<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Seth Bromberger</title><link>https://www.bromberger.com/</link><description>Recent content on Seth Bromberger</description><generator>Hugo</generator><language>en</language><atom:link href="https://www.bromberger.com/index.xml" rel="self" type="application/rss+xml"/><item><title>About</title><link>https://www.bromberger.com/about/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://www.bromberger.com/about/</guid><description>&lt;p&gt;Seth Bromberger has spent more than thirty years working in network and systems security across government, finance, energy, and defense.&lt;/p&gt;
&lt;p&gt;At &lt;a href="https://www.llnl.gov" target="_blank" rel="noreferrer"&gt;Lawrence Livermore National Laboratory&lt;/a&gt;, he works on graph analytics and data science tooling for high-performance computing environments, with a continuing focus on cybersecurity for critical infrastructure.&lt;/p&gt;
&lt;p&gt;Since 2024, Seth has been an Adjunct Professor of Computer Science at &lt;a href="https://www.csueastbay.edu" target="_blank" rel="noreferrer"&gt;California State University, East Bay&lt;/a&gt;, where he teaches CS471, &lt;em&gt;Security and Information Assurance&lt;/em&gt;.&lt;/p&gt;</description></item><item><title>Projects &amp; Research</title><link>https://www.bromberger.com/projects/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://www.bromberger.com/projects/</guid><description>&lt;h3 id="clippy" class="relative group"&gt;CLIPPy - A Python Interface to HPC Resources &lt;span class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100"&gt;&lt;a class="group-hover:text-primary-300 dark:group-hover:text-neutral-700" style="text-decoration-line: none !important;" href="#clippy" aria-label="Anchor"&gt;#&lt;/a&gt;&lt;/span&gt;&lt;/h3&gt;&lt;p&gt;&lt;a href="https://github.com/LLNL/clippy" target="_blank" rel="noreferrer"&gt;CLIPPy&lt;/a&gt; (CLI + Python) exposes precompiled HPC binaries as methods on a dynamically-created Python object, giving researchers and data scientists a familiar interactive interface — at the REPL or in a notebook — without needing to learn complex job submission systems. A detailed description is available in &lt;a href="https://ieeexplore.ieee.org/abstract/document/9652966" target="_blank" rel="noreferrer"&gt;our IA3 2021 paper&lt;/a&gt;.&lt;/p&gt;
&lt;h3 id="metalldata" class="relative group"&gt;MetallData - HPC-Scale Interactive Data Science &lt;span class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100"&gt;&lt;a class="group-hover:text-primary-300 dark:group-hover:text-neutral-700" style="text-decoration-line: none !important;" href="#metalldata" aria-label="Anchor"&gt;#&lt;/a&gt;&lt;/span&gt;&lt;/h3&gt;&lt;p&gt;&lt;a href="https://github.com/MetallData/metalldata" target="_blank" rel="noreferrer"&gt;MetallData&lt;/a&gt; is an HPC platform for interactive data science at scale. Its centerpiece is MetallGraph, a persistent distributed graph data structure designed to handle tens of billions of nodes on HPC systems.&lt;/p&gt;</description></item><item><title>Publications, Presentations &amp; Citations</title><link>https://www.bromberger.com/publications/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://www.bromberger.com/publications/</guid><description>&lt;h2 id="publications--presentations" class="relative group"&gt;Publications &amp;amp; Presentations &lt;span class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100"&gt;&lt;a class="group-hover:text-primary-300 dark:group-hover:text-neutral-700" style="text-decoration-line: none !important;" href="#publications--presentations" aria-label="Anchor"&gt;#&lt;/a&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;ul class="pubs"&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.bromberger.com/files/Paper_1__AR_Coder.pdf"&gt;An Evaluation of Transliterated Arabic Name Matching Methods&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Co-author. Accepted, 91st Military Operations Research Society (MORS) Symposium, &amp;#34;Analytics as a Force Multiplier&amp;#34;&lt;/span&gt;, 12 June 2023
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://ieeexplore.ieee.org/abstract/document/9652966"&gt;Towards Scalable Data Processing in Python with CLIPPy&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Co-author. 2021 IEEE/ACM 11th Workshop on Irregular Applications: Architectures and Algorithms (IA3)&lt;/span&gt;, 15 November 2021
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.bromberger.com/files/bcest.pdf"&gt;Improving Estimation of Betweenness Centrality for Scale-Free Graphs&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Co-author&lt;/span&gt;, 17 November 2017
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Simulation of a RTU cyber attack on a transformer bank&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Co-author. 2017 IEEE Power &amp;amp; Energy Society General Meeting&lt;/span&gt;, 16-20 July 2017
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.youtube.com/watch?v=MFD-qmApXl8"&gt;LightGraphs: Our Network, Our Story&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;JuliaCon 2017&lt;/span&gt;, 20 June 2017
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Cybersecurity and the Supply Chain: A Case Study&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;California Network for Manufacturing Innovation Cybersecurity Summit&lt;/span&gt;, 27 October 2016
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;An Introduction to the Cybersecurity Capability Maturity Model (C2M2)&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;NORCAL AMSC Cybersecurity Forum&lt;/span&gt;, 17 August 2016
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Industrial Control Systems Security&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;California Cyber Security Symposium&lt;/span&gt;, 30 September 2015
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.bromberger.com/files/Cyber_Risk_Isnt_Always_in_the_Computer_WSJ.pdf"&gt;Cyber Risk Isn’t Always in the Computer&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Wall Street Journal&lt;/span&gt;, 24 September 2015
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;RSA Conference 2015 Wrap Up: Exclusive Q&amp;amp;A with Seth Bromberger of NCI Security&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Lancope Blog&lt;/span&gt;, 29 April 2015
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.bromberger.com/files/lies.pdf"&gt;“Lies, Damned Lies, and Statistics”: Improving the Effectiveness of Indicators of Compromise&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Industrial Control Cyber Security USA conference (co-chairman) / Cyber Senate&lt;/span&gt;, 7 October 2014
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Incident Response, Management and Recovery Roundtable&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Industrial Control Cyber Security USA conference (co-chairman) / Cyber Senate&lt;/span&gt;, 6 October 2014
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Interview: Home Depot Security Breach&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;KRON4 News&lt;/span&gt;, 18 September 2014
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;“It won&amp;#39;t happen to me”: Denial in the Age of Indiscriminate Attacks&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Wine Industry Technology Symposium&lt;/span&gt;, 30 June 2014
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.youtube.com/watch?v=QG-O8IjigZM"&gt;Hackers Breach Security at EBay&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;KRON4 News&lt;/span&gt;, 21 May 2014
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2519887"&gt;Defining Criticality in a Networked World: Implications of the Use of Information and Communications Technology for Efforts to Promote the Security and Resilience of Critical Infrastructure&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Co-author&lt;/span&gt;, 17 January 2014
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.dropbox.com/scl/fi/un26jniyedi9kev9qyhv2/graphtheory.mp4?rlkey=gjy64k54wu0na6n3wyz7fmuro&amp;amp;dl=0"&gt;Graph Theoretic Approaches to Incident Response in Smart Grids&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Digital Bond S4x14&lt;/span&gt;, 16 January 2014
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Measuring Progress in Cybersecurity Efforts&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;CyberSecurity for Energy and Utilities Abu Dhabi (chairman)&lt;/span&gt;, 8 October 2013
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Threat Update for the Oil and Gas Sector&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;CyberSecurity for Energy and Utilities Abu Dhabi (chairman)&lt;/span&gt;, 7 October 2013
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.bromberger.com/files/1024421_final.pdf"&gt;Network Security Management for Transmission Systems&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Electric Power Research Institute&lt;/span&gt;, 15 January 2013
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.cisa.gov/news-events/ics-advisories/icsa-12-348-01"&gt;ICSA-12-348-01: Siemens ProcessSuite and Invensys Wonderware InTouch Poorly Encrypted Password File&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;ICS-CERT&lt;/span&gt;, 13 December 2012
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Cybersecurity: Getting Ahead of the Wave&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;San Francisco Bar Assoc.&lt;/span&gt;, 5 November 2012
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Architecture Roundtable&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;GridSec 2012&lt;/span&gt;, 24 October 2012
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.bromberger.com/files/nCircle-WP-GettingTheMostValue-1129-02.pdf"&gt;Assessing the Maturity of Your VM and Compliance Programs&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;nCircle Connect&lt;/span&gt;, 23 October 2012
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;The Electricity Subsector Cybersecurity Capability Maturity Model&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;GridSec 2012&lt;/span&gt;, 22 October 2012
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;New FERC Cybersecurity Office Has Lofty Oversight and Outreach Goals&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Threatpost&lt;/span&gt;, 25 September 2012
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.bromberger.com/files/ThreatMgmt_IQPC_Doha.pdf"&gt;Quantitative Threat Methodology&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Cybersecurity For Energy and Utilities Qatar&lt;/span&gt;, 18 September 2012
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Java 1.7 zero-day exploit unlikely to impact most Mac users&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;TUAW&lt;/span&gt;, 28 August 2012
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Towards a Quantitative Threat Methodology&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;GFIRST 2012 conference&lt;/span&gt;, 22 August 2012
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;SMS sender spoofing possible on iOS: what you need to know&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;TUAW&lt;/span&gt;, 17 August 2012
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.oilandgasiq.com/strategy-management-and-information/podcasts/information-sharing-is-the-only-way-to-defeat-the"&gt;Information Sharing Is The Only Way To Defeat The Cyber Onslaught&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Oil and Gas IQ Interview&lt;/span&gt;, 27 July 2012
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Advanced Threat Video Series&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Dell SecureWorks&lt;/span&gt;, 27 July 2012
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.bromberger.com/files/SGT_redist_120608.pdf"&gt;Utilities urged to increase vigilance over meter firmware, upgrades&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Smart Grid Today&lt;/span&gt;, 8 June 2012
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.energy.gov/ceser/cybersecurity-capability-maturity-model-c2m2"&gt;The Electricity Subsector Cybersecurity Capability Maturity Model&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Contributor&lt;/span&gt;, 31 May 2012
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Real World Security: Maximizing the Value of Your Security Investments&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Webinar&lt;/span&gt;, 30 May 2012
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Architecture of Secure Systems [for the Smart Grid]&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;ConnectivityWeek 2012&lt;/span&gt;, 24 May 2012
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;AMI Networks: PKI Security Considerations&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;TechTarget Publications&lt;/span&gt;, 2 April 2012
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.bromberger.com/files/PKI_Security_whitepaper_slides.pdf"&gt;PKI Security Considerations For AMI Networks&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;NESCO Webinar&lt;/span&gt;, 29 March 2012
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.bromberger.com/files/SecurityLoggingCMM1.0.pdf"&gt;Security Logging in the Utility Sector: Roadmap to Improved Maturity&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Published Paper&lt;/span&gt;, 12 March 2012
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;“;Me and My Job”; Profile in SC Magazine&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;SC Magazine&lt;/span&gt;, 1 March 2012
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;PKI Implications for AMI security&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;RSA 2012 / IOActive IOAsis&lt;/span&gt;, 28 February 2012
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.bromberger.com/files/pki_whitepaper_1.4.pdf"&gt;PKI Security Considerations for AMI, Smart Grid, and ICS Networks&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Published Paper&lt;/span&gt;, 12 January 2012
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Supply Chain of Cryptographic Key Material&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;EyeForEnergy Conference&lt;/span&gt;, 27 September 2011
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Bridging the Gap Between Operations and Information Technology&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;EyeForEnergy Conference&lt;/span&gt;, 27 September 2011
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.pcworld.com/article/239269/mac_os_x_cant_properly_revoke_dodgy_digital_certificates.html"&gt;SSL Certificate Scandal Exposes Bug in Mac OS X&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;PC Magazine&lt;/span&gt;, 1 September 2011
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.engadget.com/2011-09-01-how-to-get-rid-of-diginotar-digital-certificates-from-os-x.html"&gt;How to get rid of DigiNotar digital certificates from OS X&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;TUAW&lt;/span&gt;, 1 September 2011
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.computerworld.com/article/2738866/mac-os-x-can-t-properly-revoke-dodgy-digital-certificates.html"&gt;Mac OS X Can&amp;#39;t Properly Revoke Dodgy Digital Certificates&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;IDG News&lt;/span&gt;, 31 August 2011
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Smart Grid Cyber Security, Myths &amp;amp; Opportunities&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;ConnectivityWeek 2011&lt;/span&gt;, 26 May 2011
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.youtube.com/watch?v=ds8gm3kIRtU"&gt;Smart Grid Security East 2011: Interviews&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Youtube Video&lt;/span&gt;, 13 May 2011
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.energy.gov/sites/default/files/oeprod/DocumentsandMedia/DNS_Exfiltration_2011-01-01_v1.1.pdf"&gt;DNS as a Covert Channel Within Protected Networks&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Published Paper&lt;/span&gt;, 25 January 2011
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;An Overview of AMI and Associated Deployment Challenges&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;CMU&lt;/span&gt;, 15 November 2010
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Data Protection: EnergySec&amp;#39;s plan for critical infrastructure&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;CSO Magazine&lt;/span&gt;, 16 June 2010
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;What if the smart grid has stupid security?&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;CSO Magazine&lt;/span&gt;, 11 May 2010
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="http://www.cyblog.cylab.cmu.edu/2010/03/rsa-2010-hacking-smart-grid-myths.html"&gt;RSA 2010: Hacking the Smart Grid -- Myths, Nightmares &amp;amp; Professionalism&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;CMU CyLab&lt;/span&gt;, 3 March 2010
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Critical Condition: Utility Infrastructure&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;SC Magazine&lt;/span&gt;, 1 February 2010
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.bromberger.com/files/renew-grid-100109.pdf"&gt;Hunkering Down To Specify Smart Grid Security Standards&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;RenewGrid&lt;/span&gt;, 15 October 2009
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Securing our Critical Infrastructure&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Cyber Security West Conference&lt;/span&gt;, 14 October 2009
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Sharing Threat Data Is Key To Securing The Power Grid&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;GCN&lt;/span&gt;, 24 September 2009
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.washingtontechnology.com/2009/08/electric-industry-creates-alternative-channel-for-sharing-data-on-infrastructure-security/323266/"&gt;Electric Industry Creates Alternative Channel For Sharing Data On Infrastructure Security&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Washington Technology&lt;/span&gt;, 11 August 2009
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Powering Up - Prioritizing Security Threats&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Baseline Magazine&lt;/span&gt;, 27 May 2009
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.bromberger.com/files/Bromberger-EnergySectorNeedsInfoSharingToo.pdf"&gt;The Energy Sector Needs Information Sharing, Too&lt;/a&gt;&lt;/strong&gt;
 , 8 May 2009
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.bromberger.com/files/Bromberger-WithEconomicSlumpConcernsRiseOverDataTheft.html"&gt;With Economic Slump, Concerns Rise Over Data Theft&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;IDG News&lt;/span&gt;, 29 January 2009
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;What Works in Security Control Systems&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;SANS SCADA Security Summit&lt;/span&gt;, 9 January 2009
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.bromberger.com/files/honeypots%20and%20control%20systems.pdf"&gt;The SCADA Honeynet Experience at INL&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Published Paper&lt;/span&gt;, 12 November 2008
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.pcworld.com/article/536728/system_threats.html"&gt;Computer Threat for Industrial Systems Now More Serious&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;IDG News&lt;/span&gt;, 10 September 2008
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.bromberger.com/files/Bromberger-SoftwareWatchdogWorkingOnEnterpriseSecurityMetrics.pdf"&gt;Software Watchdog Working On Enterprise Security Metrics&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;IDG News&lt;/span&gt;, 9 August 2008
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.csoonline.com/article/521552/business-continuity-how-to-prioritize-threats-without-spending-big-bucks.html"&gt;How to Prioritize Threats (Without Spending Big Bucks)&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;CSO Magazine&lt;/span&gt;, 17 April 2008
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.bromberger.com/files/Bromberger-ResearcherPutsQuantitativeMeasurement.pdf"&gt;Researcher Puts Quantitative Measurement on Information Security Threats&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Information Security Magazine&lt;/span&gt;, 15 March 2008
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Mitigations for the Aurora Vulnerability&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;SANS SCADA Security Summit&lt;/span&gt;, 15 January 2008
 &lt;/li&gt;
 
&lt;/ul&gt;

&lt;h2 id="press-releases" class="relative group"&gt;Press Releases &lt;span class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100"&gt;&lt;a class="group-hover:text-primary-300 dark:group-hover:text-neutral-700" style="text-decoration-line: none !important;" href="#press-releases" aria-label="Anchor"&gt;#&lt;/a&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;ul class="pubs"&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.bromberger.com/files/Bromberger-nCircleExpandsVulnScanningForSCADADevices.pdf"&gt;nCircle Expands Vulnerability Scanning For SCADA Devices&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;nCircle&lt;/span&gt;, 23 June 2012
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.bromberger.com/files/Bromberger-DOESelectsEnergySec.pdf"&gt;DOE Selects EnergySec To Create The National Electric Cybersecurity Organization&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;EnergySec&lt;/span&gt;, 14 October 2010
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.bromberger.com/files/nCircle-CS-PGE-1019-07.pdf"&gt;Large Utility Implements Metrics Based Security Risk Management System with nCircle™&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;nCircle&lt;/span&gt;, 2010
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Energy Sector Security Consortium Announces Founders&amp;#39; Circle Partnerships&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;EnergySec&lt;/span&gt;, 23 September 2009
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;Industry Group Expands Energy Security Initiatives&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;EnergySec&lt;/span&gt;, 3 February 2009
 &lt;/li&gt;
 
 &lt;li style="margin-bottom: 0.75rem;"&gt;
 &lt;strong&gt;&lt;a href="https://www.bromberger.com/files/Forrester2008.pdf"&gt;The Total Economic Impact™ Of SecureWorks’ Managed Security Services&lt;/a&gt;&lt;/strong&gt;
 &lt;br&gt;&lt;span&gt;Forrester Research&lt;/span&gt;, 15 March 2008
 &lt;/li&gt;
 
&lt;/ul&gt;</description></item></channel></rss>