1. SCADA Security:The Five Stages of Cyber GriefTom CrossDirector of Security Research 2. Vulnerabilities I’m credited on…• MFSA2008-37 Mozilla Stack Buffer Overflow•…