
Sign up to save your podcasts
Or
Today, Derek Harp, the host of (CS)²AI Podcast, shares an episode of the Author Spotlight that features practitioners and contributors who do great work and write books about new modalities, new systems of organization, and new thought processes.
In this episode, Andy Bochman and Sarah Freeman, authors of Countering Cyber Sabotage- Introducing Consequence-Driven Cyber-Informed Engineering, join Derek to talk about their book.
Sarah has been an Industrial Control Systems Cyber Security Analyst at The Idaho National Laboratory (The Lab) for the past eight years. She did not get there through the traditional computer or cyber security background, however. Sarah studied Intelligence and Security Studies, focusing on terrorism in Graduate School, and came into cyber security through Language Services by assisting with certain investigations and operations on the language side. That eventually transitioned into industrial control systems when she joined The Lab.
Sarah has a unique understanding of different kinds of threat actors from some of the work she has done in the past. The Lab focuses on bringing in people with different backgrounds, like cyber security researchers, malware reverse engineers, and engineers. That is invaluable when talking about attacks specifically leveled against industrial control systems because some things translate well between traditional IT attacks while others are completely different. Bringing in different groups helps with much of their work.
One of the first companies Andy ever worked for was an applications security company that eventually got bought by IBM. He was also involved in some startups and some consulting. At IBM, Andy matched his cyber security day job with his night job, moonlighting as a blogger on the DOD Energy Blog and the Smart Grid Security Blog. While at IBM, he asked if he could cover energy from a cyber point of view, and they agreed. From that point, it became clear that he would eventually end up at the Idaho National Laboratory, where he has been for the last seven years.
Show highlights:
5
22 ratings
Today, Derek Harp, the host of (CS)²AI Podcast, shares an episode of the Author Spotlight that features practitioners and contributors who do great work and write books about new modalities, new systems of organization, and new thought processes.
In this episode, Andy Bochman and Sarah Freeman, authors of Countering Cyber Sabotage- Introducing Consequence-Driven Cyber-Informed Engineering, join Derek to talk about their book.
Sarah has been an Industrial Control Systems Cyber Security Analyst at The Idaho National Laboratory (The Lab) for the past eight years. She did not get there through the traditional computer or cyber security background, however. Sarah studied Intelligence and Security Studies, focusing on terrorism in Graduate School, and came into cyber security through Language Services by assisting with certain investigations and operations on the language side. That eventually transitioned into industrial control systems when she joined The Lab.
Sarah has a unique understanding of different kinds of threat actors from some of the work she has done in the past. The Lab focuses on bringing in people with different backgrounds, like cyber security researchers, malware reverse engineers, and engineers. That is invaluable when talking about attacks specifically leveled against industrial control systems because some things translate well between traditional IT attacks while others are completely different. Bringing in different groups helps with much of their work.
One of the first companies Andy ever worked for was an applications security company that eventually got bought by IBM. He was also involved in some startups and some consulting. At IBM, Andy matched his cyber security day job with his night job, moonlighting as a blogger on the DOD Energy Blog and the Smart Grid Security Blog. While at IBM, he asked if he could cover energy from a cyber point of view, and they agreed. From that point, it became clear that he would eventually end up at the Idaho National Laboratory, where he has been for the last seven years.
Show highlights:
7,842 Listeners