Тёмный
S4 Events
S4 Events
S4 Events
Подписаться
S4 is the world's largest and most advanced ICS Security / SCADA Security and Operations Technology Event. The best in world, the influencers, 1,100 at the last event, gather in Miami South Beach every winter to Create The Future of OT and ICS security. S4x24 will be March 4 - 7.

Dale Peterson makes the S4 videos, and a lot of other content, available to foster the development of the ICS community and encourage future S4 sessions.
A RASP Journey To Level 1 Device Security
26:28
9 часов назад
The Cyber Informed Safety System
27:08
14 часов назад
Building ICS/OT Security Communities
28:02
Месяц назад
Reducing Reputation Risk In Cyber Incidents
29:34
2 месяца назад
Visibility Metrics
29:23
2 месяца назад
Spreading And Sharing The Risk
28:09
2 месяца назад
Attack Surface Analysis On Satellites
22:17
2 месяца назад
A Supply Chain Incident Taxonomy
29:43
3 месяца назад
Badgerboard : Weaseling Out The Unknown
26:36
3 месяца назад
Keeping Time In A Warzone
30:12
3 месяца назад
An Approach To Disaster Recovery In OT
22:36
3 месяца назад
A Large Supply Chain Security Program
25:56
3 месяца назад
PLCs: To Scan Or Not To Scan
32:48
3 месяца назад
Electric Vehicle Charging - Where's The Cyber
27:18
4 месяца назад
Комментарии
@Mintsel
@Mintsel 2 дня назад
Can we have access to this paper thesis?
@n00bATlarge
@n00bATlarge 6 дней назад
please stop this idiot from talking..
@MarcelKisch
@MarcelKisch 6 дней назад
Lol, there is no windows on airplanes, not even remotely. Missed opportunity to introduce air traffic incident infestigation into cyber security.
@techsuvara
@techsuvara 7 дней назад
Sasha Shulgin and Diffie have such a similar personality. Fascinating.
@shidokanjitsu
@shidokanjitsu 8 дней назад
Volume is low
@NiklasAnderson-p7t
@NiklasAnderson-p7t 10 дней назад
Speaker seems to jump over weird details and makes the story hard to follow.
@objectsecurity
@objectsecurity 10 дней назад
for anyone that is strapped for time, I have a ChatGPT lay terms summary here - feel free to chime in if it doesn't cover the essence: - The talk questions if cybersecurity is linked to the laws of physics, particularly around uncertainty. - It suggests cybersecurity isn't just about preventing attacks but managing uncertainty, much like concepts in physics. - Early security focused on trust, but has shifted toward assessing risk. - The speaker argues that our tech wasn't designed to protect "meaning," making security harder to achieve. - The key idea is that complexity in systems creates more risk, and simplifying or limiting systems (like using specific chips or safe programming languages) helps security. - The speaker invites further exploration of cybersecurity’s connection to physics, but it's an open question. The presentation is largely theoretical, but there are some actionable ideas for cybersecurity: - Reduce complexity: Design systems with less complexity to lower risks, using tools like memory-safe languages, custom hardware, or "deny by default" settings. - Prioritize constraint: Build systems with limited, essential functions to minimize vulnerabilities and enhance security. - Optimize for meaningful data: Focus on securing meaningful information to reduce unnecessary data and limit the attack surface.
@mahkhi7154
@mahkhi7154 15 дней назад
The Ba5tard is Orchestrating a REAL LIFE Billion P1G CHARADE. The Ba5tard Cant FULLY Speak The English Language AND The Ba5tard is Trying To Trick Me, He's a Hardware Hacker.
@naas699
@naas699 15 дней назад
US first to use atomic bombs against civilians US first (with Israel) to destroy infrastructure with cyberweapon Stuxnet US first to destroy infrastructure re Nord Stream - the worlds biggest environmental terrorist act US then complains stating how other countries may attack undersea communications, gas / oil pipelines etc
@danielshepard1
@danielshepard1 18 дней назад
Susan is one of the best in the field! Great job Susan!
@iangraham6730
@iangraham6730 20 дней назад
Wasn't this guy a fitness instructor? And also black? 🤔
@mrhassell
@mrhassell 21 день назад
“They know everything!” - But, they don't know C++ very well. 🤣
@mrhassell
@mrhassell 21 день назад
But it's true, as Ralph said; These are just design flaws. (as amusing as using loops, when struct/assert, may be preferred, speed, security, whatever…) The funny mistakes, as plentiful as they were, make no mistake, it worked.
@lanettehitechew7427
@lanettehitechew7427 24 дня назад
They have put these nano machines into are bodies against our will and without our knowledge! That is pure evil !
@lanettehitechew7427
@lanettehitechew7427 24 дня назад
You mean Plandemic! What a load of lies they continually peddle!!
@coggroupstructures4253
@coggroupstructures4253 Месяц назад
Great stuff!
@vikrantvijit1436
@vikrantvijit1436 Месяц назад
Thanks 🙏👍
@vespatex
@vespatex Месяц назад
Some great points (especially on the VC expectations) but a lot of the "proposed" trends shown here can be correlated to non-OT/ICS market related factors - the greater global economy. You'll see a similar trend in IT. Take a few steps back, wait a couple of years and this will look different.
@marcoayala6263
@marcoayala6263 Месяц назад
Great talk Dan!
@serdarsimsek6415
@serdarsimsek6415 Месяц назад
It was great. Thx you Rob.
@AlgoNudger
@AlgoNudger Месяц назад
AI and Large-Scale Quantum Computer are always 30 yrs away. 🤭
@StraightTalkSecurity
@StraightTalkSecurity Месяц назад
Pretty cool Clint
@OTbase
@OTbase Месяц назад
A lot of useful information. If you want to understand OT security in 2024, an understanding of OT security market forces is a requirement, and Ted presents many important parameters. Worth a watch.
@RaimoRahkonen-n9e
@RaimoRahkonen-n9e Месяц назад
Yikes, a lot of ingenious people with capabilities are using their time and resources where a lot of aspects (mainly context and connectios between applications) could have been designed and documented as part of the initial plant/process/machinery design. All that time and resources used for the actual anomaly hunt would benefit all OT parties much more.
@KH4444444444N
@KH4444444444N Месяц назад
Normalization of deviance is now unfortunately everywhere. In everything. Like a cancer on Human progress. The devil.
@joshuaruff32
@joshuaruff32 2 месяца назад
Love the way you measured and broke this down 💲💲💲
@ThreatMatrixCk
@ThreatMatrixCk 2 месяца назад
This is too awesome.. Can go through it several times to consume the best
@Triton_Secure
@Triton_Secure 2 месяца назад
Thank you. That was excellent.
@XuzerX
@XuzerX 2 месяца назад
Idk what he is talking about but I feel safer knowing he is on the job! lol at “VUUUUUUULLLNNS!” 2:42
@2amlando302
@2amlando302 2 месяца назад
He really knows his stuff 😮
@jacobthompson3441
@jacobthompson3441 2 месяца назад
English!!! Do you speak it?
@arashramez
@arashramez 2 месяца назад
What's wrong with camera?!
@LaxmiV138
@LaxmiV138 3 месяца назад
Thanks
@elizabethmogale8419
@elizabethmogale8419 3 месяца назад
Very informative
@carol-lo
@carol-lo 3 месяца назад
incredible
@kalkan19701
@kalkan19701 3 месяца назад
You are amazing.
@seasidemarkarchive4884
@seasidemarkarchive4884 3 месяца назад
Isn't this just leaking info to russians? now they can counter that.
@AlgoNudger
@AlgoNudger 3 месяца назад
Thanks.
@ChripON
@ChripON 3 месяца назад
Clearly, he has not heard of ISA-62443-4-2 and the Achilles Test Platform.
@marcelonoriega994
@marcelonoriega994 3 месяца назад
One of the presentations so far!
@GokulMohan-v5i
@GokulMohan-v5i 3 месяца назад
Enjoyed learning about SW Supply Chain Security.
@robertoferraz6996
@robertoferraz6996 3 месяца назад
Great presentation....
@hoydn2547
@hoydn2547 3 месяца назад
Nice speech!
@cpizani
@cpizani 3 месяца назад
Audio is way too low.
@Lachlan.Wright
@Lachlan.Wright 3 месяца назад
It's ok for me!
@VincentDBlair
@VincentDBlair 3 месяца назад
Indeed.
@sarahpamula778
@sarahpamula778 3 месяца назад
Did Coffee help Bill Clinton from his Lewinsky addiction in an Oval important?
@joerobinson1710
@joerobinson1710 3 месяца назад
Thanks
@to2866
@to2866 4 месяца назад
Disappointing to see Rob Lee essentially adopt Hamas talking points. Terrorist groups will utilize civilian infrastructure in order to store weapons and hostages, and will sometimes even use those sites to launch their attacks. It's utterly ridiculous to say that civilian sites which have been militarized are not valid targets in war. If we followed his advice on never hacking civilian infrastructure, we'd just be putting ourselves at a disadvantage. You don't think the military/NSA should at the very least be prepositioning themselves within adversaries' critical infrastructure in the event of a war? Ok great, but that high road has real costs. I'd rather see those costs put on the aggressors instead of our population if and when we get attacked.
@pricerj6190
@pricerj6190 4 месяца назад
Love that Rob can take a topic like ICS and make it completely entertaining. He is one hell of a dynamic public speaker and as always it's a zero bullshit / just focus on the basics approach. Well done sir!
@liljemark1
@liljemark1 4 месяца назад
I could probably listen to Rob talk about almost anything! Entertaining and so much interesting details. Thanks for sharing this interview.