Thank you. Nicely explained. I understand how complex this topic is however she tried to make it as simple as it can get. Kudos to the efforts made.
@TheGroberUnfug29 күн бұрын
omg she is so brillant, thank you for this.
@skilz8098Ай бұрын
These are some of the things that we tend to overlook when it comes to any kind of system or device that is connected to and powered by some type of electrical power grid. First, you cannot stop the signal. You might be able to divert it, redirect it, transform it, but you cannot completely stop it. Voltage and current has to flow somewhere, and there's always some type of power draw. Otherwise, it wouldn't be a circuit. From there, then it's a generalization of understanding the devices and systems that are built on top of that power grid, electrical circuit system. From there it's just a matter of finding the schematics - blueprints - patent filings, etc. of said device. From there, anyone who understands how to read them, can easily reverse engineer the device without even having to have a physical device on hand. There's always going to be actors on both sides of the fence, and there's no know system to be 100% secure. However, we can take measures to mitigate those vulnerabilities as much as possible. The thing is when it comes to any type of computational devices such as a computer with a CPU/GPU etc. the entire binaries which includes, instructions, data, memory locations, etc. at the end of the day are really just representations of numbers in the form of electrical signals. It's a house of cards where every single bit is one of those cards. The card is either standing or it is not. The bit is either set or it is not. Regardless of ethical concerns, I do have to say, that this type of attack vector was well thought out, well planned, and yet even in some fashion a bit respectful. The reason I say a bit respectful is that it did not seek to "destroy or cause massive loss of life" it was specifically targeted to control specific devices to cause minimal and controlled damage. In some ways I can partially respect it from the perspective of an engagement on a battlefield. This was one hell of a chess move! And as we can see the discovery of this system back in 2010 and here in 2024 almost 2025 nearly 15 years later is still being highly studied. We'll be learning about this for the next 50-100 years. This is as about as historical as the deciphering and reverse engineering of the Enigma machine during WWII.
@lionelsisso4295Ай бұрын
Mister Moore.... you're a wonderful example... thank you sir for your metasploit 😮🙌🏿
@richyker6747Ай бұрын
I like his style of presentation, as it is straight to the point and very quick but sometimes audience complain as they can not keep up with content !I think it's more on them due to immaturity of security basics
@jasrob22Ай бұрын
Great job Sean!!!!!
@brianduffy87682 ай бұрын
Brilliant 👏
@GauravRaina2 ай бұрын
Excellent presentation, could you please suggest which tools help to follow this process?
@GauravRaina2 ай бұрын
Impressive! Much needed to bring a method to the madness of OT security.
@alaamomen80482 ай бұрын
Very impressive 👌 also appreciate the way of presenting
@GauravRaina2 ай бұрын
Good Presentation wide & deep coverage of most relevant updates on iec 62443
@udirt3 ай бұрын
no idea how i missed that talk, it was incredible. i think the extreme precision is about predictability, they wanted to know when something happens, when it will happen the next time, etc. so they could have the option of planning with it, i.e. to know when a tech would be required etc.
@aajas3 ай бұрын
56:28 An interesting counterpoint to the "different approach" is the CrowdStrike bug that shut down all the airports in july 2024. Because creating qualified images became a big pain, updates were delivered as data running like bytecode Sure it was not a "targeted attack" in the same sense, but it had the effect as one
@MrTejibaby3 ай бұрын
Excellent breakdown of all the concepts and a very clear explanation. Thanks
@Konnors_Gaming3 ай бұрын
That was awesome Nick
@silvanagiuliano52563 ай бұрын
Thank you for this video, i would love to see more
@ElizabethHurtado-py8ur3 ай бұрын
⬆️🦅🖊️🖊️
@Mintsel3 ай бұрын
Can we have access to this paper thesis?
@n00bATlarge4 ай бұрын
please stop this idiot from talking..
@MarcelKisch4 ай бұрын
Lol, there is no windows on airplanes, not even remotely. Missed opportunity to introduce air traffic incident infestigation into cyber security.
@devsuvara4 ай бұрын
Sasha Shulgin and Diffie have such a similar personality. Fascinating.
@shidokanjitsu4 ай бұрын
Volume is low
@NiklasAnderson-p7t4 ай бұрын
Speaker seems to jump over weird details and makes the story hard to follow.
@objectsecurity4 ай бұрын
for anyone that is strapped for time, I have a ChatGPT lay terms summary here - feel free to chime in if it doesn't cover the essence: - The talk questions if cybersecurity is linked to the laws of physics, particularly around uncertainty. - It suggests cybersecurity isn't just about preventing attacks but managing uncertainty, much like concepts in physics. - Early security focused on trust, but has shifted toward assessing risk. - The speaker argues that our tech wasn't designed to protect "meaning," making security harder to achieve. - The key idea is that complexity in systems creates more risk, and simplifying or limiting systems (like using specific chips or safe programming languages) helps security. - The speaker invites further exploration of cybersecurity’s connection to physics, but it's an open question. The presentation is largely theoretical, but there are some actionable ideas for cybersecurity: - Reduce complexity: Design systems with less complexity to lower risks, using tools like memory-safe languages, custom hardware, or "deny by default" settings. - Prioritize constraint: Build systems with limited, essential functions to minimize vulnerabilities and enhance security. - Optimize for meaningful data: Focus on securing meaningful information to reduce unnecessary data and limit the attack surface.
@mahkhi71544 ай бұрын
The Ba5tard is Orchestrating a REAL LIFE Billion P1G CHARADE. The Ba5tard Cant FULLY Speak The English Language AND The Ba5tard is Trying To Trick Me, He's a Hardware Hacker.
@naas6994 ай бұрын
US first to use atomic bombs against civilians US first (with Israel) to destroy infrastructure with cyberweapon Stuxnet US first to destroy infrastructure re Nord Stream - the worlds biggest environmental terrorist act US then complains stating how other countries may attack undersea communications, gas / oil pipelines etc
@danielshepard14 ай бұрын
Susan is one of the best in the field! Great job Susan!
@iangraham67304 ай бұрын
Wasn't this guy a fitness instructor? And also black? 🤔
@mrhassell4 ай бұрын
“They know everything!” - But, they don't know C++ very well. 🤣
@mrhassell4 ай бұрын
But it's true, as Ralph said; These are just design flaws. (as amusing as using loops, when struct/assert, may be preferred, speed, security, whatever…) The funny mistakes, as plentiful as they were, make no mistake, it worked.
@lanettehitechew74274 ай бұрын
They have put these nano machines into are bodies against our will and without our knowledge! That is pure evil !
@lanettehitechew74274 ай бұрын
You mean Plandemic! What a load of lies they continually peddle!!
@coggroupstructures42534 ай бұрын
Great stuff!
@vikrantvijit14365 ай бұрын
Thanks 🙏👍
@vespatex5 ай бұрын
Some great points (especially on the VC expectations) but a lot of the "proposed" trends shown here can be correlated to non-OT/ICS market related factors - the greater global economy. You'll see a similar trend in IT. Take a few steps back, wait a couple of years and this will look different.
@marcoayala62635 ай бұрын
Great talk Dan!
@serdarsimsek64155 ай бұрын
It was great. Thx you Rob.
@AlgoNudger5 ай бұрын
AI and Large-Scale Quantum Computer are always 30 yrs away. 🤭
@StraightTalkSecurity5 ай бұрын
Pretty cool Clint
@OTbase5 ай бұрын
A lot of useful information. If you want to understand OT security in 2024, an understanding of OT security market forces is a requirement, and Ted presents many important parameters. Worth a watch.
@RaimoRahkonen-n9e5 ай бұрын
Yikes, a lot of ingenious people with capabilities are using their time and resources where a lot of aspects (mainly context and connectios between applications) could have been designed and documented as part of the initial plant/process/machinery design. All that time and resources used for the actual anomaly hunt would benefit all OT parties much more.
@KH4444444444N5 ай бұрын
Normalization of deviance is now unfortunately everywhere. In everything. Like a cancer on Human progress. The devil.
@joshuaruff325 ай бұрын
Love the way you measured and broke this down 💲💲💲
@ThreatMatrixCk5 ай бұрын
This is too awesome.. Can go through it several times to consume the best
@Triton_Secure6 ай бұрын
Thank you. That was excellent.
@XuzerX6 ай бұрын
Idk what he is talking about but I feel safer knowing he is on the job! lol at “VUUUUUUULLLNNS!” 2:42