Chapter

Plant Cybersecurity and Incident Response
listen on Spotify
14:13 - 22:30 (08:17)

The comparison of the program and logic files used in plant systems to the safety controller is crucial in detecting malware and advanced adversaries within the environment, providing a safer workplace for employees and equipment. In the case of an incident response, dealing with hazardous situations becomes critical as attackers may trigger time bombs or backdoors, which could be detrimental to people's safety.

Clips
The process of pushing program and logic files to the safety controller, and comparing them with what is running on the system to ensure reliability and security, is explained by a guest on the podcast.
14:13 - 17:32 (03:19)
listen on Spotify
Control System Security
Summary

The process of pushing program and logic files to the safety controller, and comparing them with what is running on the system to ensure reliability and security, is explained by a guest on the podcast. The importance of pulling logs and artifacts from devices amidst potential threats from untrusted parties is emphasized.

Chapter
Plant Cybersecurity and Incident Response
Episode
68: Triton
Podcast
Darknet Diaries
A plant worker recalls feeling uneasy about working in an unsafe plant environment with poisonous H2S gas, and later jokingly asking a process engineer about the presence of HP printers in the plant.
17:32 - 19:23 (01:51)
listen on Spotify
Plant Safety
Summary

A plant worker recalls feeling uneasy about working in an unsafe plant environment with poisonous H2S gas, and later jokingly asking a process engineer about the presence of HP printers in the plant.

Chapter
Plant Cybersecurity and Incident Response
Episode
68: Triton
Podcast
Darknet Diaries
Incident response in industrial control systems is a challenging and risky task, as shutting down the plant could result in significant financial losses.
19:23 - 22:30 (03:06)
listen on Spotify
Incident Response
Summary

Incident response in industrial control systems is a challenging and risky task, as shutting down the plant could result in significant financial losses. When dealing with advanced adversaries or system malfunction, management may be hesitant to take the drastic measures required for incident response, such as shutting down the plant.

Chapter
Plant Cybersecurity and Incident Response
Episode
68: Triton
Podcast
Darknet Diaries