エピソード

  • Policy Pulse: Regulatory Roundtable - Cyber Strategy, Large Loads, AI & CISA in Flux
    2026/05/11

    Patrick Miller reconvenes with Joy Ditto (Joy Ditto Consulting) and Earl Shockley (INPOWERD) for a tour of the past two months in critical infrastructure policy. The episode opens on the administration's new National Cybersecurity Strategy and its six pillars, with focus on the openly offensive "shape adversary behavior" posture and the asymmetric risk it creates for asset owners likely to absorb retaliation.

    The panel then digs into the pressures reshaping the bulk electric system: data center designation, cloud-hosted control centers running NERC standards while the underlying compute is unregulated, and the physics of computational loads that behave nothing like traditional load. Earl walks through the recent NERC Level 3 alert on large load connections, an unusually serious signal that industry processes are behind.

    The discussion also covers April infrastructure executive orders that release funding but ignore cybersecurity, hyperscalers displacing utilities as the top buyers of bulk electrical equipment, the multi-agency zero trust in OT guidance, and CISA's leadership uncertainty after Sean Plankey withdrew his nomination. On the AI front, the group unpacks what Anthropic's Mythos and the Glasswing response mean for vulnerability discovery at scale, and why no OT vendors are on the Glasswing list.

    Closing thoughts include Joy's note on satellite cybersecurity and a rare bipartisan Senate trip to China, Earl's emphasis that computational load is now an enterprise governance issue rather than a technical one, and Patrick's plea to stop making the adversary's job easy.

    Topics covered

    • The new National Cybersecurity Strategy and its six pillars
    • Offensive cyber posture and the asymmetric risk to asset owners
    • Data center designation as critical infrastructure
    • Cloud control centers and the NERC 100-series standards
    • Computational load, grid stability, and loss of system inertia
    • NERC Level 3 alert on large load connections
    • April infrastructure executive orders and the missing cyber language
    • Supply chain shifts and hyperscalers as the top equipment buyers
    • Zero trust principles for OT environments
    • CISA Fortify guidance and CISA's current leadership status
    • Anthropic's Mythos, the Glasswing response, and the OT vendor gap
    • Satellite cybersecurity and bipartisan engagement on China policy
    • Basic hygiene: get exposed devices off the internet
    続きを読む 一部表示
    1 時間
  • Policy Pulse: Regulatory Roundtable - NERC CIP, Cybersecurity Strategy, AI & Electric Sector
    2026/02/01

    Welcome to the Policy Pulse Panel, a new monthly series within the Critical Assets Podcast. Hosted by Patrick Miller (Ampyx Cyber), Earl Shockley (CEO, Inpowerd), and Joy Ditto (CEO, Joy Ditto Consulting), this recurring panel dives into the most significant policy shifts and regulatory developments impacting critical infrastructure, operational technology (OT), and industrial cybersecurity. Each month, we unpack emerging legislation, agency actions, and standards updates - connecting the dots between policy and the practical realities faced by asset owners, utilities, vendors, and government partners. If you're trying to stay ahead of your auditors and your legislators, this is your monthly must-listen.

    https://ampyxcyber.com/podcast/policy-pulse-regulatory-roundtable-nerc-cip-cybersecurity-strategy-ai-electric-sector

    続きを読む 一部表示
    1 時間 2 分
  • Vulnerability Overload: Making Prioritization Work in the Real World
    2025/07/20

    In this episode, Patrick Miller speaks with Kylie McClanahan, CTO at Bastazo, about the practical (and often messy) realities of patch and vulnerability management in operational technology (OT) environments. Kylie shares grounded insights into patching challenges, the gaps between IT and OT remediation cycles, and the real-world implications of relying too heavily on scoring systems like CVSS.

    The conversation covers CISA’s Known Exploited Vulnerabilities (KEV) catalog, exploring how it’s being used (and possibly misused) in prioritization workflows, and where the disconnects lie between policy directives and operational feasibility. Kylie also critiques the current state of vendor responsiveness, machine-readable vulnerability disclosure (CSAF), and the importance of asset and exposure awareness.

    This episode is essential listening for practitioners wrestling with patching fatigue, program prioritization, and the tradeoffs between theoretical vulnerability data and applied security outcomes in critical infrastructure environments.

    Links:

    CISA KEV: https://www.cisa.gov/known-exploited-vulnerabilities

    CISA vulnrichment: https://github.com/cisagov/vulnrichment

    Vulnrichment, Year One: https://www.youtube.com/watch?v=g5pSVMnWD7k

    CISA SSVC: https://www.cisa.gov/stakeholder-specific-vulnerability-categorization-ssvc

    Carnegie Mellon SSVC: https://certcc.github.io/SSVC/

    CSAF: https://www.csaf.io/

    VulnCheck KEV: https://vulncheck.com/kev

    Kylie McLanahan on LinkedIn: https://www.linkedin.com/in/kyliemcclanahan/

    Bastazo: https://bastazo.com

    続きを読む 一部表示
    36 分
  • From CISO to Startup: OT Security, Leadership, and Lessons from the Field
    2025/04/13

    In this episode of the Critical Assets Podcast, Patrick Miller interviews Darren Highfill, former CISO of Norfolk Southern, for a candid look behind the curtain of life as a security executive. Darren shares hard-won lessons from building and leading a cybersecurity program in a critical infrastructure environment, including how to gain executive buy-in, scale a team, and align security with business priorities. He reflects on the challenges of translating cyber risk into business risk, managing real-world incidents, and the evolving expectations of the CISO role. Whether you're in the chair now or working toward it, this conversation is packed with practical insights for anyone navigating cybersecurity leadership.

    Show links:

    • Darren Highfill LinkedIn Profile - https://www.linkedin.com/in/darrenhighfill/
    • NIST Cyber Security Framework (CSF) - https://www.nist.gov/cyberframework
    • Ankrd website - https://www.ankrd.com/
    続きを読む 一部表示
    44 分
  • Critical Conversations: IR, Forensics, and Regulation in OT
    2025/01/04

    In this episode, we sit down with Lesley Carhart (@hacks4pancakes), a renowned expert in OT/ICS incident response and forensics, to explore the unique challenges of defending critical infrastructure against cyber threats. Lesley shares insights into how internal OT teams can better support external IR teams, evaluates global and sector-specific preparedness, and discusses the impact of regulations on effective incident response. We delve into the complexities of defining and reporting incidents, the potential for improved approaches, and actionable advice for those looking to enhance their IR and forensics skills. Lesley also gives a glimpse into the future of their work and their continued mission to strengthen cybersecurity in critical infrastructure.

    Show Links:

    https://www.linkedin.com/in/lcarhart/

    https://www.threads.net/@hacks4pancakes

    https://bsky.app/profile/hacks4pancakes.com

    https://infosec.exchange/@hacks4pancakes

    続きを読む 一部表示
    45 分
  • Energizing Cybersecurity Careers: Workforce Development in OT/ICS
    2024/03/03

    Join us for a discussion on Energizing Cybersecurity Careers: Workforce Development in the OT/ICS Community. Guests Cynthia Hsu and Erin Owens dive into the cybersecurity challenges facing Industrial Control Systems and Operational Technology asset owners. Through open conversations, we explore everything from skill gaps and career pathways to diversity, continuous learning, and the impact of new technologies. This session aims to provide insights into developing a skilled, diverse cybersecurity workforce – starting from the ground up – with a focus on practical strategies for professionals, educators, and anyone interested in the future of ICS/OT security.

    Show links:

    Cynthia Hsu LinkedIn profile https://www.linkedin.com/in/cynthiahsu33/

    Erin Owens LinkedIn profile https://www.linkedin.com/in/erinowens/DOE CESER Cybersecurity Training for the Utility Workforce, free 3-day ICS Cybersecurity training for electric and ONG utility staff. Next training event: Buffalo, NY, April 23-25, Register at: Eventleaf | Event Registration Software and Mobile Event Apps

    DOE CESER CyberStrikeTM professional cybersecurity training for operational technology environments: https://inl.gov/cyberstrike/

    · LIGHTS OUT – focus on Ukraine attacks

    · NEMESIS – focus on nation-state TTPs

    · STORMCLOUD – focus on renewable energy

    DOE CESER CyberForce® workforce development program for college students focused on building a pipeline of cyber professional candidates in operational technology cybersecurity: https://cyberforce.energy.gov/

    Sandia National Laboratory

    • Tracer FIRE (Forensic Incident Response Exercise): https://github.com/sandialabs/Tracer-FIRE
    • Center for Cyber Defenders: https://www.sandia.gov/careers/career-possibilities/students-and-postdocs/internships-co-ops/institute-programs/titans-technical-internships-to-advance-national-security/titans-cyber/

    Cyber Defense Center https://www.cyberdefensecenter.org/

    続きを読む 一部表示
    1 時間 8 分
  • CIE: Architecting Infrastructure Immunity
    2023/11/09

    In this episode, we take a deep dive into the world of Cyber Informed Engineering (CIE), joined by Ginger Wright, Program Manager at Idaho National Laboratory. This episode unpacks CIE's strategic efforts to integrate cybersecurity into the very fabric of engineering critical infrastructure. We discuss the evolution of CIE and how it's transforming the approach to system design. We cover the synergy between engineers and cybersecurity experts and the implementation of engineering-based mitigations. Get insights on building resilience into critical systems from the ground up.

    続きを読む 一部表示
    54 分
  • One Rule to Rule Them All
    2023/09/05
    Join Patrick Miller, CEO of Ampere Industrial Security and his guest Danielle Jablanski, OT Cybersecurity Strategist at Nozomi Networks as they continue their debate on the topic: "If you could have only one cybersecurity regulation, what should that be?" They cover everything from threat hunting, vulnerability management, attack surface management, incident response, breach notification, risk quantification, cybersecurity insurance, NIS2, NERC CIP, and what's best for corporate vs. public good.
    続きを読む 一部表示
    59 分