All Series Index - Securing Things!

✅[ST #60] IT, OT & AI Cybersecurity – Series Index = Program, Digital Factory, Guides, Standards, Crash Courses, Quarterly Insights & more..🚀 [Securing Things by M. Yousuf Faisal]

In partnership with

Disclaimer: All views presented here, in this newsletter, are my own.

Author or the newsletter are not liable for any actions taken by any individual or any organization / business / entity. The information provided is for education and awareness purposes only and is not specific to any business and or situation.

M. Yousuf Faisal

Hello friends,

Hope you are doing well. This marks the 60th edition of Securing Thing newsletter.

For those that are new and curious… and those that wants a quick recap.

Here’s a living index of all series (current/future) - make sure to ✍️ bookmark this.

Will be a featured post on newsletter main page.

Here’s a list of topics no particular order:

  • 🧑‍🎓 Getting started in IT & OT Cybersecurity Series - 12 step career Transformation Blueprint (on-going: 4 steps published).

  • ✍️The OT Security Dozen - a 12 Part series on Building an OT/ICS Cybersecurity Transformation Program (on-going: 4 parts published).

  • 📘 ISA/IEC 62443 Standards Overview Series (on-going: 5 parts published).

  • ↪️ IT/OT Cybersecurity Program Transformation Series - Multiple strategies.

  • ↪️ Cybersecurity & AI across IT-OT Automation Stack - Monthly Digest.

  • ↪️ The Digital Factory Cybersecurity - Digital Transformation & AI Risks.

  • 📲Misc. Cybersecurity Topics (Crash Course) - EDR, ITDR, Quantum Computing.

  • 📘 Cybersecurity Regulations & Standards - HK, SG, ISA 62443, PCI DSS etc.

  • ‼️Cybersecurity Industry Insights & Quarterly Series - Dec 2023 onwards.

     

  • ✍️Chronicles of Cybersecurity Consulting Series & few Business lessons.

  • ✍️Must know IT & OT Cybersecurity Series - newsletters, projects, tools, and other resources.

But before we begin, do me a favour and make sure you “Subscribe” to let me know that you care and keep me motivated to publish more. Thanks!

Ready? let’s dive into each of the series.

Alert! some headache / indigestion / is possible if you try to take the following all at once; so take these doze - one series at a time 😀😉.

I hope this helps in your journey. Let me know if it does!

Wishing you all the best.

Warning: Gmail / other email provider may clip this as its long so be sure to click “Read Online” link on the top right hand of the email.

Together with (Sponsor):

Hire an AI BDR to Automate Your LinkedIn Outreach

Sales reps are wasting time on manual LinkedIn outreach. Our AI BDR Ava fully automates personalized LinkedIn outreach using your team’s profiles—getting you leads on autopilot.

She operates within the Artisan platform, which consolidates every tool you need for outbound:

  • 300M+ High-Quality B2B Prospects

  • Automated Lead Enrichment With 10+ Data Sources Included

  • Full Email Deliverability Management

  • Personalization Waterfall using LinkedIn, Twitter, Web Scraping & More

Getting Started in IT & OT Cybersecurity 

12 Steps, 3 Phase, Blueprint

Getting started in IT & OT Cybersecurity - A 3 phase & 12 steps blueprint.

Phase A - Initiate, Validate, Prepare & Plan

  1. 👉Step 1 – Get to know the Industry, stakeholders, critical infrastructure sectors & the ecosystems – research & get excited.

  2. 👉Step 2 – Learn IT & OT/ICS basics - acronyms, device types, famous attacks, key differences between IT & OT, and more.

  3. 👉Step 3 – Mappings across IT/OT processes, layers of Automation stack, Purdue Model & domain specific knowledge areas.

  4. 👉Step 4 – Know the career tracks / options (tasks / skills) & craft a career + progression plan. 

    Coming soon…

    Phase B - Execute & Implement the Plan - Breaking into Cybersecurity

  5. 👉 Step 5 – Trainings (possibly get certified) (Theory + Practical / hands-on / CTF) (both free & paid).

  6. 👉Step 6 – Learn few local / regional / international best practices guidance, standards & regulations.

  7. 👉 Step 7 – Find experts / mentor(s), connect & build professional network (find potential projects).

  8. 👉 Step 8 – Build resume, online profiles, get connected / network, interview & break into cybersecurity.

    Phase C - On-going career progression - Land and expand

  9. 👉Step 9 – Gain experience & stay up-to-date with industry events / changes via online/in-person forums, communities & more.

  10. 👉Step 10 – Advance training/certs to expand hard (e.g. technical) & soft skills (e.g. leadership, presentation/communications etc.).

  11. 👉Step 11 – Several resources to subscribe to —> Read | Watch | Listen | & Practice.

  12. 👉Step 12 – Continuously Learn | Unlearn | Learn per industry trends, personal branding & more.

🙂Hope this is maybe of some value and or transformative for you.

What would you to be added in near future? Add even if its some humour

The OT Security Dozen Series

The OT Security Dozen - a 12 Part series on Building an OT/ICS Cybersecurity Program:

Phase 1 - Evaluate | Assess | Discover | Define (Identify) 

  1. Part 1 - OT / ICS Cyber security Assessments / Reviews.

  2. Part 2 - OT / ICS Cyber security Policy & Governance.

    Phase 2 - Implement | Deploy (Predict, Protect & Detect)

  3. Part 3 - OT / ICS Network security Architecture & Segmentation (between IT & OT networks).

  4. Part 4 - OT / ICS Asset Discovery, Vulnerabilities & Threat Detection (or OT IDS / AD) Solution Selection & Implementation.

  5. Part 5 - OT / ICS Secure Remote Access.

  6. Part 6 - OT / ICS Access Control (IDAM).

  7. Part 7 - OT / ICS Endpoint Protections & Controls (AV, Host IDS/EDR, Data Protection, USB controls).

  8. Part 8 - OT / ICS Configuration Hygiene & Patch Management.

    Phase 3 - Monitor, Maintain & Measure (Detect & Respond)

  9. Part 9 - OT / ICS Supply Chain Security (risks related to SBOM, OEMs, third-party service providers).

  10. Part 10 - OT / ICS Cyber security Monitoring (via an Integrated SOC / MSS Operations) & Threat Intelligence.

  11. Part 11 - OT / ICS Backups, Incident Response & BCP.

  12. Part 12 - OT / ICS Audit, Security Testing & Continuous Measurement.

🙂Hope this is maybe of some value and or transformative for you.

What would you like me to add in near future?

ISA/IEC 62443 Standards Overview Series

  1. ISA/IEC 62443 Standards Overview Series - Part 1 - Standards Overview Series, covering key topics on what you need to know.

  2. ISA/IEC 62443 Standards - Part 2 - Standards Overview Series, covering key topics on what you need to know.

  3. ISA/IEC 62443 Standards - Part 3 - Standards Overview Series, covering key topics on what you need to know.

  4. ISA/IEC 62443 Standards - Part 4 - 62443-2-1:2024 Standard updates and more.- Standards Overview Series, covering key topics on what you need to know.

  5. ISA/IEC 62443 Standards - Part 5 Security Program Elements (SPEs) for 62443-2-1:2024, Upcoming Asset Owner ACS Security Assurance (ACSSA) Certification Scheme to ISA/IEC 62443-2-1, 2-4, 3-2, 3-3 by ISCI, CISO's role, other interesting reads. 

    Coming soon.

  6.  ISA/IEC 62443 Standards - Part 6 and more.

🙂Hope this is maybe of some value and or transformative for you.

What would you like me to add in near future?

IT/OT Cybersecurity Program Transformation Series

  1. IT & OT Cybersecurity Strategy - Building an IT & OT/ICS Cybersecurity Strategy.

  2. Presenting IT & OT Cyber-security Strategy - to Executives / Board of Directors.

  3. IT & OT Cybersecurity Strategy, Program, Execution & Management - basics around strategy, program execution and management.

     

  4. IT & OT/ICS Cybersecurity & Resilience Transformation Program CISO / CIO / CTO's Guide to Cybersecurity & Resilience Transformation Program.

  5. Secure by 3Ds (Demand | Design | Default)  The trifecta reshaping IT & OT cybersecurity industry! Discover what these mean, why they matter, and how they protect critical infrastructure. 🚀

  6. Complexity Ain't an Excuse for OT/ICS Insecurity - Here's How to Lock It Down! Complexity as an Excuse - is NOT a Free Pass, Key Concepts, Surveys vs. Real-World Incident vs. Case Study, Start OT/ICS Cybersecurity Journey, Elevate your OT/ICS Cybersecurity Posture.

  7. Boost Your Defense Game! IT & OT/ICS Cybersecurity Training - Bridging IT & OT gap via Training, Key Stages of Manufacturing Lifecycle and Cybersecurity risks, Breaches - Case Studies / Lessons & STA.

  8. IT & OT/ICS Cybersecurity Policy(/ies) Deciding on the Policy Route

  9. AI Cybersecurity Policy & Reference Guidance (a recap)

  10. CISOs Guide to AI - list of 12 high-level steps CISO’s can take, to start addressing AI risks and 50 Curated References as additional Guidance.

  11. OT/ICS Cybersecurity Requirements Specification for SMB Manufacturers

  12. OT Security Visibility Solutions & Metrics  Lessons learned consulting on top OT Security Solutions, KPIs/ODMs, & more.

  13. Internal Audit and IT & OT Cybersecurity Program Challenges for Internal Audit Teams and Suggested Approach for Internal Auditors -

  14. IT Cybersecurity Toolkit for Small/Medium Businesses Starting with IT Cybersecurity for your Small or Medium Enterprise Business. 

    More coming soon.

  15.  xxxxxxx

🙂Hope this is maybe of some value and or transformative for you.

What would you like me to add in near future?

Together with

Start learning AI in 2025

Keeping up with AI is hard – we get it!

That’s why over 1M professionals read Superhuman AI to stay ahead.

  • Get daily AI news, tools, and tutorials

  • Learn new AI skills you can use at work in 3 mins a day

  • Become 10X more productive

Cybersecurity & AI across IT-OT Automation Stack

  1. Cybersecurity and AI Across the Industrial Automation Stack - Monthly Digest # 0  Interested in Industry/Market Insights on layers of automation stack across Cloud, ERP, DMZ, MES, SCADA, HMI, PLC/Edge layers, physical devices & more.

  2. Cybersecurity and AI Across the Industrial Automation Stack - Monthly Digest # 1  Industry Trends, Market Insights on cybersecurity and AI across the layers of industrial automation stack (Cloud, ERP, DMZ, MES, SCADA, HMI, PLC/Edge), physical devices & more.

    Coming soon…

  3. Cybersecurity and AI Across the Industrial Automation Stack - Monthly Digest # 2 .

🙂Hope this is maybe of some value and or transformative for you.

What would you like me to add in near future?

The Digital Factory - Cybersecurity

  1. The Digital Factory (Hub & Spoke) - Part 1 UNS concept, Digital factory, 4.0, data/event driven architecture, industry conferences, and more.

  2. The Digital Factory (Data Flow) - Part 2 Industry 4.0 data/event driven data flows and security considerations and how's CISO's role is evolved in OT security..

    More coming soon…

  3. The Digital Factory (Network Architecture) - Part 3 and more.

    Other related…

  4. Digital Transformation & Cybersecurity Strategy - Premier - for the digital factory.

  5. Digital Manufacturing at Risk - Start with Cybersecurity and Digital Transformation Maturity Assessment Reviews Now! 📢 Cybersecurity or Digital Transformation Maturity Assessment + Sample Request for information (RFI)!🛡️& Cyber Defense Matrix across Automation Stack.

  6. Role of AI & Cybersecurity in Manufacturing - Use Cases, Predictions, Threats, Mitigations

🙂Hope this is maybe of some value and or transformative for you.

What would you like me to add in near future?

Misc. Cybersecurity Topics - Crash Course Style

  1.  Endpoint Detection & Response (EDR) Solutions for IT & OT/ICS.

  2. Quantum Computing Cybersecurity Crash Course - Quantum Computing basics and the Future Cybersecurity Concerns.

  3. What the heck is ITDR? A Crash Course on Identity Threat Detection & Response (ITDR) and its role in Identity Security Ecosystem.

    More coming soon… 

🙂Hope this is maybe of some value and or transformative for you.

What would you like me to add in near future?

Cybersecurity Regulations & Standards

  1. Cybersecurity & Data Privacy for Hong Kong - Latest Critical Infrastructure Bill 2024 regulations, Data Privacy Program Core elements, HK Cybersecurity market insights and more.

  2. ISA/IEC 62443 Standards overview Series (Part 1 - to - 5) - links above.

  3. Singapore CII (Critical Information Infrastructure) CCOP v2 Overview - a brief overview of the standard.

  4. PCI DSS v 4.0 - Overview & Changes - a brief overview of Payment Card Industry Data Security Standard v4.0 release.

    More coming soon… 

  5. NIS 2, ISO 27001, and more.

🙂Hope this is maybe of some value and or transformative for you.

What would you like me to add in near future?

Cybersecurity Industry Insights & Quarterly Series

  1.  Cybersecurity Reflections on 2023 & 2024 + OT/ICS Topic of the day.

  2. Cybersecurity (IT, OT/ICS, AI, Open source) Insights from Q1 2024.

  3. Cybersecurity (IT, OT/ICS, AI, Open source) Insights from Q2 2024.

     

  4. Cybersecurity (IT, OT/ICS, AI, Open source) Insights from Q3 2024.

  5. Cybersecurity (IT, OT/ICS, AI, Open source) Insights from Q4 2024

  6. Unlocking 2025: Must-Know Cybersecurity Predictions for IT, OT, and Beyond! Cybersecurity Predictions for 2025: Are You Ready for the rest of the yea.

  7. Biggest Cybersecurity Acquisition Ever! Google Acquisition of Wiz - a $32B Bet to End “Security Theatre” and future of Multi-Cloud Security, also includes analyst views what this means for the cybersec industry.🚀.

    More Coming soon…

🙂Hope this is maybe of some value and or transformative for you.

What would you like me to add in near future?

Chronicles of Cybersecurity Consulting & Business

  1. Chronicles of Cybersecurity Consulting - 1st in series - The Bleeding Password.

     

  2. Chronicles of Cybersecurity Consulting - 2nd in series - Shortest Consulting Engagement Ever.

  3. Chronicles of Cybersecurity Consulting - 3rd in series - Assessment Slips to Discovery.

     

  4. Chronicles of Cybersecurity Consulting - 4th in series - Stress in Cybersecurity Chronicle of a Remote OT assessment for factory from future & the stressed consultant - with some weird humour. How to identify stress and manage it, some stats and other chronicle - Tales from OT trenches and call out to share yours.

    More Coming soon…

  5. 2 years of Independent Cybersecurity Consulting & Lessons Learned - sharing personal cybersecurity consulting experience. 

  6. This is it - Good Bye. Happy New Year! Recap on 2024 and the Future of Securing Things in 2025.

🙂Hope this is maybe of some value and or transformative for you.

What would you like me to add in near future?

Must know IT & OT Cybersecurity Series

Seems these 2 were the most viral posts with most views from social.

My Recent Most Viewed Social Posts

In case you’ve missed - here are some of my recent most viewed social posts.

Ways in which I can help?

Whenever you are ready - I can help you with:

A - IT & OT Cybersecurity Advisory / Consulting services - for securing your business and or its digital transformation journey.

B - Security Awareness Training & Phishing Awareness Portal - Train your staff and build a Security awareness program through our subscription based service.

C - Securing Things Academy (STA) - Security trainings for IT & OT practitioners.

Visit the newsletter website for Links to above services and or reach out at info[at]securingthings[dot]com or DM me via LinkedIn.

D - Securing Things Newsletter - Sponsor this newsletter to showcase your brand globally, or subscribe to simply Get Smarter at Securing Things.

Reach out at newsletter[at]securingthings[dot]com or DM me via LinkedIn.

✉️ Wrapping Up

Have questions, comments, or feedback? Just reply directly, I’d love to hear from you.

Also, if you find this or previous newsletter edition(s) useful and know other people who would too, I'd really appreciate if you'd forward it to them. Thanks a ton.

Thanks for reading - until the next edition!

It’s a Great Day to Start Securing Things for a Smart & Safer Society.

Take care and Best Regards,

Follow Securing Things on LinkedIn | X/Twitter & YouTube.

Rate the newsletter content

Did you find the content valuable?

Login or Subscribe to participate in polls.

If you are reading this online don’t forget to register; validate your email, and request a login link to submit the poll.

Your feedback and input is invaluable to me as we work together to strengthen our cybersecurity defenses and create a safer and smarter digital society. Thank you for your trust and continued support.

Reply

or to participate.