Podchaser Logo
Home
Patrick Miller and Brian Proctor: What’s Left to Hack in Critical Infrastructure?

Patrick Miller and Brian Proctor: What’s Left to Hack in Critical Infrastructure?

Released Friday, 20th August 2021
Good episode? Give it some love!
Patrick Miller and Brian Proctor: What’s Left to Hack in Critical Infrastructure?

Patrick Miller and Brian Proctor: What’s Left to Hack in Critical Infrastructure?

Patrick Miller and Brian Proctor: What’s Left to Hack in Critical Infrastructure?

Patrick Miller and Brian Proctor: What’s Left to Hack in Critical Infrastructure?

Friday, 20th August 2021
Good episode? Give it some love!
Rate Episode

What’s Left to Hack in Critical Infrastructure?

 

Perfection is achieved, not when there is nothing more to add, but when there is nothing left to take away.

 -- Antoine de Saint-Exupéry; French writer, poet, aristocrat, journalist and pioneering aviator

 

Me with nothing left to lose, plotting my big revenge in the spotlight. Give me violent revenge fantasies as a coping mechanism

 -- Chuck Palahniuk; author

 

We’ve been looking for the enemy for some time now. We’ve finally found him. We’re surrounded. That simplifies things

 -- Chesty Puller, US Marines 

 

 

Matt Stephenson welcomes Ampere Industrial Security CEO Patrick Miller and Forescout Principal OT Strategist in for a chat about what is left to hack in the world of Critical Infrastructure. Because Critical Infrastructure seems to be a term that evolves every day, we run all over the place talking about what is vulnerable and why… what is safe and how to protect everything in between. And just to make sure you know we are authentic… Proctor was broadcasting from the floor of a manufacturing facility in full OSHA required protective gear (literally a hard hat, goggles and a day-glo vest)

 

 

About Patrick Miller

 

Patrick Miller

 

Patrick Miller (@patrickcmiller) shares over 35 years of IT/OT experience through his consulting services as an independent security and regulatory advisor for the Critical Infrastructure and Key Resource sectors. He is currently the CEO of Ampere Industrial Security, an industrial security consultancy based in Portland, OR USA. Patrick is also the founder, president emeritus and currently serves on the board of directors for the Energy Sector Security Consortium, Inc,  nonprofit organization in Portland, OR as well as the US Coordinator for the Industrial Cybersecurity Center, based in Spain. 

 

Patrick is currently an instructor for the SANS ICS456 training on the NERC CIP standards.

 

 

About Brian Proctor

 

Brian Proctor

 

Brian Proctor (@brianproctor67) is the Principal OT Strategist at Forescout. He spent the majority of his previous professional life as an ICS/SCADA cybersecurity engineer and cybersecurity team lead working for two progressive California Investor Owned Utilities (IOUs). In joined an ICS security startup which was then acquired by Forescout Technologies. Brian jumped to the vendor side to promote the benefits ICS/SCADA/DCS threat detection, network security monitoring, and visualization capabilities can bring critical infrastructure asset owners. He is passionate about helping the ICS security community in any way possible and trying to make a difference for the greater good of our industry and country.

 

 

About Matt Stephenson

 

Matt Stephenson

 

Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, I hosted podcasts, videos and live events all over the world which put me with experts on every corner of the cybersecurity landscape. The new No Name Security Podcast will continue and expand upon that tradition as we seak out the leading minds in the security industry as well as those may break things every now again. And… just for fun, there will be some wildcard guests as well.

 

In 10 years in the ecosystem of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to information security, these technologies can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...

 

Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.

 

Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...

 

 

If you tuned in to any of my previous podcasts, there’s great news! The No Name Security Podcast is here! I will be bringing the same kind of energy and array of guests you know and love. Best part? We’re still at the same spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!

 

Make sure you Subscribe, Rate and Review!

Show More

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features