Skip to content
I Help Women In Tech Earn More Money

I Help Women In Tech Earn More Money

  • Home
  • Secure The InfoSec Bag
  • About Keirsten
  • Why I Do This
  • FAQS
  • Resources

Category: Critical Infrastructure Attacks

Tripwire Post: Security Research Ideas to Improve Post-Graduation Outcomes

One of the ways I try to give back to the community is by using my writing to be the…

Continue Reading →

Posted in: Academia, Career Tips, Conferences, Critical Infrastructure Attacks Filed under: academia, Career advice

How To Write a Business Continuity Paper

I’ve recently observed people asking for research paper ideas if the subject is not strictly defined in the assignment requirements. If…

Continue Reading →

Posted in: Academia, Critical Infrastructure Attacks, Research Papers, Security Case Studies Filed under: Business Continuity, forensics, ICS, IT Contingency, NERC-CIP, SCADA

How to Marry IT and OT Security

The newly increased focus on cyber security will provide opportunities to make a positive impact, but security professionals should take…

Continue Reading →

Posted in: Career Tips, Critical Infrastructure Attacks Filed under: critical infrastructure, ICS, OT security, SCADA

The Worst Cyber Crime Today

The most damaging corporate computer crime today is hacking large companies that manage our nation’s critical infrastructure, such as electricity…

Continue Reading →

Posted in: Critical Infrastructure Attacks, Cybercrime Filed under: critical infrastructure, encryption, file obfuscation, forensics, HMI attacks, ICS, ransomware, SCADA

2016 ICS Security Incidents

1 Comment

Back in October, we were asked to analyze significant events that impacted critical infrastructure in 2016. I reviewed publicly available…

Continue Reading →

Posted in: Critical Infrastructure Attacks Filed under: critical infrastructure, DDoS, ICS, remote access, security solutions

Power Utility Attack Lessons Learned

One of my first graduate research papers was about cyber attacks against critical infrastructure. After that, I became passionate about…

Continue Reading →

Posted in: Critical Infrastructure Attacks Filed under: Cyber careers, ICS, power utilities, risk mitigation, SCADA, security solutions

Let’s Connect!

  • LinkedIn
  • Twitter

Reader Favorites

  • #WeCyberToo: Quiessence Phillips, VP-Cybersecurity Ops
  • Secure The InfoSec Bag: Six Figure Career Guide For Women
  • How To Keep Your Accomplishments In Front Of Your Boss
  • How Credentials Impacted My Career
  • Salary Negotiation Tips from White Men in Tech: Part 1
  • Pass the new CISSP Exam
  • Security+ Exam Prep Tips
  • #FinanceFridays Recap: Life Insurance
  • Salary Negotiation Tips from White Men in Tech: Part 2

Categories

Recent Posts

  • Promote Yourself. But Also, How Does Wealth Work?
  • ASK FOR THE DAM BONUS! + Last Chance for Stocks101
  • Stop Underestimating Your Value
  • Sip & Stocks101: Feb 14
  • Stocks101 Resources
  • #FinanceFridays Recap: Life Insurance
  • Closing Keynote Speaker at Diana Initiative Virtual Conference!
  • Cyberjutsu Con Speaker!
  • How I Passed My GICSP Exam
  • Women’s Society of Cyberjutsu Career Webinar Oct. 17th
  • HouSecCon2019 ICS Track Speaker
  • Salary Negotiation Tips from White Men in Tech: Part 2
  • Salary Negotiation Tips from White Men in Tech: Part 1
  • Tripwire Resources for Aspiring Engineers
  • Tribe of Hackers out January 28th!
  • Walker’s Legacy Power15 Houston Honoree
  • University of Houston Energy Sector Cyber Career Event
  • How To Keep Your Accomplishments In Front Of Your Boss
  • Keynote Speaker at Diana Initiative!
  • Digital Security Check-up
  • Listen While You Work
  • Did You Earn Certs & Expect a $20,000 Raise?
  • Support Other Women + Save The Date!
  • Secure The InfoSec Bag: Six Figure Career Guide For Women
  • Dark Reading Women Changing The Game
  • Women in Security Panel at HouSecCon
  • Tripwire Post: Security Research Ideas to Improve Post-Graduation Outcomes
  • It’s Ok To Be Extra
  • Go to Grad School or Get a Job?
  • How Credentials Impacted My Career
  • How She Passed Her First PCI Audit
  • Should Researchers Hack Back? My answer: NO
  • Talent Shortage Sanity Check
  • #WeCyberToo: Sakinah Tanzil, Sr. Security Pro
  • How To Write a Business Continuity Paper
  • How To Write An Abstract
  • Medical Records Breach: Part 2
  • Medical Records Breach: Part 1
  • #WeCyberToo: Nicole Fagin, Sr. InfoSec Pro
  • #WeCyberToo: Dr. Stephanie Carter, CEO
  • Forensics Sources Part 4: Logs
  • HOU.SEC.CON 7.0 Review
  • Forensics Sources Part 3: File Systems
  • #WeCyberToo: Quiessence Phillips, VP-Cybersecurity Ops
  • Forensics Sources Part 2: Memory
  • #WeCyberToo: Cassandra Giddings, Security Engineer
  • #WeCyberToo: Tiffany L. Smith, Security Analyst, Fortune 100 Company
  • Forensics Sources Part 1: Packet Capture (PCAP)
  • Malware: How it hides, detects, and reacts
  • CASP Exam Prep. Fail. Give Back.
  • Jopwell: A Career Platform For Us, By Us
  • Security+ Exam Prep Tips
  • #WeCyberToo: Zilphia Martin, Cyber Defense Threat Analyst
  • #WeCyberToo: Krista Theodore, Security Engineer
  • Ladies: GET OUT!
  • Security is NOT Just Hacking!
  • A 3-Pronged Approach To Insider Threats
  • How To Communicate With Non-Technical Audiences
  • #WeCyberToo: Glenise Moore, Sr. Associate Schellman & Company
  • Review: Teaching Cyber at the Collegiate Level
  • 80+ Back Doors Into Cyber Careers
  • #WeCyberToo: Danyetta Magana, CEO of Covenent Security
  • SQL vs. XXS Injection Attacks Explained
  • Snort Rules for ACK Scans, Oh My!
  • ARP Attack Detection Limitations
  • IP Fragmentation vs IP Reassembly
  • How to Marry IT and OT Security
  • The Worst Cyber Crime Today
  • Cybercrime Law Review: Computer Fraud & Abuse Act
  • Samsung’s $1 Billion Mistake: 2 Week Data Retention Policy
  • Most Important in Digital Forensics: Preparation or Preservation?
  • Digital Forensics: Can You Find Hidden Data?
  • 2016 ICS Security Incidents
  • Ace Your Papers & Advance Your Career
  • Power Utility Attack Lessons Learned
  • Basic and Double Encapsulation VLAN Hopping
  • Security Design Case Study
  • Pass the new CISSP Exam
Copyright © 2020 @keirstenbrager

Enjoy this blog? Please spread the love :)

  • TWITTER
  • FACEBOOK
    fb-share-icon
  • LINKEDIN
  • RSS
  • EMAIL