SlideShare a Scribd company logo
A Child Like Approach to Grid Cyber Security
Read Coil
• Robert M. Lee
• CEO of Dragos Security
• SANS ICS 515 – Active Defense and Incident Response author
• SANS FOR 578 – Cyber Threat Intelligence author
• PhD Student at Kings College London
• Non-Resident National Cyber Security Fellow at New America
• Author of SCADA and Me and writer of Little Bobby
Today’s Agenda
• Case-Study: Ukraine Cyber Attack
• Little Bobby’s Views on the World
Case-Study:
Ukraine Cyber Attack
Little Bobby’s
Recommended Practices
Little Bobby on Attribution
Little Bobby on
Nation-State Attribution
Little Bobby on
Adversary Tactics
Little Bobby on
The Media
Little Bobby on
Traditional Security
Little Bobby on
“Advanced” Security
Little Bobby on
Security Controls
Little Bobby on Upgrades
Little Bobby on
Security Certifications
Little Bobby on
Active Defense
Little Bobby on the Confusion
Around Active Defense
Little Bobby on
Network Security Monitoring
Little Bobby on
the Grid vs. Smart Cars
Little Bobby on
Metrics and Telling Your Story
Little Bobby on “Experts”
Conclusion
A Child Like Approach to Grid Cybersecurity
Contact Me (or Little Bobby)
• SANS: RobertMLee@SANS.org
• Twitter: @RobertMLee
• Little Bobby: www.LittleBobbyComic.com
• Twitter: @_LittleBobby_
Questions?

More Related Content

PPTX
OMG Cyber!
PPTX
BSides Huntsville Keynote - Active Cyber Defense Cycle
PPTX
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
PPTX
Charity: A Secret for Cyberspace by Jon Creekmore
PPTX
Dark Arts Of Social Engineering
PPTX
Keeping you and your library safe and secure
PDF
Weaponizing OSINT – Hacker Halted 2019 – Michael James
PPTX
Privacy Primer
OMG Cyber!
BSides Huntsville Keynote - Active Cyber Defense Cycle
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
Charity: A Secret for Cyberspace by Jon Creekmore
Dark Arts Of Social Engineering
Keeping you and your library safe and secure
Weaponizing OSINT – Hacker Halted 2019 – Michael James
Privacy Primer

What's hot (6)

PPTX
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
PDF
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
PPTX
Social Media Driving Licence 5 - Twitter tools: curation control and reach
PPTX
OSINT mindset to protect your organization - Null monthly meet version
PDF
From OSINT to Phishing presentation
PDF
網絡倫理 Internet Ethics
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
Social Media Driving Licence 5 - Twitter tools: curation control and reach
OSINT mindset to protect your organization - Null monthly meet version
From OSINT to Phishing presentation
網絡倫理 Internet Ethics
Ad

Similar to A Child Like Approach to Grid Cybersecurity (20)

PPTX
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
PPTX
Jax london2016 cybercrime-and-the-developer
PPTX
Protecting Your IP: Data Security for Software Technology
PDF
Open Source models security- Supply chain
PPTX
Cyber Security for the Employee - AFP Annual Conference 2016
PPTX
Charleston 2022 - Cybersecurity 101 - What Every Librarian Needs to Know abou...
PDF
BSidesLV Vulnerability & Exploit Trends
PPTX
UW Cybersecurity Lecture 9 - Social Media
PPTX
Digital Age-Preparing Yourself
PPTX
Progscon cybercrime and the developer
PPTX
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
PPTX
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
PPT
Bulletproof IT Security
PPTX
2015: The year-ahead-in-cyber-security
PDF
NSS Labs’ 2016 Information Security Predictions
PPTX
The challenge of security awareness
PPTX
Cybercrime and the Developer: How to Start Defending Against the Darker Side
PPTX
Do it Best Corp. Techapalooza 2013 Presentation
PPTX
Threat Modeling In 2021
PDF
Vulnerability & Exploit Trends: A Deep Look Inside the Data
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Jax london2016 cybercrime-and-the-developer
Protecting Your IP: Data Security for Software Technology
Open Source models security- Supply chain
Cyber Security for the Employee - AFP Annual Conference 2016
Charleston 2022 - Cybersecurity 101 - What Every Librarian Needs to Know abou...
BSidesLV Vulnerability & Exploit Trends
UW Cybersecurity Lecture 9 - Social Media
Digital Age-Preparing Yourself
Progscon cybercrime and the developer
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Bulletproof IT Security
2015: The year-ahead-in-cyber-security
NSS Labs’ 2016 Information Security Predictions
The challenge of security awareness
Cybercrime and the Developer: How to Start Defending Against the Darker Side
Do it Best Corp. Techapalooza 2013 Presentation
Threat Modeling In 2021
Vulnerability & Exploit Trends: A Deep Look Inside the Data
Ad

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Big Data Technologies - Introduction.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPT
Teaching material agriculture food technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Cloud computing and distributed systems.
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Encapsulation theory and applications.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
MYSQL Presentation for SQL database connectivity
Reach Out and Touch Someone: Haptics and Empathic Computing
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Big Data Technologies - Introduction.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Teaching material agriculture food technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Review of recent advances in non-invasive hemoglobin estimation
Per capita expenditure prediction using model stacking based on satellite ima...
“AI and Expert System Decision Support & Business Intelligence Systems”
Cloud computing and distributed systems.
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Network Security Unit 5.pdf for BCA BBA.
Encapsulation theory and applications.pdf
Unlocking AI with Model Context Protocol (MCP)
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
NewMind AI Weekly Chronicles - August'25 Week I
MYSQL Presentation for SQL database connectivity

A Child Like Approach to Grid Cybersecurity

Editor's Notes

  • #2: The *almost lunch* fun-presentation
  • #25: The *almost lunch* fun-presentation