
Lessons Learned From Incident Response – Episode 139
Tune in to ‘Lessons Learned From Incident Response’, the latest episode of Waterfall Security’s OT cybersecurity Podcast.
Welcome to the resources page! We have compiled a collection of useful information, tools, and resources to help you
Tune in to ‘Lessons Learned From Incident Response’, the latest episode of Waterfall Security’s OT cybersecurity Podcast.
In this episode, Brian Derrico of Trident Cyber Partners walks us through what it’s like to use inventory tools – different kinds of tools in different environments – which have become almost ubiquitous as main offerings or add-ons to OT security solutions.
Nation state threats are often portrayed as the “irresistible forces” of cyber threats, with little qualification. Joseph Price of Deloitte joins us to dig deeper – what are nation states capable of, what are they up to, and how should we interpret the information that is available to the public?
Sit back and enjoy Andrew Ginter’s top 3 picks from 2024’s Industrial Security Podcast series.
Gary Southwell of Aria Cyber joins us on The Industrial Security Podcast as we have a look at using AI to get ahead of constantly-changing malware.
Jack Bliss of 1898 & Co. has adapted the CIS Top-18 list for OT/industrial, adding a lot of industrial context and lists of related OT-centric tools and technology.
Ransomware is the most common cyber attack causing OT outages – all Windows machines encrypted. What if we could “press a button” and have everything working again in seconds or minutes? Alex Yevtushenko of Salvador Technologies joins us to look at new technology for rapid recovery.
The Mitre CWE – Common Weakness Enumeration is database talks about kinds of problems that can show up in the future – future zero days – rather than CVE that talks about what vulnerabilities were discovered in the past. Susan Farrell walks us through the CWE and how both vendors and owners and operators use it.
How hard is it for an attacker to dig around in my network? Robin Berthier of Network Perception joins us to look at new network segmentation evaluation and visualization technology that lets us see at a glance how much trouble, or not, we’re in.
Precision farming is heavily automated, as are the “food factories” essential to feeding the world’s population. Marcus Sachs at the McCrary Institute at Auburn University joins us to look at the threats, the challenges and opportunities to secure our food supplies from cyber risk.