Anton Shipulin / Personal Channel
142 subscribers
149 photos
4 videos
144 links
ICS Security Fan • Industrial Cybersecurity Evangelist at Nozomi Networks • @RUSCADASEC Community Co-founder • @Info_CCI Coordinator • @BEERISAC 050 • CISSP • CSSA
Download Telegram
Запись вебинара с обновлениями в программах сертификации ISASecure: ISA/IEC 62443 Certifications in 2022: The ISASecure Program

https://register.gotowebinar.com/register/8292117995444289296
Выпускная работа от Sean McBride, автора уникальной университетской программы по промышленной кибербезопасности «Industrial Cybersecurity Engineering Technology» в Idaho State University описывающая опыт построения программы: «Foundations of Industrial Cybersecurity Education and Training». Может быть интересна тем, кто создает свои программы обучения и сертификации по теме промышленной кибербезопасности

https://industrialcyberforce.org/phdthesis
- Clarification of differences between industrial cybersecurity and common cybersecurity for use in guiding education and training
- Comprehensive review of current state of industrial cybersecurity education and training guidance documents/efforts
- Proposed workforce development framework for industrial cybersecurity
- Archetype industrial cybersecurity job roles
- Knowledge categories, topics and justifications
- NSA CAE-style knowledge unit for industrial control systems
- Key tasks for each archetype role
- Leverage point for future standard development
- Historic documentation of process used to create the world’s first cybersecurity education and training standards
Guidelines for cyber risk management in shipboard
operational technology systems:

- Communication Systems
- Propulsion, Machinery and Power Control Systems
- Navigation Systems
- Cargo Management Systems

https://arxiv.org/abs/2203.04072
Forwarded from BIS Inside
This media is not supported in your browser
VIEW IN TELEGRAM
Киберарена — для смелых!

Если рутина информационной безопасности нагоняет тоску и так не хватает свежего взгляда на профессию, Киберарена — для вас!

Команда Антона Шипулина покажет в интеллектуальном состязании со своими коллегами, что такое отвага, напор и воля к победе.

28 апреля 2022 следите в прямом эфире года за ходом соревнования, голосуйте за самых достойных и получайте новые впечатления!

Киберарена — уже скоро: https://arenacyber.ru/
New Operational Technology Cybersecurity Controls (OTCC-1:2022) by The National Cybersecurity Authority (NCA) of the Kingdom of Saudi Arabia (HT: Can Demirel)

https://nca.gov.sa/en/pages/otcc.html
The European Union Agency for Cybersecurity (ENISA) introduces a framework to perform cybersecurity market analyses and dives into the market of the Internet of Things (IoT) distribution grids for validation.

https://www.enisa.europa.eu/news/enisa-news/cybersecurity-market-analysis-in-support-of-informed-cybersecurity-business-decisions
Taxonomy of Attacks on Open-Source Software Supply Chains

https://arxiv.org/abs/2204.04008
New study on implementation of coordinated vulnerability disclosure (CVD) policy at the national level in Europe by ENISA

https://www.enisa.europa.eu/publications/coordinated-vulnerability-disclosure-policies-in-the-eu
The Department of Energy (DOE), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) are releasing this joint Cybersecurity Advisory (CSA) to warn that certain advanced persistent threat (APT) actors have exhibited the capability to gain full system access to multiple industrial control system (ICS)/supervisory control and data acquisition (SCADA) devices, including:

- Schneider Electric programmable logic controllers (PLCs),
- OMRON Sysmac NEX PLCs, and
- Open Platform Communications Unified Architecture (OPC UA) servers.

https://www.cisa.gov/uscert/ncas/alerts/aa22-103a
A current state of the Common Weakness Enumeration (CWE) for industrial control systems (ICS) and operational technology (OT) by MITRE

https://cwe.mitre.org/data/definitions/1358.html

CWE-CAPEC ICS/OT Special Interest Group:

https://github.com/CWE-CAPEC/ICS-OT_SIG
I am very excited to announce that I have joined Nozomi Networks team in Dubai office as an Industrial Cybersecurity Evangelist. I’m looking forward to joining efforts with the company to build cyber resiliency of Industrial critical infrastructure globally.
 
As I begin the next chapter of my career, I’d like to thank Kaspersky for the opportunity to work for the global company, with a great corporate culture and a great team. I’ll miss the team and always be happy to meet them.

https://www.nozominetworks.com/