OTbase
OTbase
  • 168
  • 302 827
Cyber security protection dashboard in Power BI
In this video you'll learn how to build a protection dashboard in Power BI that exposes parameters like patch recency and patch consistency for your OT systems, based on data imported from the OTbase OT asset management software. Product info: langner.com
Переглядів: 123

Відео

Building a software dashboard in Power BI
Переглядів 115Місяць тому
This video shows you how to build a software dashboard in Power BI using data from the OTbase OT asset management software. Product link: langner.com
Building a CISO dashboard in Power BI
Переглядів 137Місяць тому
In this video you'll learn how to build a CISO dashboard in Power BI using the vulnerability data from OTbase. Product information: langner.com
Why patching is not sustainable in OT environments
Переглядів 204Місяць тому
Security patches are the go-to solution for vulnerability management. But they don't provide an easy path out of cyber risk in OT. Learn in this video why patching is not sustainable in OT environments.
OT compliance dashboard in Power BI
Переглядів 166Місяць тому
Wes shows you how to turn OT asset data pulled from the OTbase OT asset management software into a compliance dashboard in Power BI. Product link: ot-base.com
OT device dashboard in Power BI
Переглядів 60Місяць тому
This video shows you how to build a basic OT device dashboard using the OTbase Connector for Power BI. Product link: ot-base.com
OTbase connector for Power BI intro
Переглядів 55Місяць тому
Learn how to download, install, and configure the OTbase Connector for Power BI. Takes just ten minutes and you're off to create awesome reports and dashboards. Product link: langner.com
OT obsolescence management in OTbase
Переглядів 69Місяць тому
This short presentation shows you how to identify obsolete OT products in your fleet. Check what's end of life or discontinued in two minutes. Recorded at #S4x24.
The Purdue Model in OT security
Переглядів 1,2 тис.2 місяці тому
One of the biggest misconceptions in OT security is that the Purdue model can act, or even was intended, as a security architecture. Ralph explains why it can even be counter-productive and lead to LESS security. For more information on the OTbase OT asset management software check langner.com
The OTbase Onboarding Program
Переглядів 802 місяці тому
The OTbase Onboarding Program
Automatic network topology diagrams in OTbase
Переглядів 1152 місяці тому
Automatic network topology diagrams in OTbase
Forget CVE severity for OT security
Переглядів 2562 місяці тому
Forget CVE severity for OT security
Automated OT compliance audits
Переглядів 1652 місяці тому
Automated OT compliance audits
The OT cyber risk that's completely ignored
Переглядів 2832 місяці тому
The OT cyber risk that's completely ignored
OT Asset Management vs. ICS Detection -- what are the differences?
Переглядів 1682 місяці тому
OT Asset Management vs. ICS Detection what are the differences?
Dale Peterson drops truth bombs at S4x24
Переглядів 4572 місяці тому
Dale Peterson drops truth bombs at S4x24
How to achieve efficiency and progress in OT security
Переглядів 3092 місяці тому
How to achieve efficiency and progress in OT security
OTbase integration with ServiceNow
Переглядів 722 місяці тому
OTbase integration with ServiceNow
OT security: Cyber-physical system modeling, criticality, and network segregation
Переглядів 4123 місяці тому
OT security: Cyber-physical system modeling, criticality, and network segregation
Obsessed with OT security threats
Переглядів 1113 місяці тому
Obsessed with OT security threats
What OT asset management is all about
Переглядів 3653 місяці тому
What OT asset management is all about
Setting Access Credentials in OTbase Discovery
Переглядів 254 місяці тому
Setting Access Credentials in OTbase Discovery
Network & Location Groups in OTbase Asset Management
Переглядів 754 місяці тому
Network & Location Groups in OTbase Asset Management
The OTbase Discovery User Interface
Переглядів 644 місяці тому
The OTbase Discovery User Interface
Device descriptions
Переглядів 594 місяці тому
Device descriptions
Location IDs in OTbase
Переглядів 635 місяців тому
Location IDs in OTbase
OT vulnerability management in ServiceNow, powered by OTbase
Переглядів 1115 місяців тому
OT vulnerability management in ServiceNow, powered by OTbase
Setting Up Location Metadata in OTbase Inventory
Переглядів 395 місяців тому
Setting Up Location Metadata in OTbase Inventory
OTbase Service Graph Connector for ServiceNow
Переглядів 905 місяців тому
OTbase Service Graph Connector for ServiceNow
Performing Manual Backups in OTbase Inventory
Переглядів 215 місяців тому
Performing Manual Backups in OTbase Inventory

КОМЕНТАРІ

  • @GeorgeTsiros
    @GeorgeTsiros 16 днів тому

    What I find weird is that the two domains that were used for updates, SUPPOSEDLY could not be determined to whom they belonged. Like. Every domain in existence is strictly documented. Unless ICANN _itself_ was compromised, it should be dead simple to find who had those two domains.

  • @arinjayjain6029
    @arinjayjain6029 26 днів тому

    Can you share the dataset link

    • @OTbase
      @OTbase 26 днів тому

      No. But you can easily build your own dataset with the OTbase OT asset management software.

  • @tombuckley91
    @tombuckley91 27 днів тому

    Fantastic video, really appreciated the information on the additional systems they were forced to build to mitigate the failures they were already dealing with. I wonder how they (the attackers) knew enough about those systems to target them, I understand they intercepted the Libyan shipment to understand the centrifuges, but not their over pressure systems.

    • @OTbase
      @OTbase 27 днів тому

      You are correct, the attackers could not have known the details of the cascace protection system from the Libyan installation. They must have had an insider at Natanz or one of the contractors.

  • @Atreus21
    @Atreus21 28 днів тому

    I don't understand. What is the purpose if the zones then?

    • @OTbase
      @OTbase 28 днів тому

      Zones have nothing to do with the Purdue model.

    • @Atreus21
      @Atreus21 27 днів тому

      ​@OTbase sorry, not zones - layers. The layers from 1 to 4. What is the purpose of organizing it like that if all that really matters is network segregation? Sorry again, my questions are uninformed. I'm new to this stuff.

  • @michahcc
    @michahcc 29 днів тому

    We've diagnosed your centrifuges with bipolar disorder.

  • @shitoryu8
    @shitoryu8 Місяць тому

    I honestly wonder whats changed in their program since all this happened.

    • @OTbase
      @OTbase Місяць тому

      Safe to assume that they upped their cyber security

  • @LongFatJohnston
    @LongFatJohnston Місяць тому

    >less than 3k subs >best video on the topic thanks for making this video. sincerely

  • @ivarand
    @ivarand Місяць тому

    I think Adobe products should be forbidden not only in OT environments, lol!

  • @EQ_EnchantX
    @EQ_EnchantX Місяць тому

    The noise would have been masked by the other running centrifuges. It only targeted a few cascades at a time (164 centrifuges each) and it was over 50 mins. So 164 centrifuges at a time in a room full of 5,000 to 8,000 running.

    • @OTbase
      @OTbase Місяць тому

      Wrong. The attack code did not target a few centrifuges at a time. It targets 984 centrifuges at a time. Look at the code.

    • @EQ_EnchantX
      @EQ_EnchantX Місяць тому

      @@OTbase That is incorrect, the logic targets cascades which house 164 centrifuges each. Nowhere in the code does it target 984 centrifuges because they are controlled as a group and can not be individually targeted.

  • @nicolasrose3064
    @nicolasrose3064 Місяць тому

    The Iranian mentality is anchored to an archaic narrative which dictates that their "Religious duty" is to usher in the "Prophesied" genocidal annihilation of all Societies that don't subscribe to their Religions dogmas and to avenge in perpetuity, alleged transgressions purportedly perpetrated in Antiquity, on behalf of the insane ranting zealotry of an Iron Age Schizophrenic Pedophile, who is recorded as, having had s*xual intercourse with a nine year old girl, that she did not consent shouldn't even be a question. Mere Religious tribalism is always a potential source of intolerance and violence, but it is much worse when there are specific doctrines that advocate intolerance and violence, eventually Muslim societies will need to understand that their Religious beliefs, specifically around the doctrines of Jihad and Martyrdom, puts their faith in perpetual conflict with the modern World, Martyrdom in particular is a truly appalling spectre when ultimately, they don't care about their own survival and are willing to Martyr their fellow Muslims in accordance with the dictates of those beliefs, any response from those who they target with this outrageously ignorant zealotry, is on them, it is their fault and it will remain their fault no matter how many people die in Gaza or anywhere else where they vent their insanities and hatred. NUCLEAR WEAPONS IN THE HANDS OF JIHADISTS AND ANY OTHER FORM OF ISLAMIC EXTREMISM OBSESSED WITH FULFILLING THEIR RELIGIOUS DUTY TO ANNIHILATE ALL THOSE WHO DON'T SUBSCRIBE TO THEIR RELIGIONS DOGMAS, CANNOT AND NEVER WILL BE TOLERATED !!!

  • @sforza209
    @sforza209 Місяць тому

    2:58 that aged like fine milk.

  • @ulrichulrich5810
    @ulrichulrich5810 Місяць тому

    lieber Herr Langner, besten Dank für Ihre Darstellung der möglichen Ereignisse, die allerdings einige fundamentale Fragen offen lässt. davon abgesehen, würde ich mich freuen, sie würden den Text gleich auf Deutsch vortragen und die hochproblematische Tonspur reinigen.

  • @uTestTarget
    @uTestTarget Місяць тому

    "The stealthy cyber weapon had been turned into a prank." "After that little concert in the cascade hall..." lol These funny statements actually show the high quality of technical expertise in this video. Seriously, other videos breathlessly report, with mysterious background music, how amazing it was to control the speed. This is the first explanation I've seen that described the resulting sound and how obvious it would be to the Iranians.

  • @kevb5834
    @kevb5834 Місяць тому

    This is pretty freaking awesome! Thanks for sharing!

  • @arali1987
    @arali1987 Місяць тому

    Fabulous!

  • @wolpumba4099
    @wolpumba4099 Місяць тому

    *Abstract* This video analyzes new footage from the Natanz fuel enrichment plant and reveals insights into the Stuxnet attack, particularly the second version. The analysis focuses on the audible differences in centrifuge rotor speed caused by the attack, suggesting that the attackers were not concerned with remaining undetected. The video also highlights the differences between IT-based cyber forensics and the cyber-physical forensics used in this case. *Summary* *Introduction* - 0:00 Ralph Langner introduces the video and references his previous analysis of Stuxnet, "To Kill A Centrifuge." He mentions the importance of video footage in understanding the attack. *Previous Analysis* - 0:18 Langner discusses how previous video footage analysis led to breakthroughs in understanding Stuxnet, such as identifying the pressure controller used at Natanz. *New Analysis* - 1:16 The video focuses on new footage found online, showcasing the Natanz facility, including the centrifuge hall and control room. - 2:00 Observations include potential maintenance issues (e.g., hanging signal cable) and the presence of numerous vibration sensors. - 2:54 The control room is described as "the coolest control room you have ever seen," with an unusual layout and blurred screens. - 3:58 Langner emphasizes the importance of the audible aspects of the attack, which were not fully understood in the previous analysis. *Can you hear it?* - 5:28 The video plays audio of centrifuges spinning at normal operating speed (59,000 RPM) and compares it to the sound of centrifuges at 83,000 RPM (1,400 Hertz) as manipulated by the first Stuxnet attack. The difference in sound is significant. - 6:26 The second attack iteration involved slowing down the centrifuges to 120 RPM (2 Hertz), below the audible range but still representing a drastic change detectable by engineers. - 7:57 Langner addresses the concern that the sound of one affected centrifuge would be masked by others, explaining that the attack impacted at least one whole cascade (164 centrifuges) and possibly up to six cascades (almost 1,000 centrifuges). - 8:30 The attackers synchronized the affected cascades using WinCC, further highlighting their intention to make the attack noticeable. *Conclusion* - 9:03 Langner concludes that the attackers behind the second Stuxnet version were not concerned with stealth and that detection by Iranian engineers was inevitable. He suggests that this lack of operational security would have prompted a closer examination of the controllers. i used gemini 1.5 pro

  • @millerdp
    @millerdp Місяць тому

    Ralph, thank you for the enlightening and useful discussion. Much appreciated.

  • @kunalshah82
    @kunalshah82 Місяць тому

    Great video that emphasis the importance of criticality in defining OT Security measures! Same concepts can apply across DR methods and exercises as well

  • @brianduffy8768
    @brianduffy8768 Місяць тому

    Zoning and Conduit as per 62443, instead of purdue thinking. Zone the Control Systems for network Segmentation.

  • @mikeclark4611
    @mikeclark4611 2 місяці тому

    👀 P R O M O S M

  • @relentlessrider5677
    @relentlessrider5677 2 місяці тому

    powerful

  • @VINAYDUVVA
    @VINAYDUVVA 2 місяці тому

    Great Presentation of Vulnerability report using Power BI. If you can make a detailed step by step video on Power Bi for Vulnerability Management that will really help to learn and Implement.

    • @OTbase
      @OTbase Місяць тому

      At it

  • @danehrenreich4531
    @danehrenreich4531 2 місяці тому

    I'm in full support of this clarification

  • @Erwin_Auerbach
    @Erwin_Auerbach 2 місяці тому

    Aa consistent theme in recent history (say the last 70 years) has been the marketability of fear. Look at the emergence of 24/7 news cycles which often prioritise sensationalism to capture attention and instill fear. Unfortunately, it seems challenging to go back to a time when OT or "cyber" Security were solely an engineering principle.

  • @lmaoty
    @lmaoty 2 місяці тому

    Love this - Ralph, you are totally on point on this one!

  • @VerdadTrasLaVerdad
    @VerdadTrasLaVerdad 3 місяці тому

    Thank you for the documentary! I'm studying cyber security and this video was really worthy and interesting to watch

  • @cmms1234
    @cmms1234 3 місяці тому

    Ground reality

  • @LethalBubbles
    @LethalBubbles 3 місяці тому

    obama was a lot more vicious than bush, eh?

    • @OTbase
      @OTbase 3 місяці тому

      No. He just pushed the inherited operation in a different direction and blew it.

  • @cocoarecords
    @cocoarecords 3 місяці тому

    Best

  • @gregs6403
    @gregs6403 3 місяці тому

    Thanks for putting this together. All the other videos are just overviews but this gets deep into the working principles and demonstrates the type of clever thinking the creators of Stuxnet had. This is exactly what I was hoping to find.

  • @bconte88
    @bconte88 3 місяці тому

    Lmao loved the comment about activists

  • @cyberjeet6018
    @cyberjeet6018 4 місяці тому

    Very Informative and usefull..

  • @adytech5788
    @adytech5788 4 місяці тому

    i love top level explanation like this, thx a lot

  • @MikeOxlong-
    @MikeOxlong- 5 місяців тому

    As someone who helped design the original discovery methods (proprietary) used in a very a famous dpi product/retailer who sells to ISP’s and transit providers, I beg to differ… Netmp can help, and views into TLS meta data and other tidbits are definitely effective and time consuming (on cpu resources), but they aren’t everything. This is for certain…

  • @W3w1Llw4GeW4r0nU
    @W3w1Llw4GeW4r0nU 5 місяців тому

    There has recently been a development in the stuxnet case. Newspaper "de Volkskrant" reported that the spy who placed the infected usb stick was a Dutch national, and had been killed in 2009 in Dubai. It seems like they sabotaged his motorcycle, and an anonymous intelligence officer from the MIVD (military intelligence & safety department) was quoted as saying the spy "paid a heavy price".

  • @marfiuss
    @marfiuss 5 місяців тому

    All thanks to the Red White and Blue, thanks to Erik van Sabben!

  • @milkaaiwako
    @milkaaiwako 6 місяців тому

    I am glad i stumbled on this

  • @softwellautomation
    @softwellautomation 6 місяців тому

    It's really very useful software for ICS protocols TCP port analysis

  • @imagingconcepts
    @imagingconcepts 7 місяців тому

    I still find it hard to believe that Stuxnet was a first, if it truly was, that means that mankind created an extremely sophisticated product that worked perfectly right out of the box… it clearly must be Alien. ;)

    • @OTbase
      @OTbase 7 місяців тому

      It was well tested on Lybian centrifuges of the same model, and it didn't work perfectly...

  • @8starsAND
    @8starsAND 7 місяців тому

    Ok, then explain for it guy even what the PLC or profinet is. I think you also didn’t ever work in factory SO your knowlege is very limited to the IT side of security problems and I see that from your videos…

  • @danielbowman7226
    @danielbowman7226 7 місяців тому

    Oh my. After all this optimism - energy sector protocols not covered very well. Sheeeet.

  • @orlandostevenson7214
    @orlandostevenson7214 7 місяців тому

    Your work and prior talks, including one with NATO, led up to this enormous opportunity you landed and delivered on so well - even if it took some time for open source to connect the dots to confirm your assertions and, since then, gain additional big-picture perspective. The payload-related risk persists, as you point out, and the threat landscape continues to advance even with distracting theater, making sure the defensive capabilities starting with basics to address risk matters very much!

  • @DGModdersxNoScOPe
    @DGModdersxNoScOPe 7 місяців тому

    The gloves are off

  • @johnmoore8599
    @johnmoore8599 7 місяців тому

    Thanks! One of the best write ups on the "weapon" I've ever seen or heard. I knew your group was one of the first to reverse engineer the "weapon" and analyze it. I'm very glad you made this as I did not know there were two campaigns.

  • @DreaJ3551
    @DreaJ3551 7 місяців тому

    what kind of expert are you claiming to be? the objective of risk management is to minimize the risk of lost revenue. simplifying that to say its to minimize cost does not alter that definition. Is this guy a politician, he minces words like one.

  • @Bandalorian
    @Bandalorian 8 місяців тому

    Well said Ralph

  • @raddastronaut
    @raddastronaut 8 місяців тому

    Thing is, someone(s) orchestrated the leak of the technology to Iran, pakistan, NK and so on to allow this weapon to be installed. This was planned a head of time. They sold their enemies their defeat. Along with Britain, the US and Israel you have Germany. Siemens. This is just a massive web of pyramids.

  • @rohanmajumdar3133
    @rohanmajumdar3133 10 місяців тому

    First the target was Irans nuclear facilities, the next target is every man with a phone. We already run such worms and tracking mechanisms on our phone ready to activate the payload when we become an object of interest. A dystopian state with mass surveillance is already a reality. Stuxnet just raised the confidence of these agencies.

  • @joshualadejobi9073
    @joshualadejobi9073 11 місяців тому

    Hmmmm

  • @ManusRex
    @ManusRex 11 місяців тому

    If you believe that Pakistani government (which is essentially the Military Establishment) was unaware of , and didn't directly control AQ Khan's network which supplied nuclear enrichment tech to NoKo and Iran, in exchange for ballistic missile tech and spares, I have a 100 storey skyscraper to sell in the middle of Islamabad.