Tabletop Exercises (TTX) for OT Incident Response: How to Run One That Actually Teaches You Something
Tabletop Exercises (TTX) for OT Incident Response: How to Run One That Actually Teaches You Something INCIDENT RESPONSE Most OT tabletop exercises are theatre. Everyone reads their role, agrees the plan is good, and goes back to work. A real TTX is uncomfortable, and that discomfort is where the learning happens. Here is how to […]
Conducting a Gap Assessment for Your OT Cybersecurity Program
Conducting a Gap Assessment for Your OT Cybersecurity Program GAP ASSESSMENT A gap assessment is the cheapest and most useful first step for any OT security program. Done well, it gives you a defensible roadmap. Done badly, it gives you a 60-page PDF that nobody can act on. Here is the difference. A gap assessment […]
Will AI Steal Your OT Cybersecurity Job? Here’s What I Told a Group of Students
Will AI Steal Your OT Cybersecurity Job? Here’s What I Told a Group of Students CAREER & LEARNING I recently sat down with a group of undergraduate students planning a career transition into OT cybersecurity. Their first question was not about certifications or salary. It was whether AI was going to make the whole field […]
Is It Too Difficult to Start? No. Here Is Exactly Where to Begin.
Is It Too Difficult to Start? No. Here Is Exactly Where to Begin. CAREER & LEARNING If you are looking to break into OT cybersecurity, the field can feel overwhelming. PLCs, DCS, SCADA, IEC 62443, the Purdue Model, GICSP, GRID, and fifty acronyms you have not memorised yet. Here is the good news: you do […]
What Do You Really Want From Your OT Cybersecurity Risk Assessment?
What Do You Really Want From Your OT Cybersecurity Risk Assessment? RISK ASSESSMENT Most OT risk assessments end up as thick reports that gather dust on a shelf. Before you commission yours, stop and ask a harder question first: what do you actually want it to do for you? Most OT risk assessments end up […]
Real Leadership in ICS/OT Cybersecurity Is an Attitude, Not a Title
Real Leadership in ICS/OT Cybersecurity Is an Attitude, Not a Title LEADERSHIP The best OT security leaders I know do not have “Head of” in their title. They have technicians who trust them, operators who call them before they call the vendor, and a plant manager who actually reads their report. Here is what that […]
OT Cybersecurity Is Public Safety: Why Risk Assessments Need to Go Beyond Dollars
OT Cybersecurity Is Public Safety: Why Risk Assessments Need to Go Beyond Dollars RISK ASSESSMENT When a risk assessment for an industrial plant only counts downtime, lost production and recovery cost, it is missing the largest number on the page. OT incidents can hurt people, and the way we quantify risk needs to reflect that. […]
Semiconductor Cybersecurity: What SEMI E187, E188, and E191 Mean for Fabs and Equipment Suppliers
Semiconductor Cybersecurity: What SEMI E187, E188, and E191 Mean for Fabs and Equipment Suppliers SEMICONDUCTOR The semiconductor industry finally has its own cybersecurity standards, and if you build, buy, or operate fab equipment, they already apply to you. Here is what SEMI E187, E188, and E191 require, in plain language, and what to do about […]
list of protocols
list of protocols CAREER & LEARNING | 2023-02-27 | Mr. Shamikkumar Sr No. Protocol Description Port Number Encryption Security Vulnerabilities Typical Use Cases Vendors Using It 1 BACnet A protocol for building automation and control networks. TCP: 47808 Secure Authentication and TLS encryption Vulnerable to unauthorized access, DoS attacks HVAC systems, lighting control, energy management Honeywell, […]
A guide to your Certification journey in ICS/OT Cybersecurity

If you are just starting your career in ICS/OT Cybersecurity, I would recommend you to gain the necessary knowledge first. Luckily, the knowledge is free!! Here is the detail of free training by Cybersecurity and Infrastructure Security Agency which I rate very highly compared to many paid trainings. I have briefed about those trainings here. […]