June 15, 2022, 1:20 a.m. | Sam Maesschalck, Alexander Staves, Richard Derbyshire, Benjamin Green, David Hutchinson

cs.CR updates on arXiv.org arxiv.org

Cyber security risk assessments provide a pivotal starting point towards the
understanding of existing risk exposure, through which suitable mitigation
strategies can be formed. Where risk is viewed as a product of threat,
vulnerability, and impact, understanding each element is of equal importance.
This can be a challenge in Industrial Control System (ICS) environments, where
adopted technologies are typically not only bespoke, but interact directly with
the physical world. To date, existing vulnerability identification has focused
on traditional vulnerability categories. …

control discovery logic plc tool vbs vulnerability vulnerability discovery

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Cyber Security Architect - SR

@ ERCOT | Taylor, TX

SOC Analyst

@ Wix | Tel Aviv, Israel

Associate Director, SIEM & Detection Engineering(remote)

@ Humana | Remote US

Senior DevSecOps Architect

@ Computacenter | Birmingham, GB, B37 7YS