Finite State Blog

Exiting the Game: Key Takeaways & Future Quests

Written by Finite State Team | Apr 11, 2024 5:45:00 PM

Welcome to the fifth installment of our blog post miniseries on The Quest for SBOMs and the Legend of the SBOM'd Substation. We continue this week with the final installment from this series, inspired by the epic S4x24 main-stage presentation delivered by Matt Wyckhouse, Founder & CEO of Finite State, and Alex Waitkus, Principal Power Delivery Cybersecurity Architect at Southern Company. 

If you missed the last post in the series, you can find it here.

As we wrap up this chapter in our journey, "The Quest for SBOM", we've navigated through an epic landscape of challenges and discoveries. Our adventure, marked by the pursuit of comprehensive cybersecurity measures in substations, has laid a foundation for what's to come.

Here's a recap of our pivotal moments and the horizons that await:

Key Learnings & Insights

  • The SBOM Odyssey: Averaging 60 days to secure an SBOM and enduring 12 communications per request highlights the resilience and commitment required in modern cybersecurity practices.
  • Boss-Level Challenge: Managing an average of 1,807 components for Linux-based systems underscored the monumental task of distinguishing critical vulnerabilities from the noise.
  • Strategic Victories: Achieving a 25% success rate in acquiring SBOMs and a 99% reduction in vulnerabilities post-VEX documentation illustrates the power of focused, intelligent cybersecurity efforts.

Challenges & Opportunities

  • A Call for Standardization: The quest revealed a pressing need for standardized SBOM formats to streamline collection and analysis.
  • Beyond the Substation: The challenges faced underscore the broader industry's requirement for improved SBOM adoption and management practices, highlighting an opportunity for widespread transformation in the utility sector.

Next Steps on the Journey

  • Automated SBOM Collection: Innovating automated tools for efficient SBOM collection will be a key focus, aiming to reduce time and effort while increasing coverage.
  • Collaborative Frameworks: Strengthening industry-wide collaboration through initiatives like the DOE CESER project, involving key players such as Finite State, EPRI, and Schneider Electric, to establish best practices and shared standards.
  • Refining the Arsenal: The next phase involves enhancing exploitability analysis to not just identify vulnerabilities but to understand their practical impact and prioritize remediation effectively.

As we pause at this milestone, the game is far from over. With the groundwork laid and alliances forged, we're poised to tackle the next set of challenges with even greater determination. The quest for securing our digital and physical infrastructure continues, and together, we're ready to level up.

OT Cybersecurity - What's Next?

As we wrap up our insightful journey through the intricacies of Software Bill of Materials (SBOMs) and their pivotal role in enhancing operational technology (OT) security within electric utilities, it's clear that the path to a secure and resilient power grid is both necessary and complex. Cyber threats continue to evolve, presenting new challenges to public safety, national security, and the stability of our critical infrastructure. But with the right tools and knowledge, these challenges can be met head-on.

Diving deeper, our white paper, "Strengthening OT Security in Electric Utilities," offers an extensive exploration of SBOMs and their crucial function in safeguarding your software supply chain. From understanding the application of SBOMs in OT equipment to recognizing their limitations, this resource is designed to equip you with the comprehensive insights needed to navigate the cybersecurity landscape effectively. It serves as a blueprint for utility companies seeking to fortify their defenses against the ever-growing threat of cybercrime.

To embark on your next step towards bolstering OT security and ensuring the uninterrupted operation of the electric power grid, we invite you to delve into our white paper. Here, you'll uncover:

  • Valuable strategies for implementing SBOMs
  • Detailed discussions on their role within the software supply chain
  • Practical advice on overcoming potential hurdles

Discover how to harness the transformative power of SBOMs for your electric utility. Read the white paper today and begin your journey towards a more secure future.