document.body.classList.toggle('menu-open', show); // Add 'menu-open' class to body.

SCADA Security: what’s broken and how to fix it – Eliza’s Cyber Security Book Club

th4ts3cur1ty.company - Meet The Team - Eliza
Written by Eliza-May Austin
July 25, 2024

Join our CEO – Eliza-May Austin, a seasoned leader with extensive experience in the field – as she dives into some of the most challenging topics in cyber security. Unlike many books written by authors who simply enjoy writing, Eliza brings her real-world expertise and senior leadership perspective to the table, providing honest and insightful reviews of the texts she has tackled.

In Eliza’s Cyber Security Book Club, you’ll gain valuable perspectives from a true practitioner and leader. So grab a cuppa, get ready to explore cyber security like never before, and embark on a journey through the most critical issues in the field.

WEEK 3: "SCADA Security: what’s broken and how to fix it" by Andrew Ginter

This book effectively addresses some of the critical challenges faced by operators of industrial control systems. It vividly illustrates the common frustrations experienced by technical teams managing ICS, SCADA, and OT infrastructure. It also covers interactions between cyber security teams and critical OT business functions.

Many established doctrines within cyber security fall short in a true industrial environment. This book serves as an excellent educational resource, challenging the complacency of practitioners who approach cyber security as a clipboard exercise. It emphasises the importance of aligning cyber security practices with business-focused operations, rather than relying solely on course material or commonly available best practices

Rating "SCADA Security: what’s broken and how to fix it"

So on a scale of 1 to 5, what do I rate this book?

A solid 4/5 for enjoyment!

I strongly recommend this book to anyone involved in cyber security within environments or businesses that utilise or depend on OT systems. If you are a cyber security consultant working with businesses that have a manufacturing component or any form of industrial operation, this book will provide invaluable insights into the cultural nuances of managing business relationships amidst these common frustrations.

You do not need to be technically inclined or have prior experience to appreciate this SCADA Security book. Although written with product sales in mind, it still delves into significant topics concerning industrial security in an accessible manner. A highly-recommended read.

Technical rating: 1/5 

Experience rating: 2/5

Seniority required: 2/5

OVERALL RATING

Get your own copy!

Find out if you agree with Eliza’s assessment; pick up a copy from Amazon. Please note, we don’t make any commission through this link!

Buy on Amazon

COMING UP NEXT WEEK…

“Blue Team Handbook: SOC, SIEM and Threat Hunting Use Cases” by Don Murdoch.

Read now >

Like what you see? Share with a friend!

th4ts3cur1ty.company - Meet The Team - Eliza

This article is written by

Eliza-May Austin

CEO

Eliza exudes a captivating, no-nonsense demeanour that defines the services provided by th4ts3cur1ty company. As a proud Yorkshire woman, she boasts an impressive expertise in tea, gravy, and local hiking trails. Clients value Eliza’s practical, assertive stance on security, especially in challenging situations. Quietly dubbed the “Winston Wolfe of cyber”, she navigates complex conditions with a calm and strategic approach. Trust her to handle security matters with finesse and to get you out of a bind with determined resolve.