Preview Mode Links will not work in preview mode

Unsolicited Response Podcast

Nov 13, 2024

Dale Peterson speaks with Joel Langill, the SCADAHacker, about his new training course entitled Conducting Threat, Vulnerability, and Risk Assessments For ICS. A two day version of this course will be offered prior to S4x25

Of course Dale and Joel jump around a bit on training, the workforce and other items. Take a...


Jul 10, 2024

Stewart Baker is one of the preeminent lawyers on topics of cyber law with an impressive career in and out of government. Stewart also hosts the Cyberlaw podcast.

The Biden administration is contending that vendors should be held liable for security deficiencies in their products. 

Assuming this is turned into law...


Jun 26, 2024

Dale Peterson interviews Rob Lee on the S4 Main Stage. They cover a lot of ground and Rob is never shy about sharing his opinions and analysis.
They discuss:

  • Rob’s first S4
  • PIPEDREAM deployed v. employed distinction … and why 2 years later is it still the most dangerous ICS malware?
  • Are we really more...


May 15, 2024

Chris Hughes and Nikki Robinson recently wrote the book Effective Vulnerability Management. Dale and Chris discuss the topic and book including:

  • The definition and scope of vulnerabilities. It’s much more than coding errors that need patches.

  • Are ICS protocols lacking authentication “vulnerabilities”

  • The...


May 3, 2024

Waterfall Security Solutions and ICSSTRIVE put out an annual threat report that Dale Peterson believes is the best in OT. Why? It only includes incidents that had physical consequences on systems monitored and controlled by OT. 

Dale and Andrew discuss:

  • What is in and out of scope for the report.

  • The breakdown of...