Industrial Cybersecurity: Efficiently monitor the cybersecurity posture of your ICS environment, 2nd Edition

This Post Has 12 Comments

  1. Excellent primer on ICS/OT security
    Loved this book and finished it in two days. Very helpful for me to better understand how industrial control systems are set up, what is typically done for asset inventory and risk assessment, how to harden an ICS environment, how to run incident response for ICS and how to build an OT lab. Highly recommend.

  2. Excellent
    In fact the most health OT/IT book on earth,the book gives constructive and practical steps in implementing great IACS system

  3. Great coverage of IACS Cybersecurity
    I haven’t completed reading of the book, but from my review of the Table of contents, I see important and relevant IACS/OT Cybersecurity subjects covered. After I do a deep dive into the contents, I will come back and update my review if I notice anything worth being highlighted to potential buyers.

  4. Apparently you also need the first edition.
    When you create a 2nd edition of something, you do two things: 1) remove first edition content that no longer applies and 2) add new information and improvements to the book. If you keep saying, “See Chapter 5 of the First Edition to see what great stuff you didn’t get with your full-price purchase of a new book” then it’s not an edition. This book may be worth a million bucks, but a few dozen pages into it several times I’ve been referred to the old edition.

  5. Excellent ICS Resource
    An excellent update ICS resource. Builds upon Volume 1. Great Lab instructions and ICS/OT recommendations for pentests and Red Teaming exercises. Great for ICS /OT professionals an cybersecurity learners who are ICS/OT curious. The book covers activities, tools,procedures, and concepts around the monitoring, tracking, and trendingof ICS cybersecurity risks, as well as learning about the overall security programand posture/hygiene.My favorite area was threat hunting principles, tools,techniques, and methodology and h incident response and incident recovery tools, techniques, activities, and procedures as they relate to the ICS environment.

  6. Practical resource for IT and OT security professionals and control engineers
    This book has so much valuable, practical information on industrial cybersecurity with real world examples and how-to steps. It also provides a good overview of cybersecurity concepts, ICS architecture and challenges. A security professional with some experience would find it most valuable, but even a beginner can definitely use it to get started, especially since most of the tools are open-source and free. There is also a great guide how to setup your own lab.This is basically a new book compared to the first edition. Section 2 on monitoring was particularly useful for me, found several tools or techniques to use or learn, with step-by-step guidance. To give few examples, setting up and configuring pfSense firewall, Security Onion, Zeek, Nmap scripts to parse data from industrial protocols. I also like that the text is written clearly, up to the point, and you can see it is based on practical experience.Whether you are in charge of ICS security in your workplace, or just interested in the topic, this book is a must have and well worth the money!

  7. This is actually Second VOLUME NOT a Second Edition
    Deceptive labeling – On page 5 it tells your straight up that you should start by reading the First Edition because it covers zero to hero implementation. This means that if you want to actually have a comprehensive understanding you need to buy the First AND Second Edition. I would have been fine with that if they said Volume I and Volume II but I a subsequent Edition is by definition stand alone. This is deceptive and misleading and at this price point very unprofessional.

  8. Deep Dive into ICS Cyber Security
    Great book. A lot of information on ICS Cyber Security. Has exercises that can be followed easily in a home lab. A good deep dive. Highly recommend.

  9. Il libro è voluminoso ma è scritto ottimamente. Gli argomenti sono di complessità progressiva, dalla teoria delle reti alla programmazione, completo di tanti esempi e chiarimenti. Un must da avere per chi lavora nel ramo o appassionati. Prezzo adeguato a quanto proposto.

  10. Not so much a 2nd edition, more like Volume 2 to Pascal’s earlier book. This book goes way beyond “1st edition” and covers new, more advanced topics.

Leave a Reply

Your email address will not be published. Required fields are marked *