TRANSCRIPTEnglish

Getting Started in ICS/OT Cyber Security - 20+ Hours - Part 1 (Course Introduction)

57m 2s9,775 words1,384 segmentsEnglish

FULL TRANSCRIPT

0:01

hello and welcome to getting started

0:03

with industrial icot cyber security I

0:06

appreciate you taking the time to check

0:09

the video out and and hopefully you'll

0:11

find uh some good information resources

0:14

that you're looking for maybe some

0:15

answers to your questions about

0:18

literally how to get started in

0:19

industrial cyber security so my name is

0:22

Mike hul and uh again I appreciate you

0:24

for uh wanting to come check out the uh

0:27

class so real quickly a couple of

0:30

disclaimers so the information that I'm

0:33

going to be sharing is informational

0:35

purposes only and that all the

0:37

information that you are going to learn

0:39

is expected to be used for the forces of

0:42

good and not for the the forces of evil

0:45

you know ideally we're going to be

0:47

talking about things like different

0:49

cyber security attacks against

0:51

industrial control and it environments

0:53

and how to conduct those different types

0:55

of attacks so we learn this information

0:58

we share this information to make

1:01

ourselves better cyber security

1:03

Defenders and that's the really the main

1:05

goal of this course so not to use that

1:09

information to become an attacker so

1:12

hopefully everybody gets the the idea

1:15

there and then all the information I

1:17

discussed in the course is really my own

1:21

opinions it's not necessarily affiliated

1:23

with my day job or any of the other

1:26

organizations that or clients that I'm

1:29

affiliated with

1:31

so so I did include this slide that I

1:34

usually keep this in or use this slide

1:36

when I'm doing this class live and so

1:39

we've had I think about a thousand

1:41

people come through this this course

1:43

live uh over the last year so there

1:45

which is really exciting U and also

1:47

wanted to get it out on on YouTube for

1:49

those that that couldn't make the the

1:51

classes but uh and we'll be talking

1:53

about uh robly probably a lot throughout

1:57

the course and you Robble if you're not

2:00

familiar so Rob Le is the CEO and

2:02

founder of

2:04

dragos and they are the world leader in

2:07

industrial control cyber security and

2:09

that's really because Rob Lee is

2:11

considered the the true thought leader

2:14

at the the global level in industrial

2:16

control cyber security his mentor

2:19

Michael Assante who had passed away

2:21

unfortunately a couple years ago but he

2:23

really was seen as the person that

2:25

really started the field of industrial

2:28

cyber security so this incredible

2:30

lineage that uh between Michael Asante

2:35

and and and many others that we're going

2:36

to be talking about through through the

2:38

course but Rob's probably the the one

2:40

person we'll mention most uh as as we go

2:43

along and I have a lot of you know share

2:45

stories that he shared um that that I'm

2:49

able to you know share with everyone if

2:52

if it's something that he shared like in

2:53

a class or in a speech um you it's

2:57

definitely there's other things that he

2:58

shared in the past that are only for you

3:01

know for it's not my place to share

3:03

those things but but definitely the the

3:05

ones that that I'm able to I think it

3:07

helps really bring a lot of light and

3:10

character into some of the the shadows

3:13

of of ICS cyber security and he really

3:17

does an incredible job of demystifying

3:20

IC cyber security which I've always

3:22

appreciated it trying to make it simple

3:25

and practical for people to understand

3:27

and that's really one of my goals as

3:29

well so uh so in larger groups when you

3:32

have a couple hundred people in Discord

3:34

we like to say you do you just don't be

3:37

a a jerk you know so so be uh be uh be

3:41

nice to everyone but again I just so I

3:43

just kept it in there just to really

3:45

introduce robly that again we'll be

3:47

talking about him more than a few times

3:50

I'm sure as we go throughout the

3:52

course so what we're going to be

3:54

covering uh in this first section so

3:56

we're going to talk about uh a little

3:58

bit give you a little bit volume my

4:00

background so maybe understand why you

4:02

should or maybe shouldn't listen to me

4:05

uh we'll talk about you know the purpose

4:07

of the course why I put it together the

4:08

goals of ultimately what you're going to

4:11

look at getting out of the course we

4:14

going to have some references and course

4:15

materials that that we'll be looking at

4:18

uh we'll go over the different units or

4:21

modules that make up the course and then

4:23

we'll wrap up with a discussion on cyber

4:26

security certifications for icot cuz

4:29

that's one of the most common questions

4:31

that I get so we want to put that in

4:33

this introduction section because it

4:34

really doesn't fit in any of the other

4:36

modules and then we'll also talk about

4:39

some additional resources like

4:41

conferences and podcasts that that you

4:43

can either attend or or listen to to get

4:45

a lot of great

4:47

information on Industrial control cyber

4:51

security so for those of you that don't

4:53

know me my name is Mike hul I'm the

4:55

floor fellow for cyber security so I

4:59

work at a company called floor we're one

5:01

of the world's largest engineering and

5:03

construction companies in the world so

5:05

we build and sometimes operate some of

5:08

the world's largest industrial control

5:11

environments and I get to work with some

5:12

of the best engineers in the world which

5:14

which is

5:16

really um fascinating position to be in

5:19

because I can learn so much from from so

5:22

many different people and from all over

5:24

the world and all different types of

5:26

companies in all different sectors so be

5:29

talking about I'll share as much of that

5:32

experience as as I can throughout the

5:34

course as well I am also the global lead

5:37

for the floor icot cyber security

5:40

perspect uh program or practice if you

5:43

want so we'll talk a little bit more as

5:45

we're going throughout the course and

5:46

what that really means from a practical

5:48

experience also run a couple of uh local

5:51

cyber security groups so I run the the

5:54

local Issa chapter which is more

5:56

associated with it cyber security I've

5:58

been doing that for

6:00

almost 20 years at this point and also

6:03

the local version of uh bsides that we

6:06

have here in Greenville so we'll also be

6:08

talking about those as we go uh

6:10

throughout the course uh I also wrote

6:13

and taught all of the six cyber security

6:17

courses that make up the local technical

6:19

colleges cyber security program uh which

6:21

I was really proud of because there are

6:22

a lot of really handson you know true

6:25

like practical experience Hands-On Labs

6:27

that they put in the the courses so I

6:29

was really really excited and and proud

6:32

of that work I have a lot of cyber

6:34

security certifications I've been in it

6:37

cyber security for a little over 25

6:39

years and I've been you working into

6:42

getting into OT cyber security since

6:45

2010 so not as long but uh uh for about

6:50

what 13 years when I started it was

6:52

really I didn't get really a lot of

6:54

traction till about 10 years ago into

6:57

the field so that's another reason why

6:59

put this course together to to help

7:02

people that want to make that transition

7:05

whether it's from it cyber security or

7:06

if you're an OT today and and want to

7:09

learn more about cyber security so so

7:11

we'll be talking about some of those

7:12

certifications I'm actually finishing up

7:14

my Master's Degree right now I'm writing

7:16

my thesis on kind of PLC cyber security

7:21

uh which those are programmable logic

7:22

controllers if you don't know what that

7:24

means yet you will after the next

7:26

section or two so don't worry about that

7:29

uh so uh but we'll talk a little bit

7:31

about that and the thesis and and uh and

7:35

then I do some outside training and

7:38

Consulting outside of the floor world as

7:40

well so I've worked with a couple

7:42

manufacturing entities now and some

7:44

other uh really small well more medium

7:46

to large size environments so that uh

7:50

I've been really fortunate and lucky to

7:52

to work with yeah so I'm really really

7:54

happy about getting to do uh all those

7:57

different projects I just like going

7:58

into new environment and working with

8:00

people and and helping them become

8:02

secure so uh in my my floor world in the

8:07

OT or the operational technology or

8:09

industrial control side uh so you can

8:11

see in the upper left that was actually

8:13

my first project I actually got to go on

8:15

site for it was a large traditional

8:18

power plants actually uses natural gas

8:20

to to generate electricity so we're

8:23

going to actually be talking about uh

8:26

that uh project as an example of how a

8:29

overall industrial site comes together

8:33

using the the power plant example so I

8:36

worked on the new New York Bridge not

8:38

not a lot of control systems on Bridges

8:40

there's there's some but uh so still

8:45

exciting project that's north of New

8:47

York City and a bridge that goes over to

8:49

the Jersey side so uh we run the Subways

8:54

in in several big cities in the United

8:57

States uh one that I recently L have

8:59

worked with is in Denver Colorado so

9:02

those of you're not familiar Denver is

9:03

kind of right in the middle of the

9:05

United States so uh that was uh that was

9:09

their their picture there and then in

9:11

the kind of the lower left is our

9:13

largest project that were building for

9:15

Shell which is called shell lngc it's a

9:19

LG uh Port facility so we bring in uh

9:22

natural gas liquefy it and load it onto

9:25

container ships and it's actually

9:27

Shell's largest project is well it's a

9:29

$50 billion project just to kind of get

9:33

an idea of size and scope and when you

9:35

look at that picture the idea is it

9:37

doesn't maybe look that big but really

9:41

say it's kind of like a small City it's

9:43

really more like a mediumsized city the

9:46

the LG storage tank which you can kind

9:48

of see in the bottom still has the

9:50

cranes around it as they are building it

9:52

but and I remember talking about this as

9:54

part of the risk assessment and we'll

9:56

get into that later in the course but

9:58

talk about the the storage tank that is

10:00

aligned with sensors because you have to

10:02

monitor over time because natural gas

10:04

can become unstable and and could

10:06

explode and when you look at the tank

10:09

itself it's actually the size of a large

10:12

Sports stadium so it's a little hard to

10:14

tell maybe from the scale of the picture

10:17

but that then starts to you can really

10:21

maybe start to get an idea of how large

10:24

that that project actually is so but

10:27

that gives you a little bit of

10:28

background I work on some other projects

10:29

of course as well and a few we'll talk

10:31

about uh anything that's publicly

10:34

available uh that you know I'm

10:36

definitely free and and open to to talk

10:38

about so so that's a little bit about me

10:42

and uh real quickly uh if you haven't

10:44

seen most people find me through

10:45

Linkedin so definitely feel free to

10:48

reach out you can follow you can reach

10:49

out and connect send send me a message

10:52

if you have questions on the course

10:53

material usually LinkedIn is the best

10:55

way to get a hold of me so so you can

10:57

find me there I'm always I'm always

10:59

there so so that's the one place that's

11:01

better than email even uh or my cell

11:03

phone probably that to get a hold of me

11:06

uh you can also see in the little banner

11:07

I did write two different little ebooks

11:10

that are free and about getting started

11:13

in industrial cyber security and one is

11:16

actually written for those of you that

11:19

are coming from an IT cyber security

11:22

background and if you're coming from an

11:24

OT uh automation background then there's

11:28

a a version that's written for you so so

11:31

probably about 80% of the content is

11:33

about the same it's just the the first

11:35

15 20% of the content where depending on

11:38

which world you come from the steps that

11:41

you're going to take first to get into

11:43

cyber security industrial controls is is

11:47

different and

11:49

so the books really can help you walk

11:53

through that process and and just

11:56

provide a lot of resources and kind of

11:58

thoughts on on how best to go about

12:01

getting into industrial cyber security

12:04

and for for me in 2010 when stet first

12:07

came out and we'll talk more about that

12:09

later on that was really what started

12:11

getting me down that path into

12:14

industrial cyber security the problem

12:17

was nobody wanted to talk about it back

12:19

then there really weren't any books

12:20

there was very little information on the

12:23

internet so it it's a very uh you know

12:27

black magic that nobody knew you know

12:29

how it actually worked and and sometimes

12:32

it can be like that even today

12:34

thankfully especially over the last

12:35

couple of years and and a lot of the

12:37

work by people like Michael Asante and

12:39

Rob Lee you know the community has

12:42

really opened up over the the last

12:44

couple of years and and there's still a

12:47

lot of great information out there but

12:48

it can still also be overwhelming again

12:50

that's a big part of why I put those

12:52

books together and why I put this class

12:55

together so ultimately

13:00

why the class though and why am I in

13:03

industrial cyber security and and why

13:06

today so and right now I'm recording

13:09

this it's November of

13:11

2023 so 2024 is coming very quickly the

13:15

industrial control cyber security

13:18

landscape has changed

13:20

dramatically over the last couple of

13:23

years especially the last couple years

13:25

and and even the last couple of months

13:27

whereas prior to really 20 what

13:32

21 that really not much had changed for

13:36

years for decades and so it's a really

13:39

exciting space to be in right now

13:41

because things things are really

13:43

starting to change and for us as

13:47

Defenders not not in a good way

13:49

unfortunately because we are seeing the

13:52

number of attacks are going up every

13:55

year they're doubling they're tripling

13:57

against our OT or industrial control

14:00

environments and in some more sensitive

14:02

environments like if you're in the

14:04

Ukraine that you they're seeing you

14:07

anywhere from 10 to 100 fold increases

14:10

depending on the the day of the week

14:12

just you know insane amounts of

14:15

increases of attacks against things like

14:18

critical

14:20

infrastructure what we really saw was a

14:23

big shift and this go about two and a

14:25

half years ago with the colonial

14:27

pipeline breach which we're going to

14:28

talk talk a lot more about and in course

14:30

and you'll hear me mention it a lot as

14:33

really this kind of demarcation point

14:37

for in control system cyber security

14:40

because before Colonial pipeline about 2

14:43

and a half years ago not everybody in

14:47

OT really worried about cyber security

14:51

because they were just worried about

14:54

nation state attackers but Colonial

14:56

pipeline wasn't taken off line because

14:59

of a nation state attacker like Russia

15:02

or China or the United States it was a

15:04

ransomware group and we normally

15:06

associate ransomware groups with you

15:08

know General

15:09

it and now we see ransomware as the

15:13

number one threat against both it and OT

15:16

environment so there's a lot we're going

15:19

to unpack there so I don't want to jump

15:22

too far ahead but another problem that

15:25

we see is that more and more

15:29

and this is just increasing every day

15:32

that the types of systems we have in it

15:35

like windows-based systems are moving

15:36

more and more into OT which makes it

15:39

easier for us to run and manage

15:41

facilities but it also makes it that

15:43

much easier for attackers so not only

15:46

are we seeing more attacks and more

15:48

attackers but we're also seeing more

15:51

systems that are easy for the attackers

15:53

to break

15:55

into we're also allowing a a lot of my

16:00

opinion too much communication between

16:01

the it networks and the the OT networks

16:05

at a at a

16:07

location and so if you're at let's say a

16:09

power plant you have an IT side of the

16:11

house and you have an OT side of the

16:13

house and you want to keep those as

16:15

separated as possible but it's not

16:18

always as easy just to say they're

16:20

completely you know cut off from each

16:22

other that that doesn't work so we do

16:25

allow some communication but we have to

16:27

do that as secure as possible so we're

16:29

going to be talking about that we have

16:31

an entire section dedicated to that

16:32

later

16:37

on we also look at so we're going to

16:39

talk about owners and operators in the

16:42

OT space so owners are it's a company

16:45

that owns say like a power plant so the

16:47

the power plant I was mentioning earlier

16:49

that was owned by Dominion Energy now

16:52

the people that run the power plant that

16:55

keep it up and running generating

16:56

electricity for the public that could be

16:58

the same company it could be Dominion

17:00

Energy employees or they could Dominion

17:04

Energy could pay someone another company

17:06

to run the power plant for them so

17:09

sometimes owners and operators can be

17:10

different companies or like I believe

17:13

with the the Dominion Energy power plant

17:16

they're the owners and they also operate

17:19

the facility as well but we still see a

17:22

lot of owners and operators even in 2023

17:25

don't think that their OT environments

17:27

are targets

17:29

uh which to me is probably one of the

17:31

most

17:32

concerning uh problems that we have

17:34

today so big part of what I work on is

17:38

really in a lot of respects security

17:40

awareness and helping owners and

17:42

operators understand that that they are

17:44

targets of attack and it's again it's

17:46

not just nation state attackers we're

17:48

worried about

17:52

anymore and then ultimately why cyber

17:56

security especially in critical

17:57

infrastructure is so important is what

18:00

happens with that power plant if the

18:03

power plant goes down for a couple of

18:04

hours yeah not the end of the world

18:07

right as long as our iPhones and laptop

18:09

laptops have a couple hours on their

18:11

battery you know we'll we'll all survive

18:14

but what if it's a couple of days or a

18:16

couple of weeks or and then you get into

18:19

really worst case right months or year

18:21

without power I mean that's where you

18:23

get into Walking Dead territory right

18:25

and and the degradation of society and

18:28

that's obviously not what any of us

18:31

wants so in in the IT world I always

18:34

focus on I don't want the company

18:35

compromise because if

18:38

anything the company loses money people

18:40

are going to lose their

18:42

jobs in OT or industrial control cyber

18:46

security there's even greater Stakes

18:50

when you talk about how we support the

18:52

world around us and that's a big Focus

18:55

for me it's really I don't say it

18:57

lightly I say yeah we're here literally

18:59

to save the world or at least to protect

19:01

the world sometimes from itself we want

19:04

to make sure that especially with

19:05

critical infrastructure Power Water a

19:08

lot of these things that people take for

19:10

granted I I know I do right that that

19:13

are protected and and stay safe so

19:17

telecommunications um which plays into

19:20

you know the internet right large data

19:22

centers that provide services

19:24

manufacturing think especially like with

19:27

Pharmaceuticals

19:29

so there's a lot that comes into play so

19:32

we'll we'll be talking a lot about that

19:33

as we go throughout the

19:36

course now the course itself you can see

19:39

that yeah when I put this together it

19:41

was really designed as this highlevel

19:43

overview of cyber security when it comes

19:46

to Industrial control environments like

19:50

power plants or manufacturing or we talk

19:54

about mining or rail or and the list

19:57

goes on and on so we'll talk about a lot

20:00

of different types of environments

20:01

that's another thing I'm very fortunate

20:03

about working at floors I get to work in

20:06

so many types of of environments there's

20:09

very few different types of sectors we

20:11

actually don't don't work in and and we

20:14

work in just about every country on six

20:17

continents used to be on Seven

20:19

Continents so uh so we've you know been

20:23

a little bit all over uh so again I get

20:25

to bring in a lot of experiences

20:28

and and knowledge from over the years to

20:30

be able to share so it's this is not of

20:34

course this is just a over over overview

20:38

uh and then like just like in in general

20:41

it cyber security right we're kind of

20:43

scratching the surface and then there's

20:45

different areas that you can dive deeper

20:48

into and hopefully as you're going

20:50

throughout this course you'll find those

20:51

different areas that you're probably

20:53

even more interested in and and you can

20:56

definitely take a a deeper look at at

20:59

those so uh if you're you know just even

21:02

interested in in learning a little bit

21:04

about industrial control cyber security

21:07

right it's a great great uh great course

21:10

and I think with videos on YouTube you

21:12

could just kind of flip through it as

21:14

much as you want if you're not you know

21:16

if you're not trying to really you know

21:18

deep dig in and learn and you just kind

21:21

of want to get a look and feel right

21:23

perfectly fine and then it really

21:26

ultimately then it's also about

21:29

helping people understand how do we

21:31

secure these control system environments

21:34

how do we protect our power plants and

21:36

our water water treatment facilities and

21:38

our Railways and our mines and our

21:41

manufacturing environments and so on and

21:44

so

21:46

forth a couple of the other goals a

21:49

couple things that we'll highlight as we

21:51

go throughout is we talk about how you

21:55

with people coming from an IT background

21:57

which we already started to mention it

21:59

comes into control system cyber security

22:02

differently than somebody from the

22:04

control system world so people like

22:07

people doing Engineers or technicians at

22:09

a sight maybe they're doing operations

22:11

and maintenance or uh doing things like

22:13

PLC programming or work in a a control

22:17

room but we'll be looking at you know

22:20

how do people come from the IT world how

22:22

do people come from the OT world but

22:24

ultimately it's not only how do we come

22:27

from these different worlds like I came

22:29

from a traditional it cyber security

22:31

background but how do I get to work with

22:33

people on the engineering and the

22:35

maintenance side of the house and the

22:37

automation groups right because it takes

22:40

both sides of the house to work together

22:43

because it's not just the it side it's

22:45

not just the OT side of the house we

22:47

have to work together as if it's a bad

22:50

marriage where we're either fighting all

22:52

the time or we're just not even

22:53

communicating and everybody's just shut

22:55

down nothing's getting done and

22:58

the only people that win are the

23:00

attackers and that's the the biggest

23:03

concern so one of the the areas that I

23:06

highlight that's most important for us

23:08

to work in in industrial cyber security

23:11

is how do we get OT and it people to

23:15

work together and sometimes the best way

23:17

to do that is to get them in the same

23:20

class and we'll be talking I have some

23:23

great examples of that from from over

23:24

the years that we'll be talking about as

23:26

as we go on

23:29

so there's some course materials that

23:31

we'll be referencing as we go along I do

23:34

have review questions for each of the

23:36

the modules and and then some additional

23:38

modules that we're not covering in in

23:40

this course because they're now

23:42

dedicated to their own courses like

23:44

penetration testing in in industrial

23:46

control environments right that's not

23:48

something that you can just cover in an

23:50

hour or two right that's a whole 40

23:52

hours of content and of of itself you

23:55

know so that idea but there's review

23:57

questions I have some quick start

23:58

reference guides so we'll talk about

24:00

primarily tools like showan and and and

24:03

map as well so I have some quick start

24:06

reference guid you can find those in my

24:08

GitHub repository the link is in the end

24:11

of this video so don't worry about

24:14

that and then I always recommend that

24:17

everybody at least read sandor by by

24:20

Andy Greenberg uh which is a great it's

24:24

great novel uh that talks about really

24:28

the buildup of cyber security in the

24:30

industrial control World kind of starts

24:32

off with stucked and and builds up until

24:35

I think that it was published up to a

24:36

couple years ago so also talks about

24:41

really the leadup to the current Russian

24:43

invasion of the Ukraine because Russia

24:46

has

24:47

always um not been shy about leveraging

24:51

control system cyber security attacks

24:53

against the ukrainians like when they

24:55

turned out the power they created two

24:57

blackouts one in 2015 and 2016 also one

25:01

allegedly in 2017 and then it was just

25:04

revealed last week that they also did it

25:06

in 2022 so we've had three if not four

25:09

blackouts in the Ukraine caused uh by

25:12

the Russians you know using computers

25:15

right it's that you know from that cyber

25:18

perspective so sandworm does an

25:19

excellent job of really walking us

25:22

through kind of history of control

25:25

system cyber security and it even talks

25:28

about robly in the book and some others

25:31

like uh John was hillquist I believe

25:34

it's how you say his last name over at

25:36

mandiant and some others that that are

25:39

some you know well recognized names in

25:41

in the field

25:42

so back doors and breaches is a also a

25:46

car game created by Black Hills

25:48

information security and there's a

25:51

digital online version that you can use

25:53

for free and there's an IC version that

25:56

black hills had put together with dros

25:59

Rob Le's company and so we're actually

26:02

going to look at that when we get into

26:03

the last module talking about incident

26:06

detection response because it's a great

26:08

tool especially when it's free and

26:09

online to be able to learn different

26:12

types of attacks and not just that but

26:15

how do we respond to those different

26:17

types of attacks in control system

26:20

environments so we're going to be

26:22

looking at that in the the last module

26:25

of the course so So speaking of the

26:29

different modules or the different units

26:30

so of course we're here in unit one so

26:32

we're just going over the introduction

26:34

even though I put a lot of content into

26:36

the introduction so uh we we still have

26:39

a little ways to go uh especially you

26:41

know just trying to get a lot of those

26:43

resources that that I want everybody to

26:45

be aware

26:46

of in unit two we're actually going to

26:49

then get into really what is this world

26:51

of control system cyber security and why

26:54

it's important we're going to dig into

26:56

you know the different types of attacks

26:58

and attackers and some of the history

27:00

behind control system cyber security

27:04

especially over the last you know

27:06

roughly still 20

27:08

years when we look at unit three this is

27:11

where we're going to if you're not

27:13

familiar with the different types of

27:14

control systems so when we think say

27:16

things like plc's and hmis and rtus and

27:20

IC versus scada and the list can go on

27:24

and on but we're going to talk about

27:25

what are those different types of

27:27

controls

27:28

systems and then we're going to look at

27:30

we also have specific types of protocols

27:33

in control system environments so things

27:36

like modbus and S7 and dmp3 and backnet

27:40

and there's also Wireless protocols like

27:42

zigby which I find the the most fun to

27:45

say um you know Wi-Fi just like we have

27:48

in our houses and uh apartments and and

27:51

offices right you can also find in

27:53

industrial control environments and so

27:56

you also find all the same same

27:57

vulnerabilities and security issues

28:00

there as well so there's a lot we're

28:01

going to talk about in that section and

28:05

then once we get through that I think

28:06

we're all at that point on this Level

28:09

Playing Field whether you come from it

28:10

or OT and then we can start talk about

28:12

well how do we

28:14

secure our critical infrastructure how

28:16

do we secure our OT environments so the

28:19

first place we're going to start is with

28:21

secure network architecture so how do we

28:24

allow it and OT networks to talk with

28:27

each other but hopefully in a limited

28:28

manner but still wrap security around

28:31

that to do it as securely as

28:33

possible unit five we're going to talk

28:36

about asset registers which is really

28:38

just if you're coming from an IT

28:40

background it's just a fancy way of

28:41

saying asset inventory so we want to

28:45

make sure that we have a list of our

28:47

hardware and software and firmware that

28:49

we have running in a control system

28:51

environment so we know we have or we

28:53

know what we have in the environment to

28:56

protect

28:58

the asset register is is very critical

29:00

to a lot of control system environments

29:02

so they should already have one even

29:04

though that's not always the case so

29:06

also talk about how to build one which

29:08

isn't necessarily easy and depending on

29:10

the environment you're working in it's

29:12

not safe potentially as well but it's

29:15

very critical to have a asset register

29:17

as complete as possible because then

29:20

that L lends itself to when we talk into

29:23

unit six about threaten vulnerability

29:25

management right understanding what

29:27

vulnerabilities do we have in the

29:29

environment and how do we need to

29:31

address

29:32

those how do we address them and and do

29:34

we even need to address them so so it's

29:38

definitely a lot to talk about in in

29:39

unit six unit s we take a little bit of

29:42

a s track so this is where we we're

29:45

talking almost a little bit of

29:46

penetration testing and using tools like

29:49

show in and other ENT or open- Source

29:52

intelligence gathering tools out on the

29:53

internet to see uh especially do we have

29:57

have any control system environments or

29:59

systems that are connected or exposed

30:01

directly to the internet because if

30:03

they're exposed to the internet they

30:05

they're exposed to everybody including

30:07

the attackers and the attackers will

30:08

find them and they will find them very

30:11

quickly to to Target them and and take

30:15

control over those and then use them as

30:17

a foothold into the rest of the OT or or

30:20

the it environment which they can then

30:22

use to get into the the OT Network so

30:25

we're going to spend some time uh there

30:27

and then after that that's when we'll

30:29

get into our last unit talking about

30:31

incident detection and response so when

30:34

we look at network security monitoring

30:36

how do we detect if there's an attacker

30:39

on the network right we can deploy

30:42

different tools to alert us well how do

30:44

we investigate those alerts to determine

30:47

is something malicious or not there's

30:49

some alerts that I I know if I had first

30:52

seen them when I came into OT for the

30:56

first time especially 10 years ago I

30:58

would have said ooh that's malicious

30:59

activity it's like well no that's just

31:01

normal plant plant operations so so

31:05

there's definitely a couple of things

31:06

that we want to look at there and how do

31:08

we respond response at high level works

31:12

very similar in it and OT we just have

31:15

different focuses for that response

31:18

that's what we're going to talk about

31:19

later especially the main thing to just

31:20

keep in mind not to jump too far ahead

31:24

is just in control system environments

31:26

in OT right the the main concern is

31:30

safety right making sure the people at

31:34

the side and in the the the general

31:36

public are safe and then we also worry

31:39

about the safety of the

31:42

environment and then we can talk about

31:44

the availability of the plant but that's

31:47

very different than the IT world where

31:48

we're worried about confidentiality of

31:51

data most importantly right we don't

31:52

want attackers to come in and steal our

31:55

information and that's that's still

31:57

important but that's not at the top of

32:00

the list when it comes to OT cyber

32:03

security it's the ultimate priority

32:06

Second To None is physical safety making

32:09

sure everybody on site goes home at the

32:12

end of the day to their family making

32:15

sure that if there's the general public

32:17

in in the vicinity of that plant or

32:19

wherever we're operating think of if

32:21

we're operating a you know Subway for

32:25

moving people from point A to point

32:27

right we have to make sure everybody

32:28

stays safe that is our primary concern

32:31

above and beyond anything

32:34

else so that's what we're going to be

32:36

talking about in those eight different

32:38

units for this

32:42

course now I did want to include you

32:44

know a talk a little bit or a section

32:47

around cyber security certifications

32:48

again they don't really fit in any of

32:50

the

32:51

other

32:53

modules but but it's one of the most

32:56

commonly asked questions questions that

32:57

I get and it makes sense right and I

33:01

have a lot of these cyber security uh

33:05

certification so I've taken the entire

33:07

series that of the ISA 62443 I've taken

33:11

the three s courses and and three

33:14

certifications they have a couple other

33:16

courses but they don't have uh

33:18

certifications for those in in the

33:19

control systems and then next year

33:21

they're going to debut a pen testing

33:23

course which I'm I'm excited I'm going

33:24

to go take that one and and then there

33:28

are some other certifications out there

33:29

from other companies like EXA and I

33:32

believe it's to reinland from from uh

33:35

Germany I just don't have any experience

33:38

with those I know people that have taken

33:39

those courses uh so we'll mention that

33:42

um but uh I just don't have any personal

33:45

experience with those so so the most

33:48

popular route I see people taking today

33:52

is ISA 62443 so

33:55

Isa so Isa and IEC are two organizations

33:59

that think of them kind of as sister or

34:02

brother entities they um IEC is more

34:06

internationally recognized Isa is based

34:08

out of the United States so it just

34:10

depends on what part of the world you're

34:11

you're from where you how you'll

34:13

reference it and so Isa 62443 though is

34:18

really considered the gold standard of a

34:23

literal standard of how do we create a

34:25

cyber security program for a control

34:27

system environment right it's it's a

34:29

great framework or standard in doing

34:33

that and we're going to be talking about

34:35

that a lot as we go throughout the the

34:37

course so they put together four

34:40

different

34:41

courses and if you you do have to take

34:44

the courses to take the associated

34:46

certification exams and you can see

34:48

there's the first one starts with the

34:50

fundamental fundamental specialist

34:52

That's

34:53

like kind kind of like Security Plus

34:56

from the IT world world if you're

34:57

familiar and then you can see there's

34:59

there's three additional kind of more

35:01

specialist type of rol so one for uh

35:04

maintenance the cyber security secure

35:07

network design risk assessment which

35:10

we're going to talk about risk

35:11

assessments which is a very key

35:14

component or Cornerstone of a 62443

35:18

program and then if you get all four of

35:21

those certification exams you become

35:24

what they call a Isa I 62443 cyber

35:28

security expert it does not make you an

35:31

expert in anything I hate the name right

35:34

it takes you what 10,000 Plus hours to

35:36

truly become an expert in anything you

35:38

know this is

35:41

maybe I think these are you know two to

35:43

three days average a course I think most

35:45

of them are two days so you're not going

35:48

to become an expert in anything in you

35:50

know8 nine or 10 days so I think the the

35:53

name is a little misleading and really

35:55

the courses are mostly written for

35:58

teaching cyber security like it cyber

36:01

security Basics to OT

36:03

professionals and it they course they

36:05

talk about the 62443 standard as well

36:07

that's probably about 25 maybe 30% of

36:10

the

36:11

course courses right but again it's just

36:15

try to level set expectations but it is

36:17

the one that most people gravitate to

36:19

think because it's the most widely

36:21

recognized internationally as well as

36:23

like here in the United States and it's

36:25

probably the most cost effective cuz

36:27

these classes if you're an Isa member

36:29

which is like aund I think what $25 or

36:32

so to sign up for again in US dollars

36:35

but um the courses themselves I think

36:38

all four put together is like $7,000 or

36:43

I think they're like

36:44

$1,600 each um which might sound like a

36:48

lot and and I get it still is is a lot

36:51

of

36:52

money but compared to the Sans courses

36:55

the sand courses now are are about

36:58

$10,000 to take each class and the

37:01

corresponding certification exam and

37:04

they go up about 10% every year so uh

37:07

they could be a lot more by the time you

37:10

know somebody's listening to this video

37:11

down the road I hate to say but the

37:15

gicsp is kind their entry level into the

37:18

control system uh world I took that

37:21

about 10 years ago it was great course

37:22

with Justin surl and great class though

37:27

and the best thing actually for me

37:28

really wasn't even necessarily the

37:30

content it was just I the room was had

37:32

about 100 people in Las Vegas 50 of us

37:36

were from it and 50 of us were from

37:40

OT and so the best part of that class

37:43

really was getting a getting to talk

37:46

with different people from working on

37:48

all these environments and I remember

37:50

there was a gentleman in the front row

37:51

that asked this question you the first

37:53

morning it's just a really basic

37:54

networking question and I was kind of

37:56

like wow I can answer that I I felt so

37:58

smart but then I realized it was just

38:01

the way he asked the question it just

38:03

was a completely different way of

38:05

looking at

38:06

something and I realized then it was wow

38:10

it and OT like we're we're looking at

38:12

the same thing it's just we look at it

38:14

very very differently so if you're

38:17

coming from it we have to you learn to

38:19

think like engineers and learn to look

38:22

at things from the OT perspective or or

38:24

vice versa if you're coming from OT and

38:27

then learning how to look at things from

38:29

that it perspective and then we can meet

38:31

in the middle and that's where we can do

38:33

that or over time we have people like I

38:36

like to think of myself that now kind of

38:38

have one foot in both World worlds

38:42

and can be kind of a over kind of

38:47

a a overall you know cyber security

38:51

practitioner you know from from both

38:53

worlds and that's where we need to get

38:55

to to truly protect

38:57

our OT environments because remember the

38:59

OT environments are always talking with

39:00

it

39:01

environments and almost every it

39:04

environment is talking with the internet

39:06

so there's a lot of risk so again this

39:09

is what we're going to be talking about

39:10

in this course is how do we protect

39:12

those

39:12

environments the grid course to me is

39:15

the best course you could ever take to

39:17

learn how to protect OT environments

39:19

that's actually the class that Rob Lee

39:22

actually wrote and he still teaches it a

39:23

couple times a year so he literally is

39:26

in class still teaching it I took it um

39:29

in 2017 and when I was in class with him

39:32

it was when the tcis incident was

39:34

happening and that was actually one of

39:36

those big events in the industrial

39:38

control world so it was really

39:40

fascinating that you know some of us

39:42

would go to dinner at night or have

39:44

conversations on the side and he would

39:45

be sharing with us thing a little play

39:48

byplay um you behind the scenes as what

39:52

was going on so there would be some

39:53

things we can uh can share as as we go

39:57

along but uh and even that class at

40:00

$10,000 just if if it's something that

40:03

you could afford I strongly suggest you

40:06

make every every um effort to go take

40:10

that class with Rob in person because to

40:14

again really to sit in the room with the

40:17

world thought leader in industrial

40:19

control cyber security and be able to

40:21

ask him questions is it's Priceless so

40:26

I'm think about just retaking it because

40:27

it's been it's been a while since I've

40:29

taken it and it's they've changed the

40:30

course they've just changed the labs and

40:33

again just to be able to

40:35

to work with him and ask questions to

40:38

have that I mean it's just still an

40:40

amazing opportunity and nothing against

40:43

the other people that that teach the

40:44

class as well I

40:47

just 10,000 is a lot of money so uh Gip

40:52

I actually took that as part of my s's

40:54

Masters course that's it covers the nerk

40:58

sip uh

40:59

certification uh standard so if you work

41:02

in power transmission or generation in

41:06

North America and Canada then you your

41:09

facilities have to be nerk sip certified

41:12

and so the course really teaches about

41:15

nerk siip and it's mostly I hate to say

41:18

it and I love Tim Conway who wrote the

41:20

course um does a lot of of work in power

41:25

and help investigate do and the the

41:28

power outages in in the Ukraine um so

41:31

it's a very important course for those

41:33

that work in power the CL the the test

41:36

itself though is it was really a test

41:38

about auditing the the certification so

41:41

not necessarily my my favorite but um

41:46

you know Tim's definitely one of my my

41:48

uh favorite control system folks for

41:50

sure and just like raw just really great

41:53

great people so so those are the three

41:56

courses again if you get the opportunity

41:58

to take the course with Roby you it's

42:01

still worth the $10,000 if if you have

42:03

it to spend um and then there's the

42:06

gicsp which is an introduction there a

42:08

lot of people um don't necessarily go

42:10

that because I think at this point in

42:12

time there's a lot of content out there

42:14

they might feel like like this course

42:15

maybe you don't need to go take the

42:18

gicsp if you can get you know at least

42:20

some of that at this course again we're

42:22

we're only doing 20ish hours uh we're

42:24

not covering the 40 plus that you get

42:26

out of the gicsp but it's it's a start

42:29

and it's free compared to the $10,000 so

42:33

and then Gip again is is for if you work

42:36

in nerk zip environments power

42:38

generation and transmission in in the US

42:40

and in

42:43

Canada again there's a couple other

42:44

certifications out there I don't have

42:46

any personal experience with these but

42:48

there's Exodus we have Engineers that at

42:50

the office that have some of these

42:52

certifications so um they're lower cost

42:55

they're more along the lines of the ISA

42:58

IEC courses and I've heard um you good

43:02

things about the content it's it's like

43:04

the ISA 62443 classes as well there's

43:08

you know they're two or three days so

43:10

they're not teaching you everything you

43:13

know as compared to when you go to Sans

43:14

because Sans courses are usually five

43:16

six days and they they can run like 12

43:18

hours a day so you with exent two

43:22

varland it's they're more affordable and

43:24

for the information you get what has

43:26

been explained to me is it's good

43:28

information again it's not a super ton

43:31

ton of information but it's it's really

43:33

solid information and it's more cost

43:35

effective than some of the other

43:37

Solutions so two of Ryland since they're

43:40

based out of Germany you see this a lot

43:42

more uh certification for people in

43:44

Europe where I think EXA is a little bit

43:46

more us-based so that's usually what I

43:50

typically will see but and then just

43:53

other training so cisa the cyber

43:56

security and infrastructure Security

43:57

Agency which is based out of the United

43:59

States they also work heavily with Idaho

44:01

National Labs so anything IC cyber

44:04

security related kind of in the US

44:07

typically comes out of

44:10

inl but they actually have free courses

44:13

online so there's not a necessarily A

44:16

certification goes with them but they do

44:18

a lot of free training and they used to

44:20

have to do in person I think you might

44:21

have even had to be a US citizen but I

44:24

think with Co they changed a lot of that

44:26

so they just opened it up PR to anybody

44:29

to to be able to take the courses so

44:31

also take advantage of of those classes

44:33

as well so you can go to cisa.gov and

44:36

and find all the the online

44:39

courses so the rest of this section as

44:43

we wind down we're going to talk about

44:44

just some additional resources and and

44:47

we'll be referencing a lot of these as

44:49

as we go throughout the other courses

44:50

but I did want to get them out uh ahead

44:54

you know in the beginning of the class

44:55

cuz mandatory reading I tell everybody

44:57

if you're working especially in OT cyber

45:00

security well one you have to look at

45:02

the Verizon data breach investigations

45:04

report the the one on the left hand

45:06

every year that's where Verizon now this

45:08

is it based they look at all the it

45:11

networks and all the incidents and

45:12

breaches from the previous year and look

45:16

at patterns and looking for metrics to

45:19

understand what's going on in that

45:21

previous year so how can we be better

45:23

cyber security Defenders remember most

45:27

it or most attackers that get into OT

45:30

networks come through the it Network so

45:32

it's important to understand as OT cyber

45:35

security Defenders what's going on in

45:37

the IT

45:39

world and then we also definitely need

45:42

to understand what's going on in in OT

45:44

specifically and so that's where dros

45:46

comes in so every year they do their

45:47

year in review report so same same thing

45:50

like Verizon for it but dros does

45:53

specifically for

45:54

OT

45:56

and so that's where we'll see with uh

46:00

specific to OT networks it's great

46:03

information we'll be talking about some

46:04

of that as as we go throughout so where

46:08

you look at I think they you some of the

46:10

the content they mentioned if it's just

46:12

off the top of my head but I remember

46:14

something like uh for all their pin

46:16

testing engagements like 70% of the time

46:18

it's really easy for the pin testers to

46:21

break into the OT network from from the

46:23

it side of the house right which is

46:25

which is concerning or that uh roughly

46:28

about 50% of the networks that they went

46:30

into didn't have proper network security

46:33

monitoring set up which is also very

46:35

concerning because if you don't have

46:37

proper network security monitoring set

46:39

up whether it's you have it at all or if

46:41

it's set up but it's not done

46:43

effectively then how are you going to

46:44

know if an attacker is in the

46:46

environment you're

46:49

not so you get a lot of interesting

46:53

fascinating information out there that

46:55

you can use from practical

46:57

perspective they say oh we're not doing

46:59

this today but but we need to

47:03

be so a couple other resources so

47:06

there's some great podcasts out there

47:07

that I listen to um I'm actually now

47:10

shifting myself over to the right

47:11

because I started listening like control

47:13

loop from dros it's becoming a little

47:15

bit more marketing these days though so

47:18

not as practical which is a little

47:21

little disappointing so hopefully it

47:22

changes but um there's the UNS IED

47:26

response from Dale Peterson who he runs

47:28

the sort conferences that we'll talk

47:30

about um so he's always thinking about

47:33

the future of control system cyber

47:36

security so what's coming next what's

47:39

coming down you know 3 four five years

47:41

down the road so I'll probably never be

47:43

on his podcast because I'm I'm about

47:45

protecting the here and now so sure it's

47:48

great to understand what's coming but I

47:51

I want to get the job done today not

47:53

necessarily three or four or five years

47:55

down the road so uh the c toay or you

47:58

see the it's control system cyber

48:01

security Association that's run by Derek

48:03

harp uh they have a great podcast they

48:05

always have different practitioners from

48:07

the field come in and and talk um every

48:11

week so you can learn something about

48:12

different sectors so it's really really

48:14

great show that's kind of the same

48:16

format that the other ones um follow so

48:19

waterfall um or sponsors the industrial

48:22

cyber security podcast that's hosted by

48:25

uh and gter and so I've listened to that

48:29

one for that's the one I've listened to

48:31

for the the longest and bring in

48:33

different um uh guests to talk I

48:37

actually recorded my episode with Andrew

48:40

uh last week which was really exciting

48:42

so I'm going to be the first guest of

48:44

2024 uh when they release the the

48:46

podcast that was really exciting um and

48:49

then I was just on the protect OT cyber

48:53

security podcast as well from Industrial

48:55

Defender with Aaron Crow uh and and that

48:58

was another great conversation talked

49:00

about how to get into get into iot cyber

49:04

security Aaron has a a background kind

49:06

of little bit of it and he worked in

49:08

power his dad had worked in power PL

49:10

plants uh so it was kind of part part of

49:13

his you know in the in his DNA but uh

49:16

there a lot of similarities in in kind

49:18

of our our backgrounds and can kind of

49:20

build off of that like shared experience

49:22

but different at the same time so so a

49:24

lot of great like I said I'm leaning

49:26

more towards now the protect OT and

49:28

Industrial security and then the the CSA

49:31

ones just cuz I like to hear from all

49:33

the different practitioners because

49:35

they're just bringing Real World

49:36

experience and understanding like here's

49:38

the Practical tips of how you do the job

49:40

right that's what I'm always looking for

49:42

so I think that's what I I typically

49:44

gravitate

49:45

to uh there's some great people to

49:47

follow on LinkedIn and there's other

49:49

social media I get I just do LinkedIn

49:52

now um I say you robly which you

49:55

mentioned Tim Conway who wrote nerk and

49:57

he's he's you know huge in power uh also

50:01

you know Works kind of leads the IC

50:03

program at s with with raw mentioned

50:05

Dale Peterson at S4 he's you the guy

50:08

that always thinking about what's coming

50:09

in the future you and people need to do

50:11

that for sure you know um Derek harp who

50:14

runs C TOA and then Leslie carart they

50:16

are uh lead instant response at least

50:19

now I think in North America for dragos

50:22

so so that's where they work the the one

50:24

thing I was starting to think of is that

50:27

some of these folks that which are great

50:30

you know knowledgeable experts in the

50:32

field they don't they're not very

50:33

necessarily active on LinkedIn though so

50:35

I also put together a link or a list of

50:38

people who are on very active on on

50:42

LinkedIn so I'm not going to read these

50:44

to everybody and I kept Rob on there and

50:47

you can see Derek's still on the the

50:49

list um so you can see you know who's on

50:51

both list and kind of follow them uh but

50:54

I think there was a great representation

50:56

from people you know all around the

50:58

world men and women and so I think

51:00

there's a really great diverse group

51:02

here from all different types of

51:04

backgrounds uh like Don Capelli runs Ott

51:07

for dragos which is a open Initiative

51:11

for for especially mostly focused for

51:13

small mediumsized uh OT environments to

51:16

come get free free

51:19

help um so a lot of great information

51:22

out there um you Tony Turner who I've

51:24

met through LinkedIn but through I

51:26

remember when I went to

51:28

S4 this year finally for the first time

51:31

and in the forums where people just were

51:33

talking about all these different you

51:34

know topics and questions before the

51:36

conference he was in there answering

51:39

everybody's questions like an every form

51:42

so I was really impressed and you'll see

51:46

if you look him up like on LinkedIn he

51:47

really is a a very knowledgeable expert

51:51

in the community that just wants to help

51:53

people like it like everybody else here

51:55

so uh definitely uh check them out if if

51:58

you're on

51:59

LinkedIn uh conferences we wanted to

52:02

mention real quickly so the one

52:04

conference that I go to every year by

52:05

far is the Sans IC Summit I think it's

52:07

in March may or may March April time

52:11

frame now these days it's just two days

52:14

plus you can do the training as well so

52:16

like for another five days but um the

52:19

two days is just um going in for

52:22

presentations Rob and Tim Conway are

52:24

co-chair and you see of course all the

52:26

other Sans IC instructors and other

52:29

people in the community I think this

52:30

last year was 5 600 people probably

52:34

maybe a little bit more than that um I

52:36

think for me the big moment probably for

52:38

most people was they brought the the

52:39

ceso or the CIO actually from ukro which

52:43

is the power company in the Ukraine and

52:45

he he actually flew out to talk to you

52:48

know these 6 7 800 people that are

52:51

hanging out at a conference literally at

52:53

Disney World and and then he was getting

52:56

back on a plane to go back to the war

52:58

the the next day it was pretty pretty

53:01

awe inspiring so I you can probably tell

53:03

I get a little choked up every time I

53:05

think about it so uh S4 um definitely is

53:09

a great conference to see I think

53:10

there's about 12 13,400 people that go

53:13

there it's probably one of the larger

53:15

you know cyber security uh conferences

53:17

for Control Systems uh and that's in

53:20

Miami every year in now I think uh the

53:23

next one is in March early March so uh

53:26

I'll definitely be there I already got

53:28

my ticket so uh CS 4ca I actually set on

53:31

The Advisory board for them and so I'm

53:33

really excited to get to go that's going

53:35

to be in I think Austin in or Houston in

53:38

uh March 2024 so really excited about

53:41

that and the ICS Village they do a lot

53:43

of different conferences so they're at

53:45

like Defcon and blackhead and and some

53:48

others I'm trying to work with them to

53:49

get them at our local bids hopefully for

53:52

next year cuz we're going to have a a

53:53

track or an entire day dedicated for

53:55

icot cyber security uh dros disc I went

53:59

to dros that's their one-day conference

54:01

it's mostly for clients and partners so

54:05

uh and they they present all of their

54:06

research which is really really great so

54:09

it was really great and and gets the a

54:11

lot of people get see a lot of people

54:12

I've met on LinkedIn for the first time

54:14

in in in real life so that was a lot of

54:16

fun so the local bides conferences they

54:19

pop up everywhere like said I mentioned

54:21

I run the the local Greenville one so a

54:24

lot of I talk at Green besides Augusta

54:28

in Georgia not not long ago uh on as you

54:32

might imagine industrial control cyber

54:33

security so you can find those types of

54:36

events everywhere so cyber Senate are

54:39

smaller events run by um Jameson his

54:42

last name is blanking on me he but um

54:46

but you know you get 50 60 people but

54:48

really quality events and the people

54:49

that are there are just absolutely

54:51

amazing some of the best talks I've had

54:55

with people um at conferences ever so

54:58

I've been really excited about those um

55:00

and then hack the capital which kind of

55:02

goes along with the IC Village folks uh

55:04

where that's their um dedicated cyber

55:07

security conference

55:09

in DC so and there there's some others

55:13

definitely out there but those are the

55:14

big ones for me and I'm definitely

55:15

always at the Sans IC Summit and S4 now

55:18

and Cs forca and then try to get to as

55:21

many of the other ones as as possible so

55:26

and then finally we'll get to the end uh

55:29

if you are looking for other resources

55:31

that I put together so I have my h.com

55:33

that's kind of the main clearing house I

55:36

guess you can go to now for all the

55:37

different links I have a GitHub

55:39

repository that's where you can find all

55:42

the references that we talk about in the

55:45

the course and then also the well

55:48

YouTube channel which you're obviously

55:50

watching right now so I don't

55:52

necessarily know if I need to list that

55:53

out but you usually if I'm teaching this

55:55

for other groups it probably makes sense

55:58

so and the last slide I also have a

56:02

Weekly Newsletter if you want to sign up

56:04

you can find the link on my website or

56:06

or on my my LinkedIn profile and it just

56:09

comes out on Sunday since real quick

56:11

practical like three quick things about

56:13

here's my top post from the week here's

56:15

my uh here's a maybe a top podcast I

56:18

listen to or article I you know read

56:22

that I thought was really useful and and

56:24

that's it

56:25

nothing nothing crazy so just things to

56:28

to help people so so that's it to

56:31

finally wrap up the entire introduction

56:33

so like said I kind of throw try to

56:35

throw everything in the kitchen sink in

56:37

the very end but I wanted to make sure

56:39

to highlight those resources before then

56:41

we jump into the the rest of the course

56:45

and start learning about securing

56:49

industrial control environments so thank

56:51

you again for tuning in and uh I'll see

56:54

you

56:55

in unit

56:58

two

UNLOCK MORE

Sign up free to access premium features

INTERACTIVE VIEWER

Watch the video with synced subtitles, adjustable overlay, and full playback control.

SIGN UP FREE TO UNLOCK

AI SUMMARY

Get an instant AI-generated summary of the video content, key points, and takeaways.

SIGN UP FREE TO UNLOCK

TRANSLATE

Translate the transcript to 100+ languages with one click. Download in any format.

SIGN UP FREE TO UNLOCK

MIND MAP

Visualize the transcript as an interactive mind map. Understand structure at a glance.

SIGN UP FREE TO UNLOCK

CHAT WITH TRANSCRIPT

Ask questions about the video content. Get answers powered by AI directly from the transcript.

SIGN UP FREE TO UNLOCK

GET MORE FROM YOUR TRANSCRIPTS

Sign up for free and unlock interactive viewer, AI summaries, translations, mind maps, and more. No credit card required.