In “Episode 2 Clip 4,” the speaker discusses the best methodologies for evaluating industrial cybersecurity risks, emphasizing adherence to the ISA/IEC-62443-3-2 standard. Key points include the need for a multidisciplinary, knowledge-based approach, the importance of integrating cybersecurity with other risk management disciplines, and the dangers of relying too heavily on IT-centric solutions. The clip stresses the necessity of long-term, rational decision-making within the plant and illustrates the risks associated with external dependencies, using the CrowdStrike incident as an example. The aim is to guide professionals toward effective and sustainable cybersecurity practices for critical infrastructures.
Episode 2 Clip 3 – The formula for calculating cyber risk.
The clip discusses the challenges of calculating industrial cybersecurity risk, emphasizing the importance of understanding and effectively implementing risk formulas, highlighting the role of system design in preventing cyber incidents, and stressing the significance of informed decision-making and proper investment in cybersecurity solutions.
Episode 2 Clip 2 – The true goals of industrial cybersecurity.
This clip discusses the importance of industrial cybersecurity in preventing consequences rather than just incidents. It emphasizes the need for strategic management of risks to ensure plant safety and longevity, highlighting the key role of correctly implemented cybersecurity measures. The video also touches on calculating return on investment and the significance of maintaining a comprehensive cybersecurity strategy for overall business success.
Episode 2 Clip 1 – The importance of Risk Assessment.
This video cast focuses on the importance of risk assessment in industrial cybersecurity. The speakers discuss the significance of identifying and mitigating intolerable risks through proper risk assessment practices. They emphasize the different disciplines of risk present in typical plants and stress the need for accurate decision-making based on sound analysis.
CISA warns of Windows flaw used in infostealer malware attacks
CISA alerts of critical Windows flaw exploited in infostealer malware attacks, stressing urgent action. WisePlant is here to safeguard your systems.
Episode 2 – Mastering Industrial Cybersecurity Risk Assessments
This episode features a discussion between Angel Lopez and Max Kon about industrial cybersecurity risk assessment. Max highlights the importance of making the right decisions as it would most probably be the only and the best chance that the plant may have. The need to use the resources of the company wisely is not an option. Furthermore, it is not about money, it is about time and opportunity.
FreeBSD Releases Urgent Patch for High-Severity OpenSSH Vulnerability
FreeBSD takes swift action to address critical OpenSSH vulnerability, issuing urgent patch for heightened security.
IEC publishes IEC 62443-2-1:2024, setting security standards for industrial automation and control systems
Addressing cybersecurity on an organization-wide basis can seem like a daunting task. There is no simple cookbook for security, nor is there a one-size-fits-all set of security practices. There is a methodology for implementing ISA/IEC-62443 series of standards correctly. It is paramount that end users, integrators and suppliers get involved.
FBI Warns: Chinese Hackers Are Preparing to Wreak Havoc on US Water System | Facts Matter
This is all part of the new global battlefield, where world powers don’t compete against each other directly using kinetic weapons, but rather constantly trying to exploit each other’s weaknesses under the surface.
0.0.0.0 Day: 18-Year-Old Browser Vulnerability Impacts MacOS and Linux Devices
A recently discovered “0.0.0.0 Day” vulnerability that affects major web browsers like Chrome, Firefox, and Safari. This vulnerability could be exploited by malicious websites to gain unauthorized access to local networks on macOS and Linux devices.
About Maximillian G. Kon
A U.S. citizen born in Memphis, Tennessee, with residency in Argentina and Brazil, Max is founder and CEO of WisePlant HQ. He is an Electronics Engineer with specialization in control systems and telecommunications and has developed his professional career mostly in South America, with more than 20 years of experience in industrial and critical systems in all types of industries, including oil, gas, energy, food, pharmaceutical, chemical, petrochemical, water, paper, metallurgy, mining, smart buildings, and others.
WisePlant Group LLC & WiseCourses LLC Announces Commitment to Growing Global Cybersecurity Success during Cybersecurity Awareness Month October 2024
Now in its 20th year, Cybersecurity Awareness Month October 2024 is highlighting the growing importance of cybersecurity in our daily lives and encouraging individuals and industries to take important industrial cybersecurity steps to keep plants safe and control systems secure. Empowering more secure, interconnected industrial plants.
Stealthy ‘sedexp’ Linux malware evaded detection for two years
Discover how the ‘sedexp’ Linux malware stayed hidden for two years, impacting detection and security protocols. Insights and strategies outlined.
New ISAGCA whitepaper addresses zero trust outcomes using ISA/IEC 62443 standards
Discover how the new ISAGCA whitepaper leverages ISA/IEC 62443 standards to achieve zero trust outcomes and enhance cybersecurity excellence.
Svilosa Chemical plant fire injures three employees
An explosion and subsequent fire left three employees injured at a Bulgarian chemical plant on 29 July. The incident happened at the Svilosa sodium chlorate plant in the town of Svishtov in the north of the country.
VMware ESXi hypervisor vulnerability grants full admin privileges
Security researchers at Microsoft have discovered a vulnerability in VMware ESXi hypervisors that has been exploited by ransomware operators to gain full administrative access to a domain-joined hypervisor.
ICS malware FrostyGoop takes advantage of Modbus weakness, remains a threat to OT worldwide.
The malware leverages Modbus TCP communications to target operational technology assets — and can easily be repurposed to compromise other industrial controllers, putting widespread critical infrastructure at risk.
Episode 1 – Introduction to Industrial Cybersecurity
This episode features a discussion between Angel Lopez and Max Kon about industrial cybersecurity. Max highlights the importance of ISA standards in industrial automation and cybersecurity, emphasizing his active involvement in ISA activities and training programs. Max’s journey underscores the evolution of cybersecurity in control systems and his dedication to promoting cybersecurity awareness and standards within the industry.
PKfail Secure Boot bypass lets attackers install UEFI malware
PKfail, a supply-chain issue, has affected hundreds of UEFI products for over 12 years, leaving nearly 900 devices vulnerable to malware installation. Vendors and users must follow best practices, apply updates and patches, monitor, and protect devices, and replace test keys. Prompt firmware upgrades are advised, and leaked AMI PK devices should be disconnected from critical networks.
Episode 1 Clip 6 – What are the best training courses or programs for End Users and Providers?
Emphasizes the importance of investing in cybersecurity training programs, particularly the official ISA certificate training and the WisePlant cybersecurity program. It highlights the need for understanding and implementing cybersecurity requirements correctly, tailored to individual roles. The training aims to ensure project success by aligning all participants towards a common goal in the cybersecurity field.





















