makes a claim. We claim the hardware is truly unidirectional. It does not matter what you do to the software. It’s not physically possible to send any information back in the other direction. So you make a very specific claim. 

The common criteria tests the system against that claim. In my understanding, it’s analogous you know, correct me if I’m wrong, to to formal methods where you say this is what we’re gonna prove and you state that thing, whatever it is, reasonably simply. It has to be reasonably simple to to have a high degree of confidence in your in your proof. And then you set about using formal methods to establish that property. 

Can I ask you, what properties have you focused on in your use of formal methods? What is it that you believe that your customers or the marketplace are going to want to to to have a high degree of assurance for?

Daly Brown
Yeah, absolutely. So you you make a good point. Formally proving properties of a whole industrial control system or an operating system with millions and millions of lines of code is an enormous undertaking. And so we’re very aware of that. We started with proving the absence of runtime errors of what we identified as critical components of our software. 

Our long-term view is to prove as much as humanly possible that our code has no vulnerabilities. As that means like making a foundation, building a foundation, a software foundation and in libraries, in small building blocks that we formally proven that we could build on top of. And so we we believe that proving at least part of your code is a step in the right direction for security. Is this one of the best techniques available to us for us to reason about software? And so I’ll let Nick elaborate a bit about a couple of focus areas that we’re working on to prove and and where we think that’s valuable.

Nick Foubert
Yeah, to get a little bit more specific. So yeah, we’re focused right now, but essentially in in two areas. Uh, first at the points where our software consumes or ingest data from other systems and where our software produces and publishes data at other systems. So, because interaction between software components is generally governed by protocol and format specification. They can either be standardized or sometimes they’re proprietary.

But most software developers will know that poor input validation, whether that inputs from from a human in in a GUI or from another piece of software, is the source of many vulnerabilities and it’s a common attack vector. So a core part of our platform’s value is in connecting and translating between many different communication protocols and formats. 

So we’re using specification and code generation tools that can prove that our data input and output models will only accept and create valid data, and that those modules themselves are free of runtime errors. so For instance, you can’t bad input data won’t cause a buffer overrun in the software and cause the software to crash. The second area we’re focused on really is our overall software engineering tooling and practice.

So for example, all of our own software is written using the Spark programming language. And just to not confuse your listeners, it’s not the Apache Spark tool, but it’s it’s a programming language that’s been around for for quite a while. It’s part of a subset of what’s known as the Ada programming language, which was originally designed for the United States Department of Defense. 

It’s a mature but modern language designed for the most safety and security critical systems. So using Spark as a programming language gives us a high level of software assurance as a baseline because the language itself was designed for critical systems and it includes a bunch of features that help programmers write error-free programs. But on top of that, it also allows you to progressively apply additional methods to prove critical data flows, program integrity, and functional correctness, things I was talking about earlier.

And so the ability to progressively apply these methods means that you don’t have to fully prove a program or an entire system from the get go. You can focus on your critical components first. So again, in our case, we’re mainly focused on where data comes in and how data goes out, because those are aspects of the system that we have less control over. 

We’re using the higher assurance proof tools on those components first, but we’re building all of our software using this language that’s going to allow us to progressively increase the assurance in areas that we deem to be of higher criticality.

Andrew Ginter
Let me ask you though a hard question. I remember this was maybe close to a decade ago. The SSH protocol, a bunch of mathematicians proved the protocol correct. What does that mean? They proved that if an implementation complies with the protocol, if there’s no defects in the implementation, then the protocol could not leak key information into the internet, into anybody, so that the the keys for the the communication would always be secure. A year later, they broke the protocol, not an implementation.

They broke the protocol. they they they They demonstrated how every compliant implementation of the SSH protocol could be manipulated into leaking the first 14 bits of the key information. How did they do that? It turned out that the mathematical proof proved an assertion. No key information leaked. Proved the assertion at a certain level of abstraction.

What they did was they said, well, we’re using the internet, we’re using TCP, but and they they modeled TCP mathematically as sort of a tube where you stick characters in one end, and they come out the other end either in the same order, the same characters, or the connection is torn down. That’s sort of the that that the assumption, the mathematical model they had of of the TCP protocol. And of course, everyone knows TCP is messages and you can fit multiple characters into a single message. It’s not one character at a time, it’s sort of messages at a time. 

They used a timing attack to prove that every compliant SSH implementation could leak the first 14 bits by taking advantage of information about messages that that are are sent back and forth and the time stamps in those messages.

And so really, they they they attacked the protocol below the level of the proof, but but below that level of abstraction. Can you talk about Can you talk about sort of applying this principle to your system? At what level of abstraction are your proofs what bluntly? Should we believe these proofs?

Daly Brown
Yeah, so you make some good points. Formal methods can be applied at multiple levels. So like you mentioned, at the specification of the protocol, in this case, SSH, you can apply them at the systems level, for example, app proving a distributed system has various properties. And you can apply them at the implementation level. And this is where we are concentrating. But also, like you mentioned, they’re only as good as the specification in which they are proving. So it’s not a panacea.

One of our main assumptions though is the cost of integrating formal methods into our engineering processes are coming down to the point where the benefits outweigh the costs, even for a startup. So even though you might, it’s true that if there’s a flawed assumption in the specification, then even the implementation improving, improving implementation itself against that specification could also have flaws. 

We are human after all writing these specifications. It does though give us the best defense to to the extent possible, that we’re guarding against certain security and and and safety vulnerabilities. and And the tooling is getting better to allow us to identify some of these. And maybe, Nick, you can talk a bit about that.

Nick Foubert
Yeah, so I mean, the the tooling has improved to the point where you can progressively adopt that the techniques of formal methods. But it is best to start as early as possible. So at Metropolitan, we we started right from the beginning, from day zero. And our platform is not fully proven yet, as we mentioned before. But I mean, think about it. Would you rather use a tool that has been proven to be correct with respect to some set of assumptions and where the developers are working on proving more and more of it correct with respect to even more conservative assumptions, or would you rather use something that is just as secure as the human developers can think to make it before they move on to their next task. 

So we don’t use, well sorry, where we don’t use formal verification yet, we cover everything else with automated testing to help ensure the reliability of our platform. And we think this hybrid approach of mixing formal methods on the most critical components first and filling in gaps with automated testing is the most practical approach for us right now.

So I think maybe to get back to the the example you give and just just bring this back up to to a high level, one thing I think is important to bear in mind is that I think adopting formal methods into your engineering process forces you to do a bit of thinking in advance. 

For instance, in the cybersecurity space, your your formal proofs are only going to be as good as the models you’ve developed to eventually develop your software and prove that software correct.

But when you’re developing your model, you need to make sure that you’re accounting for things like your threat model. So there are things there are unknown unknowns in the world, and we have to do some deep thinking at the start of our design to try to capture the full threat landscape as best as we can.

Um, and these tools will help you prove that your software implementation is robust against those threats. But again, like Daly said, it’s not a panacea there again are unknown, unknowns. And sometimes your models don’t account for certain threats that you could not have predicted.

Andrew Ginter
So there’s been some long answers here, Nate. I asked a complicated question. I got a bit of a complicated answer that was very carefully couched saying, well, nothing is ever perfect. We’re not guaranteeing that our stuff is perfect. they had sort of the bottom line buried in a paragraph. I wanted to emphasize, in my mind, the bottom line is this.

When you are looking for a software platform, a technology platform to build an important function on, a safety critical function, a function that’s essential to critical infrastructure, when you’ve got something important to do, you have two choices. You can either use a bunch of software as your foundation that a bunch of developers have worked on and then moved away, did what they could and moved on. 

Or you could use a bunch of software that has been proven correct under a bunch of assumptions against a bunch of threats in light of a bunch of of contingencies. And the development team continues to prove the thing correct and evolve it to become more correct against more threats and and more conditions.

Which would you rather? The one that people kind of do what they do and move on? Or the one where you’re determinedly proving it against a bigger and bigger body of of potential gotchas? I’d rather use the platform that’s been proven correct. No, it’s not perfect, but it sure is a big step in the right direction is what it sounds like to me.

Andrew Ginter
What you’re building is, in a sense, a platform. It is software that other developers can use to develop industrial control systems. And when you have sort of infrastructure like that, in my experience of the marketplace, in what vendors I’ve worked for, you tend to see programming platforms adopted by vendors who are building industrial control systems when there’s sort of a compelling need. The compelling need might be the threat environment changes. I don’t know. a gazille A gazillion Stuxnet’s hit everybody next year. 

It might be that there is a new kind of application, I don’t know, smart car chargers or something that demand a new way of doing things. Or, it, it, it might be that it solves a long standing industry problem. And the whole industry looks at it and says, that’s the right way to solve this problem. And all of the new development switches to the new platform.

You know, Java was a little bit like that. Can I ask you, how’s it going in terms of adoption? Do you see a triggering event? Do you see a new industry? Do you see a killer app for this platform that you’re producing?

Daly Brown
I’ll say that, the digital transformation of industry, is, is happening. And so, historically, a lot of these OT networks, industrial control systems, et cetera, have been isolated and they’ve been off the internet and for valid reasons, for cybersecurity and other reasons as well. But there’s, there’s new requirements coming out and, and I think it’s, you can’t ignore the fact that Increasingly, 

OT networks are becoming connected to the internet, and and there’s reasons people want to do this. know Compliance with new cybersecurity requirements, asset management, so remote monitoring and and management of all the assets in the network, applications like predictive maintenance become possible. And so with this digital transformation, though, there’s a lot of new like threat cyber threats possible to to the existing infrastructure and architectures of of these OT networks.

And so in addition to that, there’s incoming macro triggers and and one, for example, could be quantum computers and the threat of quantum computers against traditional cryptography. And so having a platform that can address some of these emerging requirements, connected OT networks, and some of the existing vulnerabilities of the other solutions that exist today, I think is valuable.

And so we’re trying to address that. And at the same time, we’re also cognizant and sensitive to to being as non-disruptive as possible to the existing networks. Because we know people, organizations buy these and they expect to operate their their networks, their OT devices for decades. And so the the sales cycle and and the lifetime of these of these devices and and systems is very long. And so we have a platform, but we also have a means of less disruptive integration of our technologies, and we’ve kind of alluded it to it earlier, and we’ll talk a bit a bit more about this in a bit, about having it pre-integrated on an edge appliance where you can just sit in front of an OT network to get a lot of the benefits that we’ve talked about yeah without having before having to fully disrupt the current operations of the OT environment. And so to that point, yeah, I think there’s triggers coming, and I think there’s there’s value in our platform moving forward, and there’s ways of getting the benefits of it without being very disruptive to the existing networks and systems.

Andrew Ginter
You folks are a startup. You’ve got a bunch of stuff that you’re done. You’ve got a bunch of stuff that that you’re doing. How’s it coming? Uh, have you, is there, is there adoption? Is there technology? how are things going?

Daly Brown
Yeah, so as a startup founder, it’s a roller coaster. But it’s rewarding that you’re building a product that you think will make a difference, especially in an industry that has such an impact on people’s day-to-day lives. And so in terms of where we’re at, we’re doing ongoing customer discoveries. so We’re talking to industrial control system vendors. We’re talking to operational technology operators. We’re making sure we provide a solution that’s desirable and feasible and trying to best position ourselves in the market. We’re also building partnerships with industries. so These include multinational system integrators, security companies, and other technology partnerships to go to market with. And Nick, you want to talk a bit about the R&D stuff we’re doing in the piloting?

Nick Foubert
Yeah, so we’re still in the research and development and piloting phase of our product right now. We have a beta release that’s actually out in the wild in a controlled test environment, and that allows us to rapidly iterate and test our platform. We’re working towards what you’d call maybe a version one release later this year, probably in the fourth quarter. 

We’re also working on a pre-integrated edge appliance that can sit in your OT network just in front of a device like a bump in the wire to provide a non as non disruptive as possible integration of our edge technology. And we feel like this is the path of least resistance to getting our technology deployed in the most critical of infrastructures where people tend to be a lot more risk averse.

Andrew Ginter
And so that all makes sense. this has been, this has been great. I’m, I love learning stuff, thank you for this, but this is in a sense so different from what I do every day. I’m not even sure I’ve asked you the right questions. So let me ask you an open question. what else do you want to talk about? What have I missed? What didn’t I ask you that I should have?

Daly Brown
Yeah, actually, that’s a good question. And there’s a really cool pilot project that we’re working on. So we’re working on a quantum state version of our platform, specifically for industrial control systems. And we’re using the DNP3 ecosystem, which is a pretty standard protocol used in utilities, as the first use case for this new configuration of our platform. And we’re ensuring the protocol is secure against existing and emerging threats, such as quantum computers.

It’s a very exciting project and we’re working with really bleeding edge security technologies and we’re integrating a brand new state of the art cryptography, which has been independently proven to have information theoretical security. And so what that means is it’s as a system that’s secure against adversaries with unlimited computing resources and time, such as a quantum computer. And I just want to clarify, this is not the same thing as post quantum cryptography, which has been quite a bit in the news lately and which NIST has recently standardized and also which OT operators will be expected to adopt in the future and which we also actually also support. 

But it’s actually using a different type of key distribution technology altogether. And so we’re we’re part of a consortium of a bunch of world-class companies and universities delivering this capability. And I’m just going to shout out our partners. And so it’s Thales Digital Identity tallli digital identity identity Services, which is a group from the Thales multinational french company, Quantum Bridge, which is a Canadian startup, and the University of Toronto. And funding has been contributed by one of Canada’s most prestigious funds as well. And there’s actually going to be a public announcement in the next few weeks about the project.

Andrew Ginter
Well, Nick Daley, this has been educational. I love episodes where I learn something. Before we let you go, can can I ask you, can you sum up for us? What so what what should we be be thinking about, learning about in this space?

Nick Foubert
Yeah, thanks a lot for having us, Andrew. This has been a great experience. So I guess what I’ll end off saying, though I might be preaching to the converted, is that cybersecurity shouldn’t be an afterthought, especially in critical infrastructure systems. These systems are essential to our day-to-day life. And I think that that we, as in the general public, often take their reliability for granted. It should be table stakes that cybersecurity is intrinsic in the development of any operational technology. And we take that very seriously when we say that we are secure by design and default. I don’t know, Daly, if you want to wrap it up.

Daly Brown
Yeah, so I’ll just say, the vision of our company is to be the digital backbone of the world’s critical infrastructure. And we don’t consider ourselves like a traditional cybersecurity company. We’re a connectivity company that takes cybersecurity seriously. And we aim to market a product that’s easy to integrate and to secure from the ground up, allowing organizations to reap the full benefits of their digital transformation and at the same time increase the resilience of their infrastructure. 

So I’ll just end by inviting all the listeners to connect with us on LinkedIn or send us an email to schedule a demo or just chat some more about the technology we’re building. And we’re always looking to collaborate, partner, or pilot our technologies with other organizations. So we hope that what we’ve discussed resonates with some of the listeners out there, and we can continue this conversation. And so thanks again for having us, Andrew. And we’d love to come back on the podcast in the future to catch up. And that’s it.

Nate Nelson
Andrew, that just about concludes your interview with Daily Brown and Nick Foubert from Metropolitan Technologies. Do you want to take us out now with a final word for our listeners?

Andrew Ginter
Sure. I love episodes like this where I learn stuff and I’ve heard of formal methods for a long time and they slowly are making are making inroads in different industries. I was keenly interested to see how how these folks were using it in the industrial control system space. To me, the the challenge and in in the in the interview here, it’s clear that that Nick and Daily understand the challenge. The challenge business-wise with this kind of endeavor is that you’re not selling the platform to end users, okay, to power companies. Power companies don’t buy this kind of platform because as much as possible, power companies really try hard to avoid writing code. They wanna buy stuff, not write stuff themselves. You gotta sell this stuff to people who write a lot of code.

So know who in the industrial space is writing a lot of code right now? Well, to me, the huge opportunity is renewables. It’s taking what the oil and gas sector that is being transformed, taking the electric sector that’s being transformed, there’s a lot of new code being written, not just existing control systems that have a new feature or six. We’re talking brand new stuff for electric vehicle, high speed chargers and load balancers within the grid for the high speed chargers, a whole bunch of new code being written. 

To me, that’s that’s an opportunity. These developers, these businesses who write in that code are are looking around for the platforms they’re going to use. Is it the same old or is there something new and better? Because when you start the process, that’s the the huge opportunity for embedding a new platform and a new way of thinking about it. So that that sector strikes me as as ripe for innovation like this. And it’s lovely to see that there’s options like this in the marketplace. We’ll we’ll have to see how they shake out over time.

Nate Nelson
Well, thanks to Daly and Nick for elucidating all that. Andrew, thank you for speaking with me.

Andrew Ginter
It’s always a pleasure. Thank you, Nate.

Nate Nelson
This has been the Industrial Security Podcast from Waterfall. Thanks to everyone out there listening.

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Would You Rather Use a Control System That’s Proven Correct? – Episode 136 appeared first on Waterfall Security Solutions.

]]>
How to Embed 30 Years of Security Funding into Capital Budgets – Episode 135 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/how-to-embed-30-years-of-security-funding-into-capital-budgets-episode-135/ Sun, 09 Feb 2025 09:50:33 +0000 https://waterfall-security.com/?p=30934 Looking for Security Funding for Capital Budgets? Ian Fleming of Deloitte explains how we can embed up to 20 or 30 years of cybersecurity budget into capital plans, rather than fight for budget every year.

The post How to Embed 30 Years of Security Funding into Capital Budgets – Episode 135 appeared first on Waterfall Security Solutions.

]]>

How to Embed 30 Years of Security Funding into Capital Budgets – Episode 135

Most of us struggle to get funding for industrial cybersecurity. Ian Fleming of Deloitte explains how - because cybersecurity is essential to sustaining the value of industrial assets - how we can embed up to 20 or 30 years of cybersecurity budget into capital plans, rather than fight for budget every year.

For more episodes, follow us on:

Share this podcast:

“Budgeting for OT cybersecurity shouldn’t be an afterthought for a capital project. Trying to integrate it into the life of the physical asset, I think is key.” – Ian Fleming

Transcript of How to Embed 30 Years of Security Funding into Capital Budgets | Episode 135

Please note: This transcript was auto-generated and then edited by a person. In the case of any inconsistencies, please refer to the recording as the source.

Nathaniel Nelson
Welcome listeners to the Industrial Security Podcast. My name is Nate Nelson. I’m here with Andrew Ginter, the Vice President of Industrial Security at Waterfall Security Solutions, who’s going to introduce the subject and guest of our show today. Andrew, how are you?

Andrew Ginter
I’m very well, thank you, Nate. Our guest today is Ian Fleming. He is a solutions architect for OT, industrial control systems and cyber physical solutions at Deloitte. And today we’re going to be talking about how the money flows. We’re going to be talking about working the numbers, arranging the budget so that there is in fact budget for industrial security.

Nathaniel Nelson
Then without further ado, your interview with Ian Fleming.

Andrew Ginter
Hello, Ian, and welcome to the podcast. Before we get started, can I ask you to please introduce yourself and, you know, say a few words about the good work that you’re doing at Deloitte?

Ian Fleming
Yeah. Hello, Andrew. Thanks for having me. My name is Ian Fleming. I lead cybersecurity efforts with operational technologies at Deloitte. My team really focuses on helping organizations secure their industrial control systems, like building automation and physical infrastructure systems that are typically overlooked when it comes to cybersecurity prior to Deloitte, I worked for really heavily in power. I did a lot of operational technology. Cyber was involved in a lot of NERC SIP work actually enabled a lot of some of the vulnerabilities that we’re we’re trying to patch today. So I feel like I’ve come into the consulting side to pay penance for what I’ve done in industry.

Lately Deloitte I’ve been working on integrating security as part of a core operations, especially in in, in industries and areas of government civil. Where the line between physical assets and cyber assets is becoming increasingly blurred, we also work to make sure our clients can effectively manage risk related to these systems and just proper alignment between security investments with business goals. It’s good to be here.

Andrew Ginter
And our topic today is budget, you know, shaking the money loose, managing the money. We don’t get any anything done in most businesses unless there’s a budget to get it done. And we’re going to talk about sort of the OT security budget, the industrial security budget. But can we start with IT? I mean, do IT teams have the same struggle for budget that that we observe in the OT world?

Ian Fleming
That’s a good place to start. Mean IT teams do face their challenges with budgets, but they’re often more straightforward nowadays when compared to OT. I think in IT, cybersecurity costs are generally tied to a business process or a system that the top, you know, top floor of the office typically understands. Pretty clear. But often like cloud based solutions where information is an asset, they’re easier to finance and frankly, it does work more from a top down of the organization. It initially couldn’t get funding. They’ve been able to really structure their sales pitch towards. You know. Real business goals, which is a great, you know, it’s something that OT. I I you’d think it would be easy to for them to describe it, but they top floor tends to just throw money at those problems whenever things break versus IT where they see it more as a strategic advantage. If you move data between say cloud provisor cloud providers, you’re doing upgrades of infrastructure relatively easy. In it, you can handle the issues in a more agile way. At the same time, it has been rapidly transitioning from company owned data centres which were once inside of a a office building to to cloud based. More operational expense type models where logical security nowadays we refer to it as security as code. It automates much much of the security work in it. Now these models do allow IT teams to dynamically shift their resources and manage security through software which works really well in environments where assets are entirely virtual and easy to scale. And that’s the reason why operational expenses have really exploded in it. But let’s look at the other side like an OT where my clients are working in and where I’m focusing some of my time at Deloitte, we’re dealing with physical assets like machines and sensors, industrial equipment where failures mean real world space and time consequence.

IT goes beyond just the information, it’s it’s physical stoppage of production. So the problem is also compounded by the fact that IT often has to compete with the physical maintenance budget for operations, which typically isn’t really seeing much in IT, especially with the advent of cloud and everybody in IT moving that direction. As far as physical capital projects like industrial automation systems or infrastructure, they’re they are also fundamentally different. Most of the projects in OT are architected, designed and budgeted and financed over really long life cycles like 20 year life cycles before a refresh. When a capital project such as you know physical infrastructures initiated all costs, including materials, labour, maintenance, think of building a building, or heck, even just renovating your kitchen in your house, they’re budgeted upfront and financing is typically secured through like a large one time capital expenditure.

Andrew Ginter
So Nate, you know we’re talking about budgets here. A lot of our listeners, I’m guessing, are like me and have sort of a limited understanding of of accounting and budgets. I mean, we tend to be focused on bits and bytes and buffer overflows and you know crypto systems. So let me let me give you just a little bit of background here. you know When I started the episode, I had sort of a a small business owner’s understanding of accounting and budgeting here. you know I’ve operated my own small business from time to time. And when you know when I operated my own business, there’s you know there’s two kinds of expenses. There’s what’s called capital expenses and operating expenses. If you buy, let’s say, a delivery truck for a delivery business, the the the truck you know, hat is going to deliver value to you. You’re going to use the truck for like a decade. And so the government generally requires you to declare that large expense as a capital investment.

Which means, you know, I always thought it was sort of a liability to to declare that because I would have to, you know, What I’d like to do is reduce the amount that I pay in taxes. And so if I could claim the entire cost of the truck against my revenues that year, as a small business owner, as a sole proprietor, I would pay less taxes. The government says, no, no, you can’t do that. You have to you know assume a lifespan of three or 10 years or something for the truck, and you can only claim a fraction of the expense against your taxes and reduce your taxes slowly over time because you are the the you know the asset is reducing in value over time.

Andrew Ginter
Expenses like gasoline that you use up you know that day or you know the the over the course of the next week, you can claim the entire amount of the expense against your your your income. You can reduce your taxes. This is sort of the the naive model I had of of capital expenses versus operating expenses. You can claim all of operating expenses right away. It turns out that in big business, claiming capital costs over a period of time, let’s say the delivery truck over 10 years is an advantage because bit you know big business wants to show a profit every year, wants to control their expenses every year, control the expenses that they claim. And so if they have to buy you know a fleet of trucks, a thousand trucks in a particular year, and they’re going to last 10 years, then they don’t want to show that they have negative profit in the year that they had to make that, you know in the year that the money left the business, because it left the business that year to buy the thousand trucks. They want to show that, you know to to account for that expense over the the the life of the asset, the trucks, so that they can show a consistent profit.

So, you know this is, sort of capital versus operating is is different in small business versus large business. And you know in heavy industry, which is you know industrial security. We’re all about industrial here. In heavy industry, there tends to be extreme pressure to reduce operating expenses. When you build a mine, you invest, I don’t know, $3 billion dollars in you know before the first shovel full of ore you know with with gold or whatever in it comes out of the mine. You invest a massive amount. This is your capital investment.

And once you’ve made that massive investment, generally you’re under pressure to minimize the cost of operating that asset over the course of the next 30 years because you’re producing a commodity. you know Even gold is a commodity and you know you sell the gold at the world price for gold. Gold is interchangeable. Nobody cares if it’s your gold or somebody else’s gold. You’re fighting with every other gold mine on the planet to produce gold.

and you know even gold gets more expensive every year to produce as the the supply diminishes, to produce gold you know at a price that will that will show you a profit. So, operating expenses are always under extreme pressure in heavy industry and they they capitalize their investments. So, that’s sort of, accounting 101, when I came into this, I have learned from Ian. So, i’m I’m thinking, let’s go back to Ian and and learn you know the mistakes i’ve just I’ve just explained to you and sort of the naive understanding of accounting.

Andrew Ginter
So thanks for that. You know, reflecting on what you just said, the thing that that I think I caught was that. There’s roughly two kinds of budget there’s capital expenses and operating expenses. You know, in the OT world, everybody wants to minimize operating expenses and you know capital is is kind of what it is in the IT world. I think I heard you say that everything is becoming operationalized, meaning it’s all going into the OpEx budget, but you’re saying that in, you know, capital budgets are still really important in the OT space is, is that the key difference here between between these two spaces? Is is the budgets?

Ian Fleming
Well, I think that’s a it’s a really good question and it has been something that I’ve been struggling with, like how to operationalize an OT cybersecurity program when. It’s being funded through what like I was talking about earlier, typically on it is more of an operational expense budget. You don’t really tie the ongoing maintenance of a computer system that’s anticipated to run for five years on a capital expense. It’s like replacing Oracle or a sales force application. Be a CapEx. Unless of course, you’re buying all the software as a service. See those lines have have been. Grade, but because those physical assets do have a long lifespan and the security investments are typically, and when I say security, it’s also availability of those assets are are tied to those those physical assets. So whether it’s built into CapEx or drawn down over time, it needs to be sustainable from a resourcing perspective.

Like for instance in in power I worked in power systems for several years. Power delivery and distribution. We had a financial metric called tier meant. It meant timed interest, earned ratio and a CFO and a prior life taught me about this because I had no idea how to tie like a cybersecurity. A tool that was that was designed to protect an operational asset. So the tier measures a company’s ability to meet its debt obligations by comparing its income before interest and taxes to the interest and expenses on its debts. So basic. The life cycle of that asset, you wouldn’t be under the water, you know, underwater on your loan. So the tier ratio can indicate whether your organization has that profitability from that asset that’s operational to cover its debt obligations and ongoing operational cost. When I figured that out with the CFO and this is several decades ago, I was like, OK, that’s how I’m going to tie my cyber security program to a specific a very specific operational asset. And when I say operational assets, it’s it’s it has a a physical, a cyber physical component to it.

That actually helped me budget long-term OT cyber security measures towards the asset and that’s some of the work that I’ve been doing here at Deloitte is tying that by by getting it down at the low level like how is this asset being budgeted and financed in order to. Convince somebody to take on the risk of installing it and owning it. But but, but also trying to influence the cybersecurity metrics into that asset to where the OpEx, the, the, the cost, the ongoing cost of protecting that asset from cybersecurity is also encompassed inside that operational the, the, the, I’m sorry, the capital expense of that asset.

Andrew Ginter
OK, so so you know TIER, you talked about tying costs and interest to income. So when you say that you’re tying cybersecurity to a an asset, we’re talking about an asset. Like you know, in a power plant, a generating unit, not an asset that generates revenue, not like a bolt or a PLC that represents only an expense is is that the kind of is that the the the sort of size and class of asset that you’re tying cybersecurity?

Ian Fleming
Well, cybersecurity can be tied to any single component or group of components inside of the power plant. I like to think of the system itself. I do a lot of model based systems engineering at at at Deloitte as well, and we don’t typically look at each individual component as as being completely autonomous from the process that it’s designed. To you know, to operate. So it would, it would be all the entire system, I mean, the whole idea of doing a capital improvement or capital. Project is to account for also the you know the financial risk. You know of of doing the investment or or performing the investment on the asset, but also reducing the you know proper engineering to reduce the total cost of ownership of that asset. If cybersecurity isn’t tied in. To those models, it makes it very difficult to not just bolt on because it’s being design. Mind, without cybersecurity in mind, but like for your example, a PLC.

If a PLC is designed inside of a power plant, let’s just use that as an example, and there’s no cybersecurity maintenance tied to that as part of the the model for financial keeping. Keep keeping that that asset functioning, it’s going to make make it very difficult in the future. Over years or even an adjustment to a threat or a risk. To find financing for that. And and when you then you’re running into the patching problems, right? You got to go through design assessments and everything all over again. However, if if a a device like a PLC was engineered and designed in that system, knowing that it had to accommodate a 20 year life cycle, and there will be. Times that that they’ll have to be system systematic updates and upgrades due to either compliance regulatory which is really difficult to plan for, but you you know for a fact that the equipment itself is probably. He is probably going to be replaced over time. I did one project for a client regarding a tunnel and that was one of their transportation tunnel. And they were extremely concerned about that because they knew that the technology was going to improve over time. So as part of the Capital improvement project, it was a 50 year life. People.

Creating a budget for for cyber security improvements and functional improvements over time, instead of creating another capital project in the future, it was just built into the maintenance of that capital asset.

Andrew Ginter
OK, so so it you know you’re saying that we need when when there’s a capital project that’s the time not just you know? Lots of people say it’s you you need to build cyber security into your stuff beforehand, not afterwards. It’s always more expensive afterwards. What you’re saying sort of in addition is that you have to build the cybersecurity budget into the capital budget. That at least that’s that’s what I’m hearing. You know, have I got that right. And you know, if I may you, you’ve been working, you, you you mentioned with with building automation. You know when you. When people try to tie the the you know. To to make that tie. How’s that working in sort of in in the parts of the the industry that you’re working with?

Ian Fleming
Sure. And I do work a lot in, in government with you know, a lot of government facilities, those types of things. When it comes to building automation systems or HVAC lighting. Heck, even even water treatment systems. It it’s clear that. That cybersecurity is an is an afterthought in these systems we go in. The there’s not a really clear. Point of reference for even what assets are on the network and we are. Having. To delve into like IT tools just to determine what physical inventory is out there.

And again, it goes back to the whole an IT data is the asset, it’s easier to justify protecting the data because you can move it. If there’s a failure but an OT such as HVAC systems, refrigeration and those types of systems, food processing and plant goes down, you’re not just losing data, you’re you’re risking the the physical assets themselves, sport, spoiled food damage machinery comes in the challenge that physical operations are always under pressure to reduce those operation. Expensive and cybersecurity, seen as an extra cost rather than a central part of keeping that system running safely and being available. Ironically, the way I feel about it is just working in OT versus IT it it a lot like how cybersecurity was reviewed in the early to mid 1990s. We didn’t really have cybersecurity budgets back then. Everybody was just looking at like IT as operations. I just need the information and the product was more important than keeping it secure and I feel like a lot, a lot of these OT systems.

So. Just building automation that don’t really have the cybersecurity component. To it, if we if we look at the way they’re budgeted. And the way that they’re they’re brought online as a capital investment and you you design in that cyber security component to it, whether it be in contract or through supply chain. You know that is what sets the budget. That’s what. That’s what gives us the big wins in integrating security as a core part of operations, particularly in industries where there’s that vague line between where cyber can control or impact those. Assets I mentioned the tunnel earlier, that’s the a great example we recently worked on a tunnel maintenance project. They had to address. They wanted us to address cyber security as a as as a priority. They basically made us. Cyber physical commissioning agents. So any type of PLC or logic controller that was touching an Ethernet network or had some kind of routable protocol that was creating some sort of. Function inside this this structure, this infrastructure they they wanted us to to look at that from a not only a design perspective because knowing what we’ve seen with TPS that are happening today and in the past how they can how we can make those cyber components more modular. To where we know we’re going to have to upgrade, say, passive network monitoring. Well, maybe we’re doing passive network monitoring today, but in the future we might want to do active monitoring just using that as an example, just designing those hooks in. To where in the future would require a massive heavy lift it it’s akin to, you know, having a spare tire or or some sort of designed resiliency built in for cyber security purposes on an operational system.

Andrew Ginter
so Let me chime in here, Nate. This is sort of my learning curve as as I went through the episode. you know Start with IT. t One of the points that Ian made was that almost everything is becoming operational costs in IT. you know in in In years past, 20 years ago, if I bought a laptop as part of my small business, I would have to you know claim that as a capital expense. And I could only claim a third of the cost of the laptop every year. And I had to keep track of it for three years. you know To me, it was annoying. But again, to big business, they they like capitalizing things. It normalizes their profits. In the IT space, though, today, you know increasing the the the in many jurisdictions, if you buy a laptop for $1,500, you just claim the thing right then and there.

It’s not it’s not worth capitalizing. It’s not big enough to to drag out the accounting over three years. If you buy a server farm at a cost of $50 million, dollars you know you still are going to and and you expect a life of five years out of the server farm, you’re you’re still expected to capitalize that. The thing is almost nobody does that anymore. People don’t have you know A lot of businesses don’t have their own server farms anymore. They’re renting the farms from someone else out of the cloud. And the rent comes out of the operating budget, not the capital budget because they’re someone else owns the asset. You can’t capitalize somebody else’s asset. So you don’t have big capital expenses in IT anymore.

When you apply that principle naively in OT you wind up fighting for capital or sorry for operating budget every year and you lose sometimes and cybersecurity sort of falls by the wayside and we have all these problems and this is what we’re trying to solve. the The insight here is that what you want to do is associate the cybersecurity cost with the asset that you’re protecting and the asset is not the computer, the asset is the the generating unit or the tunnel or you know a physical asset. To me, that’s counterintuitive. It’s an ongoing expense every year, yet it’s part of the capital plan, the capital budget for the asset. Why does that make sense?

And you know he didn’t quite say it in this many words, but in in chatting with him, you know he gave the example of a tunnel and maintenance. them I mean, what what do you maintain in a tunnel? There’s equipment in a tunnel. you’ve got to blow if In a long tunnel, you’ve got to put air down there, or you know over time, all you’re left with is CO2 and nobody has anything to breathe, especially if you’re driving through the thing. You have to drain water out of there. If the tunnel is low enough to be below the water table, you really need strong pumps if the water, if the tunnel is is under a body of water or under a river. So you’ve got a lot of equipment in these tunnels.

And what he’s saying is that the cost of maintaining the equipment is part of the capital budget. And I’m going, really? And he says, yeah, the reason for that is because the asset that pumps the yeah for for the water, the the blowers for the air. The value of the asset depends on correctly maintaining that equipment. If you don’t maintain the equipment, the the value of the asset declines. You can’t use the asset anymore or the equipment wears out faster than it’s supposed to. It’s supposed to last 20 years. It only lasts four years because you never maintained it. And so the the maintenance cost is an ongoing cost every year, but it’s part of the capital budget, because it’s essential to the asset. And what he’s saying is that in the modern world, if you want to protect these the automation that you know controls the equipment that’s essential to your asset, that cybersecurity protection should be part of the assets budget, not part of your you know cut to the bone operating budget, which was you know which was news to me. So this is this is sort of the theme going forward.

Andrew Ginter
OK, so so you know what I’m hearing is that we need to build cyber security, ongoing costs into capital plans. It sounds contradictory. You know, capital sounds like one time and and operational, you know, cybersecurity is ongoing, you know, is this is this new, is this something that there’s there’s? Precedent for in in the OT space already.

Ian Fleming
Oh, absolutely. That’s a that’s a really good. Point. I mean, that’s most OT systems are designed and with the under capital to to account for operational expense over the life of that asset like it’s just these are you know contrarian example of what happened with with Al Equipo OT breach. That the water facility out in Pennsylvania, it’s a great example of consequences, you know, potential consequences of cyber security in these types of OT environments. These these water treatment plants. And water utilities, if it’s not properly integrated into long term financial planning. And and life cycle management and in the case I’ll equipped like remote access was added to a PLC that PLC was exploited led to a beach. And you know if we look at this you know it’s pretty obvious that. There was a functional upgrade requirement. They wanted to be able to remotely manage this PLC if.  Was managed if if that if that functional improvement to that capital asset was managed as a CapEx project instead of an operational improvement like an OpEx budget because IT? Just adds you know. Remote control or interactive remote access as a day by day function for for regular maintenance of of information technology system.

But if it was designed and built into the system from the very beginning as part of the overall project cost, the change would have been memorialized in documentation. There would have been a change to an as built of the function of that system, the architecture engineer, the system integrator, all the people that was involved in the original design. The system could have included in the initial setup of the interactive remote access feature. That they wanted a long term security strategy that embedded that function into the life cycle of the asset they could. Have. Also modularized that cybersecurity function for planned replacement as as new remote access protocols came out, finance might also account for that expected life of the asset. And if the cost was too much. What the risk appetite was low and say no, this isn’t worth it. At least you’d have some sort of document that that was showing what the cybersecurity expenses over that asset life cycle was going to be, you could have accelerated depreciation of that asset. It would have been more of a financial and a risk management decision versus a hey, we need to enable interactive mode access on this on this machine or on this with this logic controller. Now it makes it a lot easier to enforce cyber security policies and just general operations policies and adjust to new standards while maintaining existing protections without having to worry about annual budget constraints.

If, say, there’s a bridge, there’s two ways of bridge that you want to you want to put more load on it. There’s two ways to to do it. You could just overload the bridge by changing out the weight limit sign right, or you. You obviously have to recreate the structure and reinforce the base of that structure to carry the additional load. In operational technologies, it’s pretty clear that that’s very unsafe to do in information technology. It’s not because there’s not an intrinsic tie between the OT system. And the context of operations that that system is operating under and that the physical component, it’s just like, OK, we’re just installing interactive remote access here. So if a project is is budgeted through a capital expense, it’s going through like a, a, a long term plan of how long that assets supposed to last and how it’s supposed to be maintained. It shouldn’t be an OpEx budget that we’re we’re adding more IT features to it without taking into context what that system was supposed to be used for and if we’re circumventing any of the controls by adding IT based cybersecurity and.

Interact, you know, feature sets to that asset, I feel. Andrew, that’s where most most of you know my past life I’ve gone wrong is taking the IT approach which you know, hey, it’s a VPN, it’s it’s encrypted, there’s nothing wrong. But I’m not really looking at the operational context that that I’m that should be. The attention that should be given to the operational context of the asset that I’m modifying.

Does that? Does that make sense? I guess I’m. I’m I’m trying to tie that OpEx to the CapEx budget and the asset, the long term asset and I’ve seen this over and over again, it has been a pattern without using too many examples from clients that I’ve worked with. But those were most of the problems, if you’re you’re modifying code. In a virtual environment, there’s very little physical consequence to that. But when you’re when you’re doing it to an operational asset, it’s very, very different constant set of consequences.

Andrew Ginter
OK. So so let’s assume we can get cybersecurity costs for the life of the asset built into the capital plan for the improvement, whatever it is. UM. You’ve got those costs built into the the plan up front? How do you manage that financially? How do you how do you pull money out of that over time and and what happens if you you run out of the money that you’ve budgeted or you know you know because?

Costs have gone up, or what? You know what happens if you if you use the physical asset, not 20 years, you use it for 30 years and you haven’t got the number in there that you know is gonna you can draw down for is it is it like a fixed number that you’re drawing down and you have to guess right with the number or how does that work?

Ian Fleming
So yeah, the maintenance, the maintenance cost for you know, I’m not suggesting they need to be. Like it’s all going to be CapEx, but if OpEx, I’m sorry, it’s all going to be CapEx. Maintenance is going to be an operational expense over the lifetime of the asset. However, if if there’s not a what I’m advocating for is cybersecurity, being part of the CapEx plan, so.

Think of designing any type of physical asset you’re going to have components that are made to be pulled out and replaced like conveyor belts. There’s a maintenance plan for that asset. Now what you just described there is a problem. It arises when, like the TCO, the total cost of ownership metric of financial metric remains static and doesn’t account for either business growth added, functions demands you know, asset improvements, those types of things over time. For instance, we would install. It’s the the whole overloading the bridge. We wouldn’t replace just by moving the weight limit size. We have to reinforce that structure itself because it’s a it’s a safe, it’s a safety issue. Tanking without equip a a water, the TCO will have to be. Dynamic when it’s in the in the operational expense side, has to adapt to the evolving functional demands of the asset and including the threat landscape of cybersecurity. But the CapEx part, the capital expense, it reduces the operational expense. Considerably. If you plan for those systems to be replaced. Time you might have to accelerate the depreciation of a life cycle or the the acceleration of that asset.

You know, replace versus fix. If you don’t build into the the model, the componentry that needs to be replaced over time so. I hear what you’re saying. I mean, you kind of threw me a an interesting one there on like, well, it has to be dynamic. It’s not all all. I just hope I’m. I’m. I’m being clear that I’m not. I’m not. Advocating for the full. Operational technology security of an OT. That to be fully CapEx, the problem that I’ve seen is when people when when asset owners deploy assets without even without even taking into account for security concerns during the development and the financing of that capital asset, think of it this way, it’s usually commissioned. 1st and then we go buy a product and call it, you know, cyber security vendor. A and we try to force force it on top of that asset and more. A better approach would be hey, we need to bring cyber security in on this. Let’s look at the model of the system, figure out where the the more significant and risks are, and design the system to account for a cybersecurity. Over the long lifespan of the asset it does, it does create issues because it doesn’t usually think that way. Remember, they’re mostly capital. I mean there’s they’re mostly operational. You know if if if Azure comes out with something tomorrow. They’ll shift over to it. If you make a decision today with a capital expense, you have to be able to live with that. With that with that solution for a specific period of time. Based on that, based on your maintenance. Budget. Just just like. You know, if a you know a high OpEx type component fails on a on a truck, you’re you’re going to replace it just to keep the capital asset alive. But there’s better ways to deal with it than just continually raising that operational expense over time. I hope I’m being clear on that, that I I I’m not advocating for the entire OT cybersecurity budget to be 100% in the capital expense or the. Capital expense of that asset, it’s just OT cyber needs to place the table to influence the design of that OT asset.

Andrew Ginter
Okay, so so let me chime in here. Again, in sort of my learning curve, there’s a difference between a capital expense and a capital plan. A capital expense is one where you spend, I don’t know, $3 billion dollars over the course of eight months, and then you reap the benefits of that over the next 30 years because you’ve built a mine, you’ve you know built a a power plant, you’ve built something.

That’s a capital expense. You spend the money once. A capital plan is setting money aside in future budgets, in my understanding, setting money aside in future budgets to deal with that asset. You’ve made a capital investment. You can’t just spend the money and expect the thing to run. You’ve got to maintain this stuff. You’ve got to secure it. You’ve got to operate it. All of those costs are built into a plan for the asset.

And from time to time, the financial people have to reevaluate that plan. So for example, let’s say, you know, we’ve just put a solar farm in and, you know, we’ve got I don’t know, lithium batteries that we’re using to to store the power for the farm for for you know overnight use. And these batteries wear out every, I don’t know, three years and have to be replaced. And the the life of the solar farm is expected to be 20 years. If the price of lithium batteries shoots through the roof,

The cost of maintaining this asset has now shot through the roof. are are the the The numbers we put together saying the asset is going to pay for itself in 20 years don’t work anymore. There may be a point where we say, you know we’re going to shut this down and you know wait for three years and see if the price of lithium comes back to normal. or you know We’re just going to shut it down and get rid of it. it’s just It doesn’t work anymore because you’re reevaluating the capital plan for that asset. and you know In a sense, you might have the same thing with cybersecurity. It’s not like you’ve put maintenance money in a bank account to be drawn down over 20 years. It’s not like you put cybersecurity money in a bank account to be drawn down out of 20 years and you might run out of money. That’s not how it works. It’s part of the capital plan.

And if there’s a sudden change or a permanent change in your expenses, for for example, a new regulation comes down that makes cybersecurity for this asset much, much more expensive than it used to be so expensive that you know the asset was only performing marginally to begin with.

And now we’ve tipped it over and it’s just not profitable anymore. We might choose to shut the asset down. That’s part of, in my understanding, that’s part of the capital plan for the asset that that needs to be reevaluated in light of current conditions. It’s not part of the capital budget. The you know the capital expense happened when you built the asset, but the plan persists. That’s that’s my limited understanding here of of of of how this works.

Nathaniel Nelson
You know The more we talk about long-term capital plans and 20-year timelines and these these amortized cybersecurity budgets, are we then accounting for patching and upgrading legacy systems over these many-year timelines?

Andrew Ginter
ah Yeah, I mean, I did not ask Ian that question, but yeah I think what what springs to mind is patching. you know Legacy systems, legacy automation, 20-year-old automation, because that’s how long the power plant lasts. you know We put automation in in place for that.

The question you know question is, should should money not have been set aside to upgrade the automation? And the answer is yes. If you need to upgrade the automation to reap the benefits out of the asset, then you have to budget for that. But when we’re talking cybersecurity, I mean, part of the problem I think is that it’s an afterthought. but you you know Even if you plan up front and you look at a system and say, well, I’m going to take it down every five years for a for maintenance, for essential maintenance, and that’s the opportunity to upgrade everything. And you know what do I do in between? Well, there’s new vulnerabilities a week after we turn the asset back on. you know Can we patch those things?

I think that comes down, I’m guessing it comes down you know partly to is it in the plan, but partly as well just cost benefit. If you can put compensating measures in like strong network segmentation or you know device encryption or if you can put a compensating measure in that achieves the security objective and is cheaper than the really expensive patching process because of all the engineering that’s involved

Maybe you should use the compensating measures, not you know because you have no other choice, but because you’ve rationally looked at costs and benefits and said, it’s way cheaper to use compensating measures than it is to try and keep this you know the the software up to date week by week as as new vulnerabilities are announced. so that’s Again, I didn’t ask Ian this, but you know applying the principles he’s laid out, that that’s kind of what makes sense to me.

Nathaniel Nelson
And the other question I had, as as Mike Tyson says, everybody has a plan until you get punched in the mouth. When you have a very long-term cybersecurity plan in place, how do you account for all of the ways in which your needs are going to change and the threat landscape out there is going to change in unpredictable ways left and right?

Andrew Ginter
And that’s a good question. And I think that’s the difference between sort of a capital expense and a capital or an asset plan. you know An expense happens one time. The plan is something that lives for the life of the asset. And as conditions change, you know the cost of lithium changes, the the threat environment changes, the plan might have to be reevaluated. Regulations change. You might have to reevaluate your plan. But that’s sort of part of the answer. A second part of the answer is engineers tend to be heavily involved in asset plans because they’re designing the asset and they’re the ones that have to design the asset to deliver the value over a 10, 20, 30 year period. And so engineers are are heavily involved. And this is, I think, why the engineering community that that I see majority of them, it’s not universal, but a majority of them are really embracing cyber-informed engineering because this is an upfront process that shows them how to subtly change their designs upfront in ways to just take certain entire classes of risks off the table. you know the The threat of a cyber attack causing a massive boiler to blow up in your face, you can take that off the table with a mechanical overpressure relief valve.

You can take other kinds of threats off the table by subtly changing the design of your network, so the design of your automation. and These changes, in a sense, are are permanent. They take those classes of threat off the table permanently. That simplifies long-term planning. so you know They’re embracing CIE and you know the the asset plan is something that’s reevaluated periodically over the life of the asset.

And you know, new conditions about the cost of maintenance, the cost of security, the the need for security, you know, the cost of insurance. All of these conditions are built into the periodic reevaluations of the asset plan. You don’t have to get it perfectly right 20 years in advance.

Andrew Ginter
It does make sense. I mean, you know what what I’m hearing is that, you know. We’ve had lots of guests on on the show over the course of a 100 episodes talking about, you know, building cybersecurity into technical plans for the the the management of of automation assets. What I’m hearing you say is that. You know, it’s not one number. It’s not one time. It’s that cybersecurity budgeting needs to be part is what I’m hearing, needs to be part of the the ongoing budgeting and capital and asset management process that you know, large organizations have. It. Is that what you’re saying?

Ian Fleming
Well, that that is the intent of of asset management in an operational construct, right? I mean it’s it’s about influencing the budget or influencing the books on on inventory that you have. On the shelf, that’s where. Really good asset management forecasting come into play even from an OT or a cyber perspective. It just feels like there’s a disconnect there because of the financing method and the way that things are operating with cloud and virtual. Virtual software that it’s not not operating inside of a data centre.

More, but we need to be realistic about how long these assets will last and how long it will cost to maintain their security. A really good parallel can be drawn from the history of maritime insurance in this story and the the shipping industry I’ve been working with the MTS Isaac lately, so I got a really good crash course on how the shipping industry vessels are classified based on build quality, ongoing maintenance which directly impacts their insurance. Premiums, actually, it’s one of the oldest, I think was one of the first insurance companies that came to out of existence with the maritime. So for instance, ships that receive high classification rating from a society that classifies the building rating like given A1 rating from the Lloyds of London. It indicates a vessel is a very high quality construction, well maintained. They’re also from MTSISAC. They’re they’re even. Tying cybersecurity rating systems into vessels, which I thought was fascinating at the last MTSISAC I went to.

This actually is is built just to lower or maintain or just put some sort of a marker on what the expected insurance premium will be because the higher that rating, the lower the insurance premium would be. Conversely the ships of the lower classification ratings from the society. Or those that fail to maintain their rating will have higher premiums or they’ll be considered out of class. This. Which is uninsurable. So the same principle, if it would apply to OT cyber if the asset outlived its original budgeted timeline or cybersecurity cost increase due to the threat of regulatory landscape, the the organization should have that process in place to reevaluate that cybersecurity posture much. Much like how the ship’s classification ratings would be reassessed overtime if this asset loses its high rating because of neglected security or added features that we’re taking into it, you know, bolted on over time, the organization would face increased risk. Higher cost for maintaining and and I’m sorry for for mitigating those risks and not maintaining that asset.

Andrew Ginter
Cool. more than I thought I was going to learn about finance, so thank you for that. Can I? Can I ask you an open question? You know, you’ve been doing this for a while. What else should we know? What? What? What? Am I not smart enough to ask you about here?

Ian Fleming
Ohh, you know the the hard part, I think waterfall I go, I go far back with you guys in in prior lives working in power and I did like the the approach with the data diodes and and things like one thing that that opened my eyes working. With waterfall on other projects in in my prior lives with, with utilities and and an industry. Is the importance of the collaboration between an IT leader and those operations people that are in the field working on things and including that finance team? I think having that cybersecurity built into CapEx, it’s not easy. It’s a hard thing to describe. I think I’ve done a. A pretty horrible job of trying to drive it here today, but it does require that clear communications about the risks, benefits, long term cost saving.

And I do feel like if if if we can explore this deeper, I hear a lot of the leaders, business leaders saying the same thing there. There’s this disconnect between what’s valuable and IT cybersecurity those metrics or those KPIs, you know the. Number of vulnerabilities that we’re searching for, or a number of threats that were thwarted and it’s disconnected from like actual production or, you know, just just maintaining that business relevance with cybersecurity.

I feel like. Cybersecurity. Just in in, in general is is more like quality and engineering the the longer I’ve been in the industry and because I’m finding myself focusing more on how to articulate. The problem in financial terms and using historical references to tie all this stuff together, it’s not really about the Whiz Bang latest and greatest vulnerability or attack. While those are sensationalized. It’s really about how do we sustain and and how do we adapt and as a cybersecurity practice and specifically in in operational technology and not even specifically just in cybersecurity in general.

How we can look at this differently and how we can describe it differently to get the attention that that the asset deserves and in our profession, how we can make things better? So. I don’t know if that answered your question, but this has been something really top of mind for me for a while. It’s I wish I could tell you all the things that I’m involved in there. We we actually do hear, but the ones that I did bring up during this call were published and. Either the Wall Street Journal or or other other places that that got some national attention put in for some awards. So it’s just kind of a I’m just hope that we can challenge everybody here to think a little bit differently about the cybersecurity problem and how itcan. How cybersecurity as a practice can address some of the some of the problems in our industry that we serve.

Andrew Ginter
Thank you for joining us. Before I let you go, can you can you, you know, take us through the highlights. What what are the key takeaways from from you know our discussion here.

Ian Fleming
Yeah, sure, Andrew. You know the key takeaways. That I have. Just three, really. There’s one OT cybersecurity is fundamentally different from IT, mainly because it. Deals. With those physical assets that can’t be moved to the cloud can’t be replaced easily. Or shifted. And the second one is budgeting for OT cybersecurity shouldn’t be an afterthought for a capital project. Trying to integrate it into the physical, the life of the physical asset, I think is key. That’s what’s going to keep. Your. Budgeted over the life of. That asset and the third. Try to seek out collaboration across it, not just inside your you know the IT circles, but also the operations people that are designing ENA firms and include finance. So I think that’s. CFOs, I think that’s really essential for the long term success of cyber security program. You have to have a resourcing plan on that. Resourcing usually starts at finance. It’s how everything gets gets. For. It’s maintained overtime and if you’re struggling to secure that funding for those cyber don’t, don’t, don’t fight for OpEx every year. Try to try to work design work to design that cyber maintenance. Into modulars for those modules for those capital projects from the start. It’s really a smarter way to secure your operations in a safer way to fund your ongoing maintenance of a physical operational asset over the the life over its operational life cycle.

Nathaniel Nelson
Andrew, that was your interview with Ian Fleming. Do you have any final words to take us out with today?

Andrew Ginter
Yeah, I mean, I i learned something here i’m about sort of financing for big business. You know, I learned that that accounting for big capital expenses, accounting for those expenses over time is actually a benefit. It stabilizes your profits. And I learned that you know large assets tend to have a capital plan that associates critical recurring expenses like maintenance and insurance and cybersecurity, couples those expenses to the asset. So you don’t have to fight for those allocations every year. You know you either spend the money or you retire the asset. They’re part of the asset.

I also learned that you know you kind of have to speak the financial language to make this happen. You’ve got to be able to communicate with the the people who manage the budgets. You’ve got to be able to talk about assets and depreciation and management and maintenance. you know Use that language to to work cybersecurity into that that equation and you know The lesson is if if you can get cybersecurity into the asset plan, then you know You’re going to have an easier time of managing cybersecurity and other sort of operational, essential operational outlays for that asset over over the life of the asset.

And Ian didn’t mention it, but he’s on LinkedIn. you know he He has a lot of papers on this topic, and you know he does more general cybersecurity stuff. This is just a piece of what he does. He’s got papers on that, other stuff. If you’re interested in digging deeper on on these or other sort of cybersecurity topics, there’s a whole OT section at the Deloitte website, and you can just connect Ian Fleming on LinkedIn at Deloitte, and he’ll he’ll be happy to point you to his you know that his writing and you know help you dig deeper into the topic.

Nathaniel Nelson
Well, thanks to Ian for speaking with you, Andrew. And Andrew, as always, thank you for speaking with me.

Andrew Ginter
It’s always a pleasure. Thank you, Nate.

Nathaniel Nelson
This has been the Industrial Security Podcast from Waterfall. Thanks to everyone out there listening.

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post How to Embed 30 Years of Security Funding into Capital Budgets – Episode 135 appeared first on Waterfall Security Solutions.

]]>
Insights into Nation State Threats – Podcast Episode 134 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/insights-into-nation-state-threats-episode-134/ Wed, 18 Dec 2024 11:04:48 +0000 https://waterfall-security.com/?p=29619 Nation state threats are often portrayed as the "irresistible forces" of cyber threats, with little qualification. Joseph Price of Deloitte joins us to dig deeper - what are nation states capable of, what are they up to, and how should we interpret the information that is available to the public?

The post Insights into Nation State Threats – Podcast Episode 134 appeared first on Waterfall Security Solutions.

]]>

Insights into Nation State Threats – Podcast Episode 134

Nation state threats are often portrayed as the "irresistible forces" of cyber threats, with little qualification. Joseph Price of Deloitte joins us to dig deeper - what are nation states capable of, what are they up to, and how should we interpret the information that is available to the public?

For more episodes, follow us on:

Share this podcast:

“…We can’t just sit idly by and say…’well, the worst thing we’ve seen is XYZ’…That does not necessarily mean that’s the limit to the imagination and capability of nation states…”

                                              -Joseph Price

About Joseph Price

Joseph PriceJoseph Price is a seasoned cybersecurity professional with over 26 years of experience spanning leadership, strategic operations, program management, software and hardware product development, offensive and defensive cyber operations planning and execution, threat hunting, and incident response in both IT and ICS/SCADA environments. He is currently a Senior Manager/Specialist Leader at Deloitte in Idaho Falls, Idaho, where he focuses on delivering value to government and public service customers in ICS/OT cybersecurity to make the world safer and more resilient. He leads a team of professionals in providing products and services to protect and defend ICS/OT/IoT/IIoT systems across various industries, helping organizations manage and mitigate risk.

Prior to joining Deloitte, Joseph held various leadership roles at Idaho National Laboratory, including Manager of Advanced Programs, Deputy Director of the Critical Infrastructure Protection Division, and Program Manager for Cyber Security R&D. He has also served in the U.S. Air Force, notably as Chief of Weapons and Tactics for the 67th Information Operations Wing and Flight Commander of the 33rd Information Operations Squadron.

About Deloitte

Deloitte is one of the “Big Four” accounting firms and a global leader in professional services, offering expertise in audit, consulting, tax, and advisory services. Deloitte Cyber Risk specializes in areas such as cyber strategy, threat intelligence, risk management, incident response, and managed security services. By leveraging advanced technologies like artificial intelligence, machine learning, and cloud security solutions, Deloitte empowers clients to proactively identify vulnerabilities, mitigate threats, and recover swiftly from cyber incidents.

Transcript of Insights into Nation State Threats | Episode 134

Please note: This transcript was auto-generated and then edited by a person. In the case of any inconsistencies, please refer to the recording as the source.

Nathaniel Nelson
Welcome listeners to the Industrial Security Podcast. My name is Nate Nelson. I’m here with Andrew Ginter, the Vice President of Industrial Security at Waterfall Security Solutions, who’s going to introduce the subject and guest of our show today. Andrew, how are you?

Andrew Ginter
I’m very well. Thank you, Nate. Our guest today is Joseph Price. He is a senior manager and the program lead for the OT cybersecurity program at Deloitte. And our topic is nation states, more or less. the The word credibility comes to mind. How worried should we be? I mean, how likely are is the is the average site to be the target of a nation state grade attack? This is the the kind of thing that Joseph is an expert on.

Nathaniel Nelson
Then without further ado, here’s your interview with Joseph.

Andrew Ginter
Hello, Joseph, and welcome to the podcast. Before we get started, can I ask you to say a few words of introduction? Please tell us a bit about your background and about the good work that you’re doing at Deloitte.

Joseph Price
Sure. Thank you very much, Andrew, for having me on. followed you and it’s exciting to be be a part of your podcast. So thanks for this opportunity. My name is Joseph Price. I go by Joseph and I’m zeroing in on about 30 years of being in cyber. I started back in the mid 90s with what we called information warfare. We didn’t use the term cyber back then as an active duty military officer in the Air Force I spent about four years defending networks in various places around the world, and then I switched over into the offensive cyber side of the things I don’t get to talk a lot about that, obviously because details are are not things we can discuss openly. But I will tell you this, the one thing we’ve spending 16 years in that community is I didn’t just learn about how we conduct offensive operations, but how other nations and other groups and organizations can conduct offensive operations and really what they can do, whether we’ve seen it, mentioned in the news or not. So I enjoyed about 20 years total working for the Department of Defence in various caps.

And after that I moved here to Idaho Falls ID where I now live. I joined Idaho National Laboratory and was the deputy director for Critical Infrastructure Protection there. And then three years ago, I shifted over to Deloitte and Touche or just Deloitte if you prefer. And I’m a senior manager there and the program lead for our OT cybersecurity program. So I helped develop our capabilities and service offerings and deliver them to our clients who have OT systems. To help them secure and protect and create more resilient. Architectures that’s supporting their OT systems, so that’s where I focus now and it’s a pleasure to be here.

Andrew Ginter
hacker computerAnd the world needs more OT security, so thanks for that. Nation states is our topic and we read about nation state threats in the news. I’m I work for a vendor. I go to a lot of these face to face conferences. I hear a lot of vendor pitches. I’m sorry, a lot of vendors get up there and wave the nation state threat flag and, fear, uncertainty and doubt. the the sky is falling, the sky is falling. We’re all going to die. And yet, here we are. you being on the inside without stepping on on, anything you’re. Not allowed to tell us how. Accurate is the the news? How really what’s going on behind the scenes? How? How worried should we be?

Joseph Price
That’s a great question. I think in the absence of details and information, a lot of times people just make presumptions about what a nation state might do. In terms of capability, nation states don’t tend to just be opportunity. There’s certain amount of opportunistic elements to any campaign, but they’re not just necessarily saying, ohh let’s see what we can find. Often actions are deliberate. Now the problem we have is we don’t necessarily know what they might target. So we might talk about a few examples or ideas around. Some things we’ve seen recently in the news, but for most processes, it’s a deliberate it’s a deliberate activity. Nation states have the resources they have access to talent. They have the patience to do things. So in many ways we might conclude that they’re 10 foot. Tall and bulletproof. Now, that’s not entirely true, but I think we were. We are fooling ourselves to think that. The best capability out there is some closely related version to what we’ve seen in the news. When a particular operation was exposed.

I think that capabilities are really only limited by imagination and one’s dedication to a particular operation or operational objective. And so I tell people that yes, nation states are highly capable. They aren’t necessary. a lot of people say, well, do I have to worry about them targeting me? Well, that depends. But I would say on on the whole operational technology systems are more attractive. For targeting for military or diplomatic purposes, then IT systems, or I should say they’re they’re attractive for a different reason. And that’s as we all know, those of us who tried to defend them is that impacts from the cyber domain. Can manifest themselves in the physical domain. And so if you think about it, you can achieve. Military goals, which may be to, cause some destruction or to impact the availability of some critical resource, all through the cyber domain. And so I believe. There’s a lot of capability and a lot of emphasis and focus out there and so we, we can’t just sit idly by and say, oh, well, the worst thing we’ve seen is XYZ. Ukraine, they they flipped a few Breakers. That does not necessarily mean that’s the limit to the imagination and capability of nation states at this time.

Nathaniel Nelson
um Andrew, to get us started here, we’re talking about nation-state APTs. It could sound like it’s all one thing, but in reality, we’re talking about a wide tapestry of different threat actors from different places with different motivations. Which are the ones that we are most interested in in this podcast today?

Andrew Ginter
There’s a lot of different capabilities out there. And, this is not comprehensive, but maybe just to give people sort of a a taste of of what’s possible. Let me cover off maybe a half dozen of the threat actors and sort of the different ways they approach the, nation state-grade attacks. Starting at the low end, Iran is accused of sponsoring hacktivist groups. most recently they targeted some PLCs that were on the internet that were manufactured by an Israeli manufacturer. They disabled water distribution in a small town in Ireland, and doing this by sort of low tech, low investment targeting of internet exposed assets. North Korea has more sophisticated professionals that are paid every day. The activists aren’t paid, they’re amateurs.

Andrew Ginter
The professionals are paid every day to attack things and Mostly what they do is ransomware because this is how the sanctioned regime makes a lot of its foreign currency is Stealing it in ransomware attacks. So they’ve got some very sophisticated ransomware groups China sort of is credited with bringing nation-state-grade cyber attacks to the forefront. Back in the day, the the DHS at the time in 2006, 2007 put out alerts about advanced persistent threats. That was code for Chinese intelligence agencies.

And they pioneered sort of the public use of what’s now the classic remote access Trojan or remote access targeted attack, where you get a foothold on a network. the the the You install a rat, a remote access Trojan, a piece of malware, it calls to a command and control center on the internet and you operate that malware by remote control. You use it to attack other machines on the compromised network. You spread the rat to other machines. You might spread different versions of the rat in case your first version is found out and you establish a persistent presence. The very latest there is volt typhoon, which is saying there isn’t even a rat anymore. They’re using the facilities in the operating system to maintain remote control. Extremely difficult to detect that the remote control is there.

The Russians take a different approach. Historically, they’ve produced malware artifacts for attacks. Think Black Energy had code in it to manipulate DNP3 devices. DNP3 is a a widely used protocol in the electric sector.

The latest out of Russia or credited to Russia, I mean, none of this is officially confirmed, is Pipedream, which again is a code that has, it’s a tech code that has a lot of capability in it for manipulating devices in control systems, presumably maliciously. up And we haven’t heard much about them lately, but back in the day, I think 2010,

American and Israeli intelligence was accused and has never officially accepted responsibility, but is widely thought to have produced Stuxnet, which is a very sophisticated artifact that once you let it loose in a target network, it just does its thing. It’s autonomous. It spreads autonomously. It finds its target. It sabotages the target. It does not need remote control, the way the Russian tools do, the way the the Chinese prefer to sort of silently volt typhoon living off the land, remote control systems. The Stuxnet was was autonomous. so This is sort of the spectrum from from low-tech, hacktivist attacks to remote control attacks, some of which are very sophisticated to autonomous attacks, some of which have been historically very sophisticated. And there’s probably more that I’ve missed, but it’s it’s a it’s a sobering set of capabilities.

Andrew Ginter
OK. And you know. We read about these nation states in the news. A lot of the nation state grade attacks that make the news are espionage breaking into governments, breaking into nonprofits, breaking into, anybody who who dares to, voice any opposition to a regime. Breaking into these places and stealing information, you mentioned a couple of of instances. the Russia breaking into the Ukraine twice causing, physical power outages. the the I guess the. The question is we hear a lot comparatively about espionage, not so much about sabotage, you know? Is there sabotage happening that just isn’t being reported? What’s what’s going on there?

Joseph Price
That’s a great question, Andrew and. when I mentioned earlier that. That. The activities you see in the news are not the limit of the capabilities of a nation state level actor. It’s important to realize, like these are not singular transactions. Especially when you consider targeting OT systems. This is a campaign, right? So it evolves overtime and sometimes our defences are good. We catch them early on in the campaign. So even the simple acts within Ukraine 2015, were there a number of of were there a number of circuits that were? That were opened as part of that particular action. It started with a lot of information gathering, a lot of reconnaissance. We even saw. Right after the 2015 activity in January of 2016 that Ukraine ERGO, which is the transmission company that was later the target in December of 2016 of the follow on attack. Was part of a phishing scam. And some of the particular people that they targeted in that scheme or protection engineers.

So you start to put these pieces together and you realize they’re looking at those people who are responsible for the overall protection system of the transmission network. And in December of 2016, rather than throwing several Breakers in several different distribution companies, they threw 1 breaker in a transmission company and. It was something on the order, like an order of magnitude more power lost in that one breaker trip than in all the rest of the 2015. During the 2015 attack. And so you realize that there’s deliberate processes going on. And sometimes, like I said, we’re lucky we enter. We interrupt the process early. But. The goal for. To to attack a particular OT system, let’s use the United States as an example. The goal is not to let’s get in there, gain access. pull all the information we can and then cause sabotage. Because when your sabotage takes place in the physical realm, the chance of reprisal, the chance of every anything from a diplomatic to a military response, certainly it raise it or excuse me rises considerably.

But if you had those assets to hold at risk, if you can gain access, secure that access and hold it at risk, you can integrate that the the whatever sabotage or whatever attack scenario into a suite of capabilities that you could have as part of a campaign plan. And it could be very effective too. So. The the adversary is going to use. The most minimal force required. To gain access and if they can use something that let’s say is out there in the wild. But they can tell you’re not patched against. Well, sure, they’re going to use that. They’re going to use that before they go to some zero day that they know and no one else knows. Right. You’re going to be economical in your use of your various offensive. Crown jewels. Once they’ve gained a foothold, once they’ve secured their position. They may do. They’ll need to do additional reconnaissance to figure out. What are our options?

I always felt that Ukraine 2015 was kind of a hastily, hastily executed operation. Because so many things happened at once, and then they burned all the infrastructure at the end. But if you go back and look at each individual action that was taken at each of the distribution companies. You recognize that in some cases? They obviously had people that couldn’t read or understand Ukrainian. Because they had messages on the screen that they were remotely operating. That said, this is just a test. System. And yet they continue to try to do things. They opened a they they opened a tiebreaker, which in general, unless you’re under some maintenance function, tiebreakers aren’t going to shut the power down anything. And so. What we saw as as things progress and you get into the December 2016 event, you realize that. Things are more specific to the equipment that’s in use.

It’s highly targeted. There clearly had someone who knew what was going on in that system and I think we need to recognize that a nation state adversary. Will understand your process. They may not understand your systems and exactly your processes for running through things or your contingency measures, etcetera, but they’ll understand the physical process that you’re controlling. So that they can understand the effects they may have. And then they may just sit on that access. Monitor it. It may only phone home once in a blue moon. Because they don’t need to. Risk detection by having frequent and regular communications or a massive amount of information flowing back and forth between that target. They have it there they could hold it and they can use it again for. What I would say is, potential military or even just diplomatic. Influence operations. But without having to. take any physical action themselves. They can do it remotely. So I think that’s that’s something that that is the reasons why they’re not necessarily going straight to sabotage. It’s not because, as I’ve seen in an article recently, ohh, they wouldn’t mess with us. No, actually, this is the exact way that people would wouldn’t mess with the United States. attacking it asymmetrically. Using capabilities to cause damage or to. Cause service outages or even uncontrolled environmental release. Risk safety of risk of safety basis or violate a safety basis and cause potential harm to humans. Those are all things that could be done from afar via the cyber domain. That’s that’s a nice capability to have. an arrow in your quiver if you will. That nation states would want to hold on to. For some future conflict.

Andrew Ginter
So the example you gave of campaigns developing capabilities that sort of describes Volk typhoon to a T. But in the news lately, there’s been a lot of sort of lesser stuff. I mean Russian, state sponsored Russian hactivists are are accused of, I don’t know, overflowing a a water tank in Texas. The. Iran, Iran’s nation state sponsored hactivists are accused of targeting an Israeli made PLC that’s used in a couple of small water systems and turning off the water to 180 people in Ireland for two days. None of this seems terribly consequential. I mean. What? What really is the goal here? That doesn’t sound like a campaign.

Joseph Price
Water tower at sunsetIt’s interesting when you and I think this is again, this is a that tendency I think especially within the media to presume that what we see is the totality of the operation. And I just don’t think that’s the case. So you mentioned a couple of really good examples. In fact, we had a very recent example on Monday, there was a the Arkansas city, KS. Was also attacked its water Water authority was attacked. Very little details have come out. I’m very interested to hear what they find when and we’re trying to get some additional details through some contacts, but because it. It on the face, it just looks like, well, not only did they not really have much of an effect. The plant in the in Arkansas City went into manual mode.

Similar situation with some of the examples from Cyber Avengers. The ones you mentioned attacking water authorities and and kind of defacing the PLC’s. The only place that actually caused an impact was that village in Ireland that you mentioned and you’re like well and now they’re exposed. So like you said, what did they really? What did they really gain from that? And so my answer to that is let’s think deeper about the campaign. The campaign ultimately has, let’s say, high value targets at the end of it. And maybe that high value target is a major municipal water system in the US, one that cannot be ignored. If you were to have significant impacts. Yes. So how do you how do you target that? And everyone might think, OK, well, let’s jump straight to. I’m going to. Learn about their systems. If I can. Who are the key people? I might start fishing, etcetera. But part of you has to ask. Wait a minute. If we were to get caught early in the campaign. And there were to be any repraisals. And that would, would that completely wipe that campaign opportunity off the map? Do we need to use better tools? Do we need to invest more time in a human related human related operation? there’s a lot of things to consider, and so even starting, you might say, how’s the US going to react? When we cause. When we launch an attack and cause any impact whatsoever. To a water system.

Well, we need a we need a lab environment, right? So there’s, I’m sure. Plenty of nation states. I’m sure they all have labs where? They go test things out. But to really get ours to measure our response, they need to. Do it somewhere. Well, what is? if you sit, if you consider large metropolitan areas, New York City, Los Angeles, Philadelphia, Baltimore, those you’re going to get those going to get pretty big reactions pretty quickly for sure. Right. A lot of people will know if something. It’s there. Well, what about Muleshoe, Texas? Probably not a large number of people even are going to know where Muleshoe Texas is on the map. So we’re going to hit some of these smaller rural areas, number one, it’s going to be easier target, right, because these water authorities suffer from what I call STP. Same three people, the same three people are responsible for making sure they have all the necessary chemicals for treatment of the water that the water. Distribute sourcing and distribution all works. they go and deal with issues. They’ve got to handle and manage the budget. They’ve got to handle the maintenance calls the late night calls of issues, the water main breaks, all those things. Same three people are responsible things so it’s a pretty good bet they’re not going to have high end cybersecurity capabilities.

So and then we’re going to do some, we’re going to take an action and that action isn’t going to directly cause loss of life or anything major like that. So. They had to go into manual operation mode. Big deal, right? That of all the potential impacts, that’s probably the least not for those same three people, because now they’re probably a lot busier, even more so than usual. But that’s going to give us a window to does that cross a threshold, how fervent. Is the US’s response at the executive level at the DHS CISA level at the state governors level? What are? How do we respond as a community, as a nation? When we recognize that a foreign actor is taking action against these life critical. Services. That we just take for granted every day? And so I think that again part of this can’t part of the campaign is figuring out where are those limits to government response, what’s going. To. What’s going to trip a a greater response or something? What will those responses look like? It’s no different in in my mind. Like when you have Russian bombers flying into our air defence identification zone up near Alaska, they’re not crossing into our our national airspace, but they are in those areas just outside of it. And they watched with their radars and their surveillance. Planes, how quickly we scramble, how quickly we are able to intercept their aircraft. what tactics we use. I believe that’s also going here going on here because. In the end. If we believe, I mean so one of the things I mentioned earlier was, hey, we can’t guide our, our our greatest adversaries capabilities based on what we see in the news.

I was quite honestly, shocked in 2019 when the Director of National Intelligence published an unclassified threat assessment. And in it identified a couple of interesting facts. Number one, they named Russia and China in there, which? for those of us who have worked with the intelligence community before, that wasn’t, it wasn’t surprising that those were the the potential adversaries they named. It was surprising is that they were saying this at the unclassified level and it said that Russia could cause a power. Impact an impact to our our our power whether it be generation distribution that could last from hours to days that China could impact our water systems in in, in, in such a means to last from days to weeks. Like those are pretty bold statements coming out in an unclassified Intelligence Report. So I I think there’s a recognition at other levels of the government. Nation state adversaries do have a greater capability than what we might presume just by watching the media and the smaller activities.

You know, yes, they could be isolated incidents in the case of the Cyber Avengers, they were trying to deface the the HMI screen on Israeli made equipment. OK, that might have been an isolated campaign, but. For the other things I sit there and I think, how could this be used as part of a a larger, more diverse campaign to see how we respond to see what we put in place as a result of those attacks and how can we can, use that as part of our? Higher value target, higher value target operations and in preparing for those to have capabilities there, so.

Andrew Ginter
If I were to summarize, the one sort of surprising thing that I took from from the detail is the concept of a campaign. It’s not just that small water systems are easier targets, and so let’s go after them. I never really thought of these attacks as stepping stones. I really hadn’t thought of these attacks as testing our response capabilities. i mean the one concrete example that springs to mind is, I forget, it was a few years ago the the American administration announced that attacks on critical infrastructure, civilian infrastructure, would be regarded as acts of war. Well, someone just overflowed a water tank in Texas. Did anyone declare war?

No. So, yeah, it does, it almost does feel like, people are pushing a little bit, the bad guys are pushing a bit to say, well, really? When would you? When would you respond? How would you respond? this This makes sense.

Nathaniel Nelson
True and what I didn’t hear him say that I believe is also occurring is when nation-state APTs use one of their targets as a springboard or a relay point to another so for example you are targeting one major utility or telecommunications organization or whatnot, you go after a smaller target, and then you can use that as a relay point to hide your malicious communications, for example, among other things.

Andrew Ginter
Yeah, I mean, where I have heard of that is in supply chain, more than targeting one critical infrastructure to get into another. You tend not to have that kind of connection between a smaller water utility and a larger water utility. In my recollection, at least in North America, you might have stronger connections like that in Europe, where things tend to be sort of closer to each other, more connected. So yeah, that’s that’s a good point.

Andrew Ginter
So so work with me. we’ve been talking about the threat and, I’m convinced that that nation state threats are real. The question becomes, what do we do about them? if. I mean the the, the, the truism, I don’t know if it’s true, but the truism is that a nation state military essentially has unlimited money and talent and time to come after us. And when you have that coming after you, it’s hard to imagine how you could stop an attack like that. given what you’ve said about the threat. You know. We, as defenders from small water systems to large high speed passenger rail switching systems, we as defenders, what should we be doing about the threat?

Joseph Price
The challenge in answering that question is that the problem is multidimensional and multifaceted. But in general, I believe what we should be doing, first and foremost, is recognizing that this is a business risk or an operational risk, not a technical risk. So often. When you bring up the topic of a potential cyber attack, let’s say you’re talking to a CEO or a board. Well, well, go talk to the CISO or go talk to the CSO. Right? That’s that’s that’s their responsibility. But. When we consider that impacts. Can directly impact the business whether we’re brewing beer or providing clean drinking water to millions of citizens. The ability for cyber to now create business impacts means it should get some degree of attention.

And the consideration for what should be done should not be reserved to, well, I I did the minimum. I followed the checklist. I’m compliant with this standard. Because as we all know, in any standard. Your interpretation your your finding for how you’ve met that standard. The exceptions that you might apply for and get granted. For that standard, all could become your own undoing.

So to start with, how do we talk about? Security of security of OT systems to for the business risk. When you have attention at that level. Then you you start to recognize. The investment that’s made in any. Business activity, whether it’s bringing on new equipment, whether we’re upgrading, let’s say we’re a utility and we’re upgrading to a, we’re a large provider. We’re upgrading to a new. Energy management system. Right part of that capital expense. Is the security. And. With that, we’re not trying to meet some minimum required. Now we’re recognizing that. Just as the adversary is dynamic and can be active at different times, we need to make sure that our systems are actively monitored. That there is a responsibility whether it’s done. Locally by organically within a given company or provider, or if it’s contracted out, or if there’s some higher level organization that provides that. We talked earlier about, rural water systems and the fact that you’ve got maybe the same three people are responsible for everything. It’s unreasonable. To go tell the community of Muleshoe, Texas. Or Dubois. Idaho. Hey, you have to come up with and fund. Your own cybersecurity expert and oh, by the way, you’ve got to pay him or her healthy sum because there’s a lot of demand in the market and they’re going to, they’re going to cause a a hefty cause, a hefty price.

But what we. Could look at is to say OK. The threat? To those smaller water systems. Is not only is it probably lower in terms of somebody trying to cause sabotage? That is probably lower also. The resulting impact if that rural. Community where without water for let’s say hours to days. There are means at certain levels of government, state, federal, etc. To help compensate. For that temporary outage. It is a lot harder to compensate as the population served by that water system goes up, or the demand on that water system goes up considerably. So there’s still challenges within certainly agricultural areas and things like that that rely rely on the water supply for for growing crops, etcetera. But if you could, instead of telling every individual function you’re responsible for your own defence, you do give them some minimum amount of requirement, or maybe even assist them in meeting some minimum safe configuration. A firewall that’s properly configured to serve business to allow business purposes but not allow unsolicited communications in from the outside. You have some continuous monitor on there, even if it’s not monitored by those individual by that particular water authority. But look at like the state level and look at there are emergency response centres. Popping up in all states.

Joseph Price
And being able to be able to handle different incidents, right? Some sort of incident management or incident response capability at the state level and maybe you bring it up there. I’ve always said, when I look at the state of Idaho, we have three kind of population centres. In Idaho Falls, Pocatello, where I live on the southeastern side, the capital city of Boise and the southwest side and then the town of Coar-de-laine, not that far from Spokane, WA. Up in the northern end of the Panhandle. So you might be able to attract some talent to those population centres and have a regional secure operation centre or let’s say the water sector. When we pivot over to power. Now you’re talking about, well, you have regulated utilities, you have Merc sip certainly a lot more investment in. What? what is being done right now to set the bar to begin with. For regulated utilities, you also have. Private owner operators, right. You have companies that that might have a little more bandwidth if you will within the budget. To do things, and so you might require more self-sufficiency in that kind of scenario. Because in the end. What you don’t want to do is pass all of these, costs on to the consumer. I think we all probably pay for it one way or another, but you don’t want to suddenly triple somebody’s water bill or their power bill to say ohh well, we have to do. This particular cyber thing, because we have these two requirements.

You want to look at, how can I pool resources and use where it makes sense. Other sources of funding and support for those activities where it’s just not feasible. To bring the talent or the capability and run it organically within that organization. I think if we, then then we start to expand to the federal level and say what’s the federal government’s responsibility now? To be clear, I’m not speaking on behalf of my company or the Department of Defence. My former employer or anyone like that. But I did notice that recently Jenny Jenny Easterly, the director of CISA. Started talking. Out. Pushing responsibility for software vulnerabilities vulnerabilities onto the vendors themselves or software hardware. So that is one tact that can be taken as you start spreading that around the equipment and and software manufacturers in addition to requiring. The owners operators to provide some level of protection in addition to looking for communities of interest that might be able to come together and assist in providing active monitoring where.

It’s just not feasible to have the organic capabilities. So those are some of. The ways that I think. getting off the dime and and thinking that this is just an issue of like for checklist security. That no, we need to move beyond that and we need to be actively monitoring our systems someone and we need to be able to share that information. We’ve got a great model, we’ve got information sharing, analysis centres, ice sacks out there. Let’s make sure that they’re, properly funded and resourced so that when something does happen in Muleshoe, TX. Or in Arkansas City, KS.

That information can be pulled in quickly and shared elsewhere. So that if part of that campaign is hitting multiple small utilities. You can make them aware and quickly disseminate even response measures to help protect against them or to counter anything that’s been done. I think those are some ways we can start getting after this problem, but it again it it requires a shift in our thinking that this is just this is a CISO problem or this is just a. the network shops problem to solve.

Joseph Price
You know, as I was talking about what we should do. How we should sort of change our approach? I’m reminded of when I attended my first sans ICS security conference in 2015. I had. Just less than a year ago moved to Idaho from Germany. I I knew Mike Asante, who many in this community, if they’ve been around at all, know who Mike Assante is. And. I was listening to somebody give a talk at that conference. Kim Zetter was in attendance and she’s the author of the book Countdown to 0. And so almost every speaker up to this, I think we were on Day 2, almost every speaker had received some. Sort of question about Stuxnet. Right. And and and based on on. Zedler’s book. And they want to know how do I protect against, the nation state level attack that is Stuxnet. And the speaker. Sure. I forget his name, but he said, he said. I find it kind of funny. Said. Everyone’s sitting here, going around, saying. How do we solve against Stuxnet? He’s like most of you, don’t even know what assets you have on your network so. So there’s probably there’s probably a preparatory comments to be made, which is if you have. No cybersecurity program, or maybe a very nascent one. You can be bombarded with. All these different tools that people will bring you or say, oh, bring us on and we’ll do this for you. We’ll do that for you and it can become. Quite noisy and confusing.

What is the best step I should take? What are the first steps I should? Think. And so I will caveat my previous response by just saying. Consider first and foremost, knowing yourself. Knowing what you have on your network, identifying that, and certainly there’s automation and tools that can assist you in doing that, but know what you have. Have some sort of policy So that how you’re going to treat these systems, right. And there’s lots of policy examples out there you can you can use somebody to assist you in that or you can, if you’ve got the ability you. Can. Study examples that are out there. But know what you have have some policies how you’re going to treat whether to go onboard, off board that equipment, dispose of it, how it’s going to be configured, how you’re going. To let users access.

And then put some sort of monitoring. Capability in place. So that you can assess what is going on and and then you can start to graduate to. The more complex cases, how do I need to integrate threat intelligence? How do I do attack surface management? What are my exposures? To a very highly capable advisor or an advanced persistent threat. It’s important to recognize that you can’t. Just make all that happen overnight. So I would just. Say. broadly we need to think about. Monitoring active monitoring, having responses, rehearsing our instant response plans, knowing what assets we have in in our systems. If we can get there, then I think as a nation we’ll be better prepared. To start dealing with the more nuanced and advanced threats and being able to respond when we see a noise somewhere in the system and recognize that might be part of a broader campaign, how do I need to respond to whatever happened? There. To make myself more protected, more resilient.

Andrew Ginter
So Nate, what struck me there, long discussion of what smaller utilities can do, how important, detection is. I’m reminded of the incident in Denmark, the sector cert documented the the Russians compromising some 22 internet-facing firewalls that they’ve been monitoring. What is not widely known about that incident is the funding model for the Denmark SektorCERT. The SektorCERT is not publicly funded.

It serves some 200 or 300 utilities, most of which are tiny. It serves three large utilities. I don’t know if they’re power or or water, but three large utilities is is my recollection when I was talking to these people. I might have the numbers off by one or two, but it’s a very small number of large utilities. And those large utilities pay for the sector cert. And the sector cert provides its services to the tiny, hundreds of tiny utilities for free.

What’s the benefit? Well, part of it it is the larger utilities giving back to society. Part of it is in my in sort of the the analysis, Joseph’s analysis here, part of it is the larger utilities benefit from visibility into what’s going on in the smaller utilities. If the smaller utilities are being attacked as part of a larger campaign, the larger society, the larger utilities want to know what steps the enemy is taking, want to know how much trouble they’re in. So this is an interesting funding model. He’s right. The same three people do not have the skills nor the ability nor the the money to set up their own monitoring system, to pay for their own threat intelligence feeds. Whereas a central sector search style organization that is sort of providing service to the smaller utilities can afford to buy threat intelligence feeds from the the the commercial providers of these things, can afford to have a relationship with their government and get access to classified information. having sort of the the big fish, be it the government or the larger utilities, pay for these services for smaller utilities seems to me to make a lot of sense in terms of a funding model to bring about the kind of capabilities that Joseph was talking about.

Andrew Ginter
So I’m putting words in your mouth here, but what I kind of heard you say was the perspective of the government. I mean, in the United States, the federal government, in other nations, the national government may be somewhat different from the perspective of the tiny utilities. The same three people. you’ve talked about the the need for monitoring. Absolutely. The nation needs to monitor these campaigns and figure out, how many doors is the enemy knocking on. But in terms of monitoring, most small utilities they want. the attacks kept out. They, they don’t want to focus on the detect part of the NIST cybersecurity framework. They want to focus on the protect part. And, to me, this is them saying, well, we can if the nation wants, insight into my systems, let them pay for the monitoring because I’m, that’s benefiting the nation, not me. I need to put protection in for those small utilities when they’re designing their security program, you know? Should there be assistance? I mean I don’t wanna again I I guess I don’t want to drift into into monetary. How much should the small utility be focused on sort of assisting the nation in terms of detecting widespread campaigns and how much should the, how much of the the nation state threat should each small or large utility regard as credible, credible threats to their own their own user base, their own citizens?

Joseph Price
Yeah, those are great questions. Let’s start by. Recognizing that. As we discussed earlier, as I mentioned earlier. Smaller utilities are not going to have the resources or access to the. The skill sets to take. To take on all the responsibilities on their own, and I agree with you, let’s not drift too much into, the policy of of who pays, etcetera. But let’s think in terms of where is that expertise, who can assess. What is credible and what is not? I. I pause a little bit at the use of that term because. If we talk about. In engineering, if we talk about design basis threats, I mean we look in terms of, OK, I have two gears are made of a certain metal. We put them together, they’re going to turn, we’re going to use some sort of lubrication or something. But I can with relative accuracy predict when that’s going to fail or when it needs to be replaced to avoid it failing in operation. Right. Because we know how metals breakdown overtime and exposed to certain elements and temperatures, etcetera and stresses.

When we look at measuring risk for natural disasters, we look historically we rely on the fact that, well. There’s a. 30% chance. That we’re gonna have a, a hurricane between categories 1 and categories 2. Strike somewhere within this 100 miles of our shoreline. in the next three years. We we base everything off of the the the historic. Occurrences and use that and extend that into a. probability statement for it happening again. The challenge we have in cyber is there’s a. In most cases. There’s a human actor involved and really at some level there’s a human actor deciding to do to take certain actions. And so. When you talk, start talking about. is the threat credible and do I need to be worried? It’s it’s very difficult. I think you’ll you’ll get some broad statements made based on how critical that service or that utility or that. Function is. And then you’ll think in terms of how likely is it that a nation state level adversary would want to have that impact on them? And I say, well, again, go back to our earlier conversation. I think holding that. Infrastructure at risk is a much. Bigger coin in their pocket. Then causing some impact.

So for that reason. I look at in terms of prioritizing and and looking at credible threats, I think, OK. If. If you could. Either cause interruption of a critical service like water, power, transportation. In a large metropolitan area. There is, there is the potential of bending political will. I’d always tell people, why is why is the US Navy such a, the most powerful fighting force, on the on the seas, anywhere in the world? Well, it’s because they can park in. a dozen acres of sovereign territory 12 miles off somebody shore and give them pause. Give them time to think. And recognize that, maybe whatever action that prompted that there might be a, a diplomatic solution to. Well.

If the suddenly the populace of the US or significant number of the populace of the US are threatened. With the loss of. Life critical services. I think we’d be foolish not to believe that that might give us political pause, right? That might cause. the executive branch to. Think. Carefully, what is the next move? If they could hold that large of a? A population at risk. What are our options now? It will probably. I’m sure it will drive. Multiple different options, political, military, etc.

Andrew Ginter
It occurred to me when you’re talking here, is it credible that Vault Typhoon is is is in the news, living off the land extremely difficult to attack to to detect these adversaries? Is it? Is it reasonable to believe that hundreds of other utilities have been compromised in the same way and the Chinese? Deliberately leaked the fact that they’ve taken over these 50 odd this way to make. the the authorities aware that this capability exists because it does no good to hold, when when the when the Navy parks off the shore of of some other nation and and says let’s think twice about this the the the the the the sort of the response capability. That the capability of the Navy is clear. OK, these ships. Are sitting there if, if nobody knows that the Chinese have the ability to cause, widespread physical consequences, is it credible that the Chinese leaked Volk typhoon, deliberately or or or, really accidentally, but weren’t that dismayed by it because they have these other capabilities and it does, those other capabilities do no good. It’s a threat if nobody knows they exist.

Joseph Price
So that’s a great question, Volt Typhoon. In my mind, as an example. Of. Or I would say it’s an an exposition of an extended campaign. Right. As as you’re well aware, as you mentioned in your question. It uses living off the land techniques very difficult. To detect. And in fact in the. In the infection details that I reviewed or, excuse me, in the instances of bolt typhoon attacks that I reviewed. Quite often they say we have no idea how they landed. And so that to me. Reeks of an extended campaign of holding assets at risk. Because. Once you have them #1 remove all traces of how you got there to use living off the land, techniques to to maintain that access. And like I said, occasionally phone home and when I say phone home it’s probably to some other listening post so that you know. You have access. But if you’ve done that. And you sit back and say haha, we have all these infrastructure operations that we hold at risk. Do you need to actually create cause sabotage or create mayhem. To be able to have an have an effect, the answer is no.

But it might be worth letting them know you have. A certain. Amount of assets held at risk. Now. If you’re smart, and I believe. Our nation state level adversaries are very smart. You’re not going to, let’s say, manage and care for all of the places you hold at risk with the exact same infrastructure, right? You’re going to spread it around the technique by which you by which you connect with them and contact them. Do any of your, your your maintenance of that connection if you do collect information? You’ll use different infrastructure to. Get that back. That information back to you, so you don’t necessarily have to burn the entire the entirety of your targets held at risk.

But you absolutely. Could take a portion. Leak sufficient information. Or maybe it was found because of just, great sleuths. Looking carefully at crash dumps, but the point is at. Some point. When your target knows they’ve been owned significantly. You might have leverage to, let’s say, accomplish some diplomatic objective or some other political objective, short of military conflict or things of that. Nature. That might be very helpful in, let’s say, talks that are upcoming about, trade or. About. conditions in adjacent territories or other other nations that that are. That are allies to one of the countries in question and and and not to the other.

I mean, there’s a lot of of ways that that could be useful and. And again it causes a response. You see how willing is the target to negotiate? As a result of recognizing you hold some of their key infrastructure at risk. So I think that also would explain in my mind why the government has been so united and adamant that we do what is necessary to root out and. To identify and cleanse Vault tycoon. From our systems. It’s a. It’s in me. It’s it’s a compelling. Conjecture and again, this is all conjecture, not neither one of us is talking from a position of some greater knowledge of exactly what’s happening or what happened with Volt Typhoon, but it certainly makes sense to me. That you would possibly burn some of your infrastructure to sort of. Or show one of your cards, or maybe two of your cards to give you leveraging power. In whatever’s going on. Globally or between the between those nations at that time.

Andrew Ginter
Well, Joseph, this has been sobering, thank you for for joining us before we let you go, can you sum up for us what are sort of the the the key things we should take away from this, this nation state threat business?

Joseph Price
I would say the first nugget is. Let’s keep in mind that the capabilities of any adversary are not merely defined. By what we read in the news, what events or activities were essentially caught? And then publicized. Computers will do exactly what we tell them to do, right? The computers and digital devices that run our OT systems are not all that different from the ones that are running our IT systems. And if if someone with sufficient access and authority. Tells it to do something. It will absolutely do it, and when those logical actions are tied to physical systems or impacting the physical world. Again, the the the range of potential effects are limited by our adversaries limitations. Excuse me? They’re limited by our adversaries, imagination and further by what we do to actively defend and protect those systems from mal-operation.

Nation state hackerThe other point that I would say. To keep in mind is that. We can’t protect. Everything against everything. We need to prioritize. But. If you consider where OT systems and OT cybersecurity is. I often feel like. For 20 years or more behind of where we are with IT. And so, and yet these are the systems. That. Most affect our day-to-day lives and an impact to them would be felt much stronger. I always tell people somebody hacks my computer and gets my online banking password. It’s a bad day for me. But if someone goes in and and hacks a power distribution substance or. If they hack the water treatment facility, it’s a bad day for a whole lot of people. So there’s a certain degree of scale and again. Reliance upon. Our critical infrastructure and we should we should give it. Uh. Due diligence and and that includes resourcing, funding, attention. To those systems. Over and above some of the other areas that we maybe emphasize right now.

And then the last nugget is? Recognizing. That. These capabilities are out there. Obviously doesn’t hit the easy button easy button on solutions. So. There’s really no excuse to, I would say, basic levels of having basic levels of hygiene. But in order to. Achieve that and move on to like you said earlier, right, protecting. Not defending when they’re already there, but protecting against these capabilities then we really need to take a much more active role and we need to move the decision from. Maybe the lower end of the C-Suite to the higher end and certainly for OT systems. Again, whatever it is, whether you’re. Whether you’re manufacturing something manufacturing pharmaceuticals or. Treating wastewater in a city. Those OT systems control your business. And therefore it is a business risk. That takes the attention of not just. CSO or CISO, but the CEO, the COO, the board, even those who recognize that. The proper investment needs to be made. To protect these systems that are core to whatever service. Or product they provide.

I’ve really enjoyed getting to be on this podcast. Andrew, this is an area that’s been near and dear to me for quite some time. Like you, I’ve spent a lot of my career focused on cybersecurity in various areas. The last 10 of it solely focused on OT systems if. I and I, I work at Deloitte. I have to tell people when I show up. Hey, I’m not here to do your taxes because that’s what Deloitte is often known for is it’s a as a tax and company, which it is that for sure. But we also have for 12 years running the largest cybersecurity consultancy within the United States and so, if anyone wants to learn more about how Deloitte can assist them in tackling some of these challenges, I urge you to go to www.deloitte.com and look at the services there. You can certainly reach out to me on LinkedIn and I can connect you too if there’s an interest to have the professional discussion.

But in the meantime, Andrew Great podcast again, I really appreciate you inviting me and allowing me to come on here and talk with you about these subjects with you. You’ve actually encouraged me to think a little bit deeper on some things too, so I’m excited.

Andrew Ginter
I’m delighted to hear it. Thank you so much. the the podcast would be nowhere without without guests like you, experts coming in and and sharing, you know. I call it a piece of the elephant. Show us the face of the elephant and the nation state face is something a lot of people like I said bandy about. But it’s it’s tremendous to be able to dig into it in some depth. Thank you so much.

Nathaniel Nelson
So I know it’s just one little sentence and a much longer answer there, but Joseph mentioned that in his view, IT was like 20 years ahead of OT security, which struck me as very surprising. In what universe is IT that far ahead, if if ahead at all? I mean, based on the conversations we have here, these are much more in-depth technical forward thinking conversations than I tend to have with people in IT.

Andrew Ginter
I fear that your perspective on OT security has been tainted by a hundred episodes of the, of the, the podcast here. Um, partly, on the podcast, we interview people who are very active in OT security, and sort of the examples I gave out of my own experience at, at waterfall, we work with the most cyber secure industrial operations on the planet. We’re on the on the very high end of industrial cybersecurity. So, you’ve been sort of seeing that side of the coin. Joseph, in my recollection, he worked at Idaho National Laboratory working with lots of different kinds of stakeholders in the in the OT security space, large and small, advanced and not at Deloitte. He’s working with presumably a very wide cross section of the industry much more so than you know we have on the show here, much more so than I have in my practice. You know the the the sort of the The leading edge of industrial cybersecurity is very sophisticated.

The average is probably much closer to what he’s pointing out, saying, no, no, there’s a lot of people out there. yeah you know We had an episode, I don’t know, a year ago talking about starting from zero. We interviewed a gentleman who made it sort of his calling to walk into industrial sites who had done absolutely nothing, one after another after another. So there’s a lot of zero out there.

What I took away from the episode you know was sort of two things. One is was sobering, thinking about sort of bigger picture campaigns. I have been focused on sort of individual breaches, individual sites. What can the small sites do? I wasn’t really thinking about how a multi-site campaign might work and what would be the the advantages to a nation state in carrying out such campaigns. So that’s that’s sort of some sobering food for thought.

The other thing I took away, again, i’m I’m reminded of the Denmark SektorCERT model where the largest utilities or presumably if you’d rather the government, but you know big fish pay for a facility that A, protects the little fish because it’s the right thing to do, and B, provides intelligence to the big fish about large-scale campaigns that might be feeling their way through the little fish in the course of you know eventually targeting the big fish. that you know To me, that’s that’s a ah nugget of solution here that you know maybe we should be, as a society, considering applying more widely.

Nathaniel Nelson
All right, well, with that, thank you to Joseph Price for speaking with you, Andrew. And Andrew, as always, thank you for speaking with me.

Andrew Ginter
It’s always a pleasure Nate, thank you.

Nathaniel Nelson
This has been the Industrial Security Podcast from Waterfall. Thanks to everyone out there listening.

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Insights into Nation State Threats – Podcast Episode 134 appeared first on Waterfall Security Solutions.

]]>
OT Security Data Science – A Better Vulnerability Database – Episode 133 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/ot-security-data-science-a-better-vulnerability-database-episode-133/ Sun, 15 Dec 2024 10:25:40 +0000 https://waterfall-security.com/?p=29424 Security automation needs a machine-readable vulnerability database. Carmit Yadin of Device Total joins us to look at limitations of the widely-used National Vulnerability Database (NVD), and explore a new "data science" alternative.

The post OT Security Data Science – A Better Vulnerability Database – Episode 133 appeared first on Waterfall Security Solutions.

]]>

OT Security Data Science – A Better Vulnerability Database – Episode 133

Security automation needs a machine-readable vulnerability database. Dr. Carmit Yadin of DeviceTotal joins us to look at limitations of the widely-used National Vulnerability Database (NVD), and explore a new "data science" alternative.

“…we created a new segment in the industry….Data Science for Cybersecurity.”

                                            -Dr. Carmit Yadin

For more episodes, follow us on:

Share

About Dr. Carmit Yadin:

Dr. Karmit YadinDr. Carmit Yadin is the Founder & CEO of DeviceTotal, a SaaS solution for enterprise device security that provides a centralized, agentless approach to device vulnerability and threat management. Dr. Yadin is a leader, researcher, author, and sought-after speaker in cyber intelligence. She has over two decades of experience in cybersecurity.

Dr. Yadin began her career in an elite cyber intelligence unit of the Israel Defense Forces. She then contributed to the success of several high-tech firms, including NASDAQ-listed RAD-Silicom and Alvarion, where she served as Chief Information Security Officer. Dr. Yadin’s unique blend of technical expertise and business acumen has distinguished her as an expert in both cybersecurity and business competition management. She is also the author of “How to Boom B2B Sales” and has delivered talks on global platforms, including TED. Under Dr. Yadin’s leadership, DeviceTotal helps companies proactively protect their connected devices against evolving cyber threats.

About DeviceTotal:

DeviceTotal LogoDeviceTotal offers the world’s first agentless solution to detect and eliminate vulnerabilities and risks in OT, IoT, network, and security devices using AI. DeviceTotal is a SaaS solution for enterprise device security that provides a centralized approach to device vulnerability and threat management. As the industry’s first universal device security repository, DeviceTotal helps businesses proactively manage their network security and ensure resilience in the face of evolving threats by offering organizations a scalable solution for complete visibility with real-time continuous monitoring. 
 

Transcript of this podcast episode #133: 
Making the Move into OT Security | Episode 133

Please note: This transcript was auto-generated and then edited by a person. In the case of any inconsistencies, please refer to the recording as the source.

Nathaniel Nelson
Welcome listeners to the Industrial Security Podcast. My name is Nate Nelson. I’m here with Andrew Ginter, the Vice President of Industrial Security at Waterfall Security Solutions, who’s going to introduce the subject and guest of today’s show. Andrew, how are you?

Andrew Ginter
I’m very well, thank you Nate. Our guest today is Carmit Yadin. She is the CEO of Device Total. And Device Total is doing OT security data science in the area of vulnerability management. And I had no idea what that was, so I was keen to find out.

Nathaniel Nelson
Then without further ado, here’s your interview with Carmit.

Andrew Ginter
Hello, Carmit, and welcome to the podcast. Before we get started, can I ask you to please, you know, say a few words about your background for our listeners, and you know, a bit about the good work you’re doing at the Vice Total.

Dr. Carmit Yadin
Thank you for the opportunity. I highly appreciate it. So a little bit about my background. I started my journey in the cybersecurity space when I joined the Israeli army, was trained for network and security. I worked as a CISO in several NASDAQ companies. I worked with governments around the world, mostly with the U.S. government on gathering intelligence from connected devices.

And with time, I realized that the biggest challenge the cybersecurity industry have is in the fact that as humans, we connect ourselves with so many devices and the number of connected devices is increasing dramatically. And the problem is that security teams and humans don’t have visibility to the security posture of each device and their organization. They don’t they also don’t have visibility on he on how each device impacts the entire organization. a So I decided to take that as a personal mission for me to solve. I did them my doctoral studies is exactly about this subject and I funded the Device Total to solve this unique problem and significant one.

Andrew Ginter
Thanks for that. Our topic today is vulnerabilities, and there’s a lot of information available about vulnerabilities out on the internet. Can you talk about vulnerabilities? Which which part of part of that space is are you looking at?

Dr. Carmit Yadin
So the first important thing is for us to understand what does it means, vulnerabilities for the IoT and the IoT space. And the biggest challenge organizations have today is to know what vulnerability is related to any of their devices in their organization. Now, in order to understand that, we need to understand how the vendors that manufactures those devices match vulnerabilities and what’s important to understand it as one is that vendor publish their vulnerabilities a by two main parameters one is the hardware of the device and the second one is the software which is the firmware version.

Now, there are different sources from where a we can gather this information. So the most reliable source is the vendor security advisory. The vendor responsibility by regulation, by the way, they have to publish and to disclose and the vulnerabilities they are aware of to their to the industry and to their customers.

Most of the vulnerability management today focusing on IoT and OT will gather the information from NVD. Now, the problem with NVD is that NVD provide a non-accurate and non-complete visibility on the vulnerability on those devices. Therefore, customers and organization in order to in order to identify the accurate data, vulnerabilities data for their devices will need to do lots of manual activities. They will need to go to the security advisory and to try to understand what vulnerabilities related to these devices. This task takes like for forever, a lot of time, and it’s a very difficult task to do. A lot of manual work, different websites, a and definitely unscalable. So this is how the industry looks today. There is no one universal repository providing all the data for any device.

Andrew Ginter
So that does sound like a lot of work for you know someone like me. If I’m operating an industrial site, I’ve got a lot of equipment. I’ve got a lot of software. To try and go out and find this information manually, you’re saying, well, it’s a lot of hard work.

Dr. Carmit Yadin
Yes, that’s true. It’s a lot of hard work. But the problem is that security advisories today a are non-structured data. The data inside there is a non-structure. And for those vendors that tried to structure, they didn’t structure the entire data. So we are dealing with a lot of data that machines cannot consume. And humans that are capable to rate that doesn’t have the scalability that machine have. So that’s the problem. The data is there, but we cannot consume that. a And and this is one problem. The second problem would be now that I understand what problems do I have, how am I going to solve that? So you’re 100 percent right.

Andrew Ginter
So that all makes sense. i mean in In previous episodes of the the podcast, we have had people talking about new standards that are out there for publishing vulnerability information in a machine-readable format. I had imagined that those standards would solve this problem. or Are they not solving it?

Dr. Carmit Yadin
IoT DevicesOkay. So the way, so the problems start with the fact that specifically in IOT and OT devices, there are so many vendors that manufactures different types of devices to the industry.

And there is no alignment and there is no standardization on how vendor A publish their they’re a security data versus vendor B. So there is no alignment between them. a And our job is to create that alignment because it doesn’t exist elsewhere.

Another thing about standard is that there are lots of standards and regulations for the organizations that are using IOTs and OT devices. They must validate what vulnerabilities they have. They must use their latest version of the devices. a They must control the risk of the devices in different environments.

So the majority of the regulation and the standards is on the organizations that are using the devices versus on how the manufacturer should publish. They have to publish, but the way they publish is their own way, and each vendor are doing that differently today.

Andrew Ginter
Listening to to what you’re saying here, it sounds like what the world needs is a search engine for vulnerabilities that can tell me, what’s broken can tell me what fixes are available, with reliable up to date data is, is that what the world needs.

Dr. Carmit Yadin
No, Andrew, I think that what the world needs is a to know what vulnerabilities exist on on their devices. They don’t want to go and search organizations, don’t want to go and use a search engine to search all the vulnerabilities on all their devices. They want someone to tell them, hey, these are the problems you have.

Dr. Carmit Yadin
These are the solutions that you needed to implement, and that’s the priority on how on how and when you should do that. And that’s a solution that organizations like Armies, Nozomi, and Clarity provide today to their customers. The companies that need that search engine and capabilities are those companies. They need that to have devices that are behind their scenes.

Andrew Ginter
Okay, so so work with me. you know You have product in this space. What do you have? to you know How do you work with with these vendors?

Dr. Carmit Yadin
OK, so what we are doing, we are on a daily basis collecting and normalizing all the data exist on any security advisories in the industry today. So we’re collecting the data from the security advisories, from the vendor website. We normalize the data. We structure the data. And for the very first time in the industry, we managed to create one universal repository that includes all the security data, including the vulnerabilities and the mitigation and remediation for any device exists in the industry today. And what those vendor can do together with us, they can consume our data based on the devices they identified in the customer network, they can query our database and we will reply back with the vulnerabilities matched to the devices they identified, mitigation, remediation, software update, end of life data, and and so on. And we are updating the data daily.

Nathaniel Nelson
So Andrew, i while I was listening to her just now, decided to pull up any given CVE on NVD’s website. We have a description of the problem. We have a score associated with just how severe the vulnerability is. We have hyperlinks to mitigation instructions and then various other information. So I guess what I’m wondering is what exactly the platform she’s describing does so much more or better than what seems to me like a pretty comprehensive list of what I need to know about this vulnerability.

Andrew Ginter
A couple of things. That’s a good question. What Device Total has done is a) make the NBD machine readable. Because you know to her point, if I have a refinery with I don’t know how many CPUs in it. Let’s say, 6,000 devices with CPUs in them. Everything from PLCs to flow meters to you name it. And you know, my my question is not where’s my search engine. I want to go to each one of my 6,000 devices once a month and look up the device in the search engine. That’s not what I want.

What I want is to pay someone like Armis or Clarity or Dragos or Nozomi to tell me what devices I have, to tell me which of those devices are out of date, to tell me what mitigations are available for these out of date devices. I want someone to solve this problem for me.

And so what we need under the hood of Nozomi and Dragos and whatnot is that machine readable database of vulnerabilities, because these platforms are the ones that are active in my refinery, scanning what devices I have, keeping track of what devices I have and where they are and what their purpose is. And they need access to a constantly updated database of vulnerabilities so they can produce those reports about how much trouble I’m in for the devices I have. Does that make sense?

Nathaniel Nelson
So it’s less that NVD doesn’t provide the specific kinds of information we need. It’s much more about making this information accessible and machinery.

Andrew Ginter
That’s right. Machine readable for the other vendors that need the data. Another thing that you know I was talking to Carmit after the fact, I didn’t capture in the recording, is you know she pointed out, and it’s it’s public knowledge. If you Google the NVD program and you know falling behind, you’ll see an announcement from earlier this year.

Andrew Ginter
um saying, you know we are falling behind. There’s too many vulnerabilities. The program had had to to not process all the vulnerabilities that were being disclosed to them. They prioritized what they thought were the most important vulnerabilities, but the database was falling behind. So that’s another argument for a private vendor coming in here doing this, having someone pay them rather than have the government do it and you know be subject to the vagaries of, I’ve only got so much budget. There’s only so much I can do with that budget. you know This is this is an opportunity for private industry to come in and and do the job sort of thoroughly, completely, because they have the money to do it.

So reflecting on this, Nate, what strikes me is, you know i in in hindsight, it it makes perfect sense. But, until I realized what Device Total was about, I had no idea that such a company existed. If you think about it, what’s the the value that’s delivered by companies like Armas and Dragos and that sort of class of call it asset inventory and asset management solution. They scan your network, they figure out what assets you have, and they come back and tell you how vulnerable they are. And so they need their own, every one of these vendors needs a machine-readable database of devices and vulnerabilities, and ideally things like workarounds and compensating measures and fixes if they’re available and where the fix is available. They need all of this so that they can present this in reports, they can present it you in whatever to their customers. And you know before Device Total existed, I would have imagined that every one of these vendors would have to do this research on their own. And once they produce that database for their own internal use, my own guess is that they’d be reluctant to sell that database to somebody else. you know Why would they give their their competitors a leg up? And so that, you know in hindsight, produced the opportunity for someone like DeviceTotal to come in there, do the job once, and sell the results.

If they can do the job in a sense better than any one vendor could do individually, there’s a huge incentive for these vendors to say, you know instead of me doing this painfully manual process and producing a an inferior result, just buy the data from Device Total. So it makes sense in hindsight, but you know before I talk to Carmita, I had no idea that this sort of niche in the ecosystem existed.

Andrew Ginter
Okay, so it’s it’s starting to become clear to me. You’re saying that the kinds of vendors like Drago’s, Nazomi, Claroty, that kind of vendor is your customer.

Dr. Carmit Yadin
So that kind of vendors, yes. So we work with any platform that has asset management and asset discovery solution. And those kind of customers using our data is a layer of intelligence on top of their asset discovery and asset management capabilities, so they can give better visibility and data that they don’t have today, like the mitigation, remediation, end-of-life data for any IoT and OT devices exists in their customers’ network. On top of that, our customers will also be large-scale organizations service providers, SOC companies. a Their problem is that they are using different a assets management discovery, different tool and some of them they are doing even manually. Our capability is in the fact that we are capable to digest any asset inventory list from any source, whether if it’s manually or from the asset discovery.

And we provide a layer of intelligence on top of that data and we will provide on a daily basis the accurate vulnerabilities, accurate mitigation action, what softwares we need to do, a software app update to a under what priority work are the workarounds available from the vendor and with all those data we will also provide a prioritization based on the risk and the criticality for the end a customer.

Andrew Ginter
So Nate, something subtle in there that I’m not sure everyone caught. it’s clear that the asset management vendors are potential customers of this database of vulnerabilities. But Carmit also mentioned service providers. Think, I don’t know, a big oil company with 150 sites, each of which is a multi-billion dollar asset.

These big organizations tend to have central security operation centers. They tend to, to insource, they do that themselves. And you know, these centers tend to have, automation. They’ve got, they buy, one or six of each kind of tool and, uh, they generally have their own automation and own code that they’ve, they’ve invented to pull it all together and, automate the job of managing, uh, vulnerabilities, managing incidents, managing everything.

The second sort of customer she, she, mentioned very fast was service providers. you know, security as a service is a thing. Even in the OT world, a lot of people don’t, people smaller than the biggest companies, need a security operation center, but don’t want to staff their own. They might not be quite big enough to staff their own. Even if they are a little bit big enough, this may not be what they want to focus on. And so there’s a fair number of of service providers out there that will say, we will manage, we will look at your alerts, we will manage your security for you and raise the alarm if if you need to do anything. And send you reports about your assets and do all of the things that a SOC does. And again, these service providers, one they they compete based on the knowledge, the domain of their their security analysts, their experts, their But they also compete to a degree with technology. Yeah, they buy a bunch of off the shelf technology to to gather data and manage alerts. But again, they tend to have some of their own technology that sort of is their special sauce, adds their their their special flavor to the security as a service offering.

And that class of of vendor, service provider, might also benefit from access to a vulnerability database from from time to time to produce their own automation and and make their own people more effective in the space. So that was something that went by fast and and struck me as as interesting.

Andrew Ginter
Interesting. I mean, it sounds like you are competing with the NVD, the National Vulnerability Database. Do you have a search engine where people like me could search your database?

Dr. Carmit Yadin
So a yes, we do have that capability. Our customers can log into the portal and they look and manually for devices. One of our main capability and a very unique one is that we enable customer to identify the security posture of devices even before they purchasing the device.

So we give our customers to see that to get visibility and the impact on any device existing in the industry, even before purchasing that. Now, comparing us to an NVD, we just don’t do what envidy does NVD The goal of NVD is match vulnerabilities and provide data on vulnerabilities.

NVD doesn’t look at the risk from a device perspective. NVD doesn’t consider the relationship between different devices in the network and that impact. and NVD doesn’t have the mitigation, doesn’t provide remediation, doesn’t provide workarounds, end of life data. NVD doesn’t have the data that a organization nowadays needs.

Andrew Ginter
Cool. I mean, I had no idea that before talking to you, I had no idea that this sort of function, that what you do existed in the ecosystem. Can you talk about your reception? how What’s the experience of your customers like? how did How did they receive the the knowledge that you existed?

Dr. Carmit Yadin
I can share with you that when we just started, we went to one of the largest organization, Fortune 500 organization in the US. And he said, listen, we work with all the vulnerability management tools exist in the industry today. a Show us what you have, but it was like very suspicious. He wanted to see another option, but was very suspicious.

And when we actually show him the data, she really liked that. He really liked that because he so we managed to solve him so many problems that he needed to do manually, that he needed to check the vendor to go online and to validate the data for critical e devices. He was very surprised that he can add devices manually, not from assets management and still can get the data. He was amazed because understanding the impact of new devices before purchasing them doesn’t even cross his mind that it that it’s an option.

Not but not just that, the one of the unique thing that we bring is also the mitigation and the remediation. So for the very first time, he doesn’t need to pay for very expensive tools to give them a the problem. Now we can also know what’s the solution for all the vulnerabilities a that were identified on his network and under what priority to sell to to to mitigate that. So it’s it’s a really game changer for the end customers themselves and obviously for companies that has the assets management capabilities that wants to give higher value to their customers.

Andrew Ginter
Cool. You’ve been doing this for a while. Can I ask you, where are you at? What’s coming next?

Dr. Carmit Yadin
So today we’re focusing and are primarily focusing on the IOT and the OT industry because of everything that we talked about today. This is where a organization have a very significant problem. But as Device Total, our goal is to cover any device exists in the industry and any device exists in any a network. And our next stage is to add all the IT devices and softwares into our platforms as well. That’s what we are working on.

Andrew Ginter
So that’s a little bit surprising. I mean, in my experience, a lot of the cybersecurity technology that’s in the OT space starts in the IT space and then expands to include the weirdness of of the OT space. You’re doing it the other way around.

Dr. Carmit Yadin
Yes, so apparently we’re not most people. What we’re doing is very different. We didn’t change only that approach. We also changed the other approach. So we created a new segment in the industry. What we’re doing is data science for cybersecurity.

We are a data science company for cybersecurity in a very specific approach for devices. We decided to start from the IoT and the OT industry just because there is no alternative to that, right? And the reason for that is that our organizations today cannot install client or agent on IoT t and OT devices.

And that’s why it’s a significant problem and we as a startup company need to start where we see the biggest potential. So we started there and now we’re expanding for the IT industry.

Andrew Ginter
So I’m wondering, I mean, it sounds like you have more data than the NVD. I’m curious, are you youre working with the NVD? Are they gonna use your data in the future?

Dr. Carmit Yadin
So our business model is to sell data. We’re the only company in the industry today that have this data, and we’re the only organization today that are doing that. We are normalizing, fixing, and constantly updating the data for any device exists in the industry, and the only one that are doing so. So NVD should use and benefit a lot from using our data as well as any other organization. I see NVD as a great a but potential customer for us.

Andrew Ginter
Cool. So, I learned something this episode I had before I i talked to you folks, I had no idea that anyone was doing this. So, thank you for for for doing this good work. Thank you for joining us on the podcast. Before I let you go, can you sum up what what are is sort of the key lessons to to take away from our interview here?

Dr. Carmit Yadin
Internet of ThingsSo the key lessons for us today is that a managing vulnerabilities on IoT and OT devices can be easy, can be done and can be easy. a Our capability is to provide all the vulnerabilities on any device. Actually, we give a commitment that we cover any IoT and OT device provide the vulnerability, the mitigation, remediation, end-of-life data. And a we managed to create data that doesn’t exist in the industry today, and no one is doing that today. And welcome, everyone, to use to go to our website at devicetotal.com you and a sign up for a free demo, connect me on LinkedIn as well and feel free to reach out. And thank you for inviting me today. Highly appreciated.

Nathaniel Nelson
Andrew, that concludes your interview with Carmilla Yadin. To take us out here, I’m wondering, she seemed to suggest that this platform, this service was broadly applicable to all industrial IoT sorts of devices. But is there any particular industry that might need this more than others? Because for one reason or another, they were having trouble with this kind of thing before.

Andrew Ginter
That’s a good question. And on many previous episodes, we’ve had discussions of how difficult it is to patch certain kinds of industrial systems. But what I find in my own customer base is that pretty much everybody needs the knowledge. So heavy industry where there’s safety critical functions and there’s an extreme reluctance to patch still wants to know how much trouble they’re in, so that they can, when new information is available, they can reevaluate the effectiveness of their compensating measures because they can’t patch, but they need to know how much trouble they’re in so that they can figure out, have I got enough and the right kind of compensating measures in place. sort of Less consequential, let’s say, manufacturing that is less safety critical tends to patch more aggressively.

And so they need to know what patches are available and which are more important than others so that they can get those patches applied. So in in my experience, sort of everybody wants this knowledge and they’re going to use it for different purposes. What struck me about the episode was sort of lifting the lid on how all that asset management stuff works. I really didn’t know that there was, I did not know there was this, this, opportunity in the ecosystem for a data science, a service provider providing a lot of data. And now I know that this these people exist. It’s a sort of a look behind the scenes I found interesting. I was also happy for the first time in my life to have a concrete example of data science.

I heard the phrase before and always scratched my head going, what’s that? New fangled language. Well, here is a very large amount of data that needs to be managed, needs to be made available to lots of different kinds of consumers, from people to machines that do asset management to machines that draw conclusions about, well, if you have these vulnerabilities and those vulnerabilities in the same network,

Andrew Ginter
You might be subject to this sort of bigger problem. That kind of of analytics might even be AI-based. These are all services you can provide, conclusions you can draw once you have machine machine access to the data. So data science for for OT security, it’s nice to have an example.

Nathaniel Nelson
Well, thank you to Carmit for speaking with you, Andrew. And Andrew, as always, thank you for speaking with me.

Andrew Ginter
It’s always a pleasure. Thank you, Nate.

Nathaniel Nelson
This has been the Industrial Security Podcast from Waterfall. Thanks to everyone out there listening.

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post OT Security Data Science – A Better Vulnerability Database – Episode 133 appeared first on Waterfall Security Solutions.

]]>