Lesley Carhart: ICS DFIR Expert

Lesley Carhart: ICS DFIR Expert

Summary

In this episode of the Phillip Wylie Show, host Phillip Wylie speaks with cybersecurity expert Lesley Carhart about her journey into the field, the importance of community and mentorship, and the unique challenges of working in industrial control systems (ICS) forensics. Leslie shares her hacker origin story, discusses the complexities of ICS security, and recounts a fascinating case study involving a mysterious incident at a power plant. The conversation emphasizes the need for diversity in tech and the vital role of community support in navigating cybersecurity careers.

Takeaways

• Lesley Carhart’s journey into cybersecurity began at a young age with a passion for computers.

• The importance of mentorship in the cybersecurity community cannot be overstated.

• Industrial Control Systems (ICS) present unique challenges in cybersecurity due to their critical nature.

• Understanding processes is key to succeeding in ICS cybersecurity.

• Diversity in the tech field has improved over the years, allowing for more varied backgrounds in cybersecurity.

• Real-world investigations in ICS can lead to unexpected and humorous outcomes, like the moth story.

• Community involvement is crucial for career advancement in cybersecurity.

• Self-study and networking are essential for breaking into the cybersecurity field.

• The job market for junior cybersecurity professionals is competitive, making community connections vital.

• Lesley encourages senior professionals to mentor newcomers to the field.

Sound Bites

• “I hope we don’t end up back there.”

• “It’s been a grand adventure.”

• “Mentorship can be so, so valuable.”

Chapters

00:00 Introduction to Cybersecurity Community Connections

01:43 Lesley Carhart’s Hacker Origin Story

06:57 Diving into ICS and OT Forensics

09:47 Challenges in Industrial Cybersecurity Training

13:25 The Complexity of Digital Forensics in ICS

15:45 The Moth Story: A Case Study in ICS

25:34 The Importance of Community in Cybersecurity

30:37 Closing Thoughts and Social Media Connections

Resources

https://www.linkedin.com/in/lcarhart/

https://bsky.app/profile/hacks4pancakes.com

https://infosec.exchange/@hacks4pancakes