Path
First-year Telecom Engineering student targeting OT/ICS cybersecurity. Pursuing Security+ → GICSP path. Looking for advice on building a strong foundation before graduation. Any guidance appreciated
First-year Telecom Engineering student targeting OT/ICS cybersecurity. Pursuing Security+ → GICSP path. Looking for advice on building a strong foundation before graduation. Any guidance appreciated
I'm a electrical engineering student, and our clg has a lab with top-notch equipment and a worldwide reputation. many CVEs . I am hoping to work as a researcher or intern there in the topic of OT security research. I've been learning and enjoying it for months, now I'm I was just wondering if firms like Claroty, Dragos, Schiendler Electric, and Siemens really hire freshers and are there relevant opportunities in this industry. Since I don't notice many employment and internship postings, I would like to know the extent of this sector and does remote jobs are available.I would like guidance and opinion.
I’ve been an Instrumentation and Controls Technician for about 8.5 years now. I’m looking to make the jump into OT/ICS cybersecurity and would appreciate any tips. I’ve been seeking out any and all trainings available, and I’m scheduled for the level 1 of ISA 62243 on a few weeks.
Currently working on an AS in computer science, then planning to transfer to a BS in cybersecurity. I have 10 classes left for the AS, and then 16 for the BS.
Title: OT/ICS people: have you seen an authorized action cause problems because it was valid but unsafe?
I’m trying to understand whether this is a real OT/ICS problem or whether I’m overthinking it.
I’m looking for real examples where:
Examples I’m thinking about:
For people who work around PLCs, SCADA, DCS, substations, water/wastewater, manufacturing, utilities, or industrial controls:
Have you seen this happen in the real world?
I’m especially interested in:
Not looking for company names or sensitive details. Sanitized stories are fine.
I’m also interested in hearing “this is already solved by interlocks/procedures” or “this would never be allowed in a mature environment” if that’s your experience.
ICYMI last week, here is my story on the new guidance from the Cybersecurity and Infrastructure Security Agency (CISA) about how to start adapting #ZeroTrust principles from IT to operational technology/industrial control systems (OT/ICS)
To be blunt, the reaction from most of the experts I spoke to was pretty "meh," about the document. Most found something to like there, but no one seemed really excited.
Why? As Dale Peterson put it, "The document is not bad or wrong, it's just not that helpful. It's overly broad, … It's high level, and this information is well known."
Tatyana Bolton of the Operational Technology Cybersecurity Coalition asked who was going pay to bring Zero Trust cybersecurity to the thousands of U.S. critical infrastructure providers below the cyber poverty line.
And both Claroty's Field CTO Sean Tufts and Nozomi Networks' Cybersecurity Director Chris Groves charged that the document dodged or fudged some big questions. Details in the story...