-
Recent Posts
- ICS-ISAC and ISAC Member Automatak both Fall 2013 HOST Investment Awardees
- Supporting Middle Eastern Entrepreneurialism Improves Global Security
- The Proliferation of Sharing Centers: A Response to Bob Huber’s Digitalbond Post.
- Raytheon Trusted Computer Solutions Joins ICS-ISAC as Supporting Member
- Securing the Internet of Everything
Follow us on Twitter
My TweetsRecent Comments
- Raytheon Subsidiary Joins Industrial Cybersecurity Network; Ed Hammersla Comments | ExecutiveBiz on Raytheon Trusted Computer Solutions Joins ICS-ISAC as Supporting Member
- Tripwire Joins ICS-ISAC As Sponsoring Member | ICS ISACICS ISAC on Situational Awareness Reference Architecture (SARA)
- ICS-ISAC Week in Brief (4AUG13) | ICS ISACICS ISAC on Knowledge Centers
- ICS-ISAC Week in Brief (28JUL13) | ICS ISACICS ISAC on Situational Awareness Reference Architecture (SARA)
- ICS-ISAC Week in Brief (21JUL13) | ICS ISACICS ISAC on Situational Awareness Reference Architecture (SARA)
Archives
- November 2013 (1)
- August 2013 (7)
- July 2013 (7)
- June 2013 (6)
- May 2013 (1)
- April 2013 (1)
Categories
Meta
-
Category Archives: All
Knowing Too Much
It has been said that Isaac Newton was the last person to know everything. For three centuries we have lived in a world where not even the most dedicate lifelong student is capable of consuming all available knowledge. We left … Continue reading
Posted in All, Chair's Corner
Leave a comment
Where Oh Where is the Knowledge to Share? an ICS ISAC Briefing
Wed, Jul 17, 2013 1:00 PM - 2:30 PM EDT In this panel discussion industry experts investigate the possible sources and application of the knowledge needed to secure critical infrastructure. Questions the panel will ponder include: - Is it the … Continue reading
Posted in All, Briefings
Leave a comment
Enough to Know
As we consider the construction of national and global situational awareness systems to secure our manifestly complex infrastructure we run into a range of hurdles. Several of the more critical hurdles relate to the scope of the datasets needed. How … Continue reading
Posted in All, Chair's Corner
Leave a comment
Control Systems - Doing it right
by guest blogger Slade Griffin, Director of Critical Infrastructure Security, Contextual Security I spent the past three years or so performing penetration testing and security assessments on grid-modernization products and systems primarily in the distribution system. I saw many vendors … Continue reading
Posted in All, Guest Blogger Articles
Leave a comment
The Elephant in the Dining Room
Years ago as a brand new IT manager I was given a project: Make the client HIPAA compliant. Multiple hospitals. Even more health centers. Affiliate and third-party network access. No budget. No additional staff. No relief on existing deadlines. I … Continue reading
Posted in All, Guest Blogger Articles
Leave a comment
A Dearth of Public Data
On the topic of infrastructure cybersecurity it has long been a primary point of public discourse that the US federal government needs to find ways to share more information with the private sector. The basis of this argument is that … Continue reading
Posted in All, Chair's Corner
Leave a comment
Sourcefire Joins ICS-ISAC as Supporting Member
Washington DC, June 20, 2013 - The Industrial Control System – Information Sharing and Analysis Center (ICS-ISAC) announced today Sourcefire, Inc., a leader in intelligent cybersecurity solutions, has joined as a supporting member in a collaborative endeavor to advance cybersecurity … Continue reading
Posted in All, New ICS-ISAC Members, Press Releases
Leave a comment
Hammer Time… Forging the ICS-ISAC Situational Awareness Reference Architecture (SARA)
There are times for finesse and then there are times for blunt force. Determining which is which is often the defining characteristic of success in any endeavor. The ongoing efforts to address the cybersecurity risks and threats to industrial systems … Continue reading
Posted in All, Chair's Corner
Leave a comment
Spring 2013 Newsletter
As we close out the Spring 2013 season it is time to pause and reflect on where we have been as a Center, where we are now, and share our vision for the second half of 2013 and beyond. Just one year … Continue reading
Posted in All, Newsletters
Leave a comment
Building Trust Among Cyber Tribes
Enabling Yemen to Flourish in the International Community Though Cybersecurity Infrastructure and Workforce Development By: Chris Blask and David Alley Sixty thousand years ago, a small group crossed the shallow Red Sea at the Bab Al-Mandeb and began the human … Continue reading
Posted in All, Chair's Corner
Leave a comment