Tom is the keynote speaker at the IEEE Smart Grid Cybersecurity workshop in Atlanta this week, " Developing Your Supply Chain Cyber Risk Management Plan ".
He is one of the many voices in the cybersec "sound studio" with a very favorable signal/noise ratio that I find worth listening to. All well researched and substantive insights and no BS - that's what I like about Tom's analysis. In his 12/6 posting he states "E&E News reported in May that 200,000 “implants” (i.e. pieces of malware) had been installed in US water, gas and oil, and electric power infrastructure, according to the former deputy director of the NSA." He goes on further to state " you would be amazed if I told you there has been no activity (discernible by myself or anybody else I know, which includes a number of people with security clearances and an indisputable need to know about any malware implanted in the grid) to root out this malware that has been implanted, or at least to investigate whether the reports are true or not. "
I hope to see Tom in Atlanta and to show him, during my talk, that some work is indeed underway to root out malware using a risk based "software background check" solution based on the patent pending Software Assurance Guardian™ methodology that produces a risk score, called SAGScore™, that's modeled after the FICO score, to indicate the risk posed by a software object. This approach can be applied to both newly acquired and existing installed software to determine the risk level of any software object.