Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Security Week
  • Rising Tides: Bryson Bort on Cyber Entrepreneurship and the Needed Focus on Critical Infrastructure
  • Security Week

Rising Tides: Bryson Bort on Cyber Entrepreneurship and the Needed Focus on Critical Infrastructure

Jennifer Leggio Published: April 11, 2025 | Updated: April 11, 2025 7 min read
0 views

Very few people in the cybersecurity industry do not know, or know of, Bryson Bort. Yes, he’s the CEO/Founder of SCYTHE, but he’s also the co-founder of ICS Village (the next one at RSA Conference from April 28 to May 1, 2025). This event, and all of our industry’s attention on critical infrastructure, is pivotal as it often comes down to a life-threatening situation if something were to go wrong. Read on for more about Bort, why he started SCYTHE, how that led him further down the ICS path, and be sure to check out ICS Village at RSAC.

Q. Tell me about SCYTHE, what it does, and why you started it–and why the industry needs the offerings it provides.

A. I started an offensive cybersecurity consultancy called GRIMM in 2013 after leaving the government. In 2016, Target came to us with a request to build a custom implant. I love the story of Target: their breach in 2013 created the modern cybersecurity ecosystem of organizational investment and market innovation we all enjoy now. Instead of it being a consulting project where we build a tool that trains their defense and we have to build another later, I proposed a platform that would allow you to scale any threat behavior that could ever exist on your terms—and SCYTHE was born. 

Bryson Bort
Bryson Bort

I realized I couldn’t do it alone and Ron Gula and Dmitri Alperovitch helped me raise and launch the company. The concept is simple: once a threat has breached you, they can only: 1) communicate with the protocols already in your environment to blend, 2) execute on computers you already have, 3) capabilities; only do so many things to accomplish their goals on those hosts. SCYTHE is an offensive box of Legos of communications and capabilities that allow you to no-code create anything a threat might do in your organization. This is key.

Cybersecurity is “hard” because it has to be yours. No one else can give the expert prescription at a distance for the right preventative and detective controls for you. Security is defined by the threat; it’s the only measurement that matters. Our platform allows companies to easily drive that understanding safely and easily across all teams with recommendations.

Q. SCYTHE is not your first endeavor as an entrepreneur. Please tell me about your entrepreneurial journey and what advice you might give to would-be entrepreneurs.

A. When I founded GRIMM, I learned that it’s not the idea you start with, but the agility to pivot. Which we first did by moving from specialized government work to commercial. When Target approached me in 2016 to help them build custom red team tooling, I realized it was a possible product and asked to keep the intellectual property while co-developing what became the SCYTHE platform with them for two years. Along the way, I realized I knew absolutely nothing about commercial software sales and development  which is why I reached out and expanded my network to learn. This led to Gula and Alperovitch helping me spin out SCYTHE from GRIMM. Then, I learned the hard lesson of Total Addressable Market (TAM). We were building a red team tool, there is no red team market; it’s a $3B market of in-house or outsourced experts with little budget beyond. So, we looked at how we could make it valuable outside of that scope and it’s why we were one of the leading initial proponents of purple teaming.

There are three key qualities to an entrepreneur (and being the smartest is not one of them!): risk tolerance, risk and reward of living or dying based on what you can do, and tolerance for pain. You are the chief executive officer (CEO) and the janitor for everything it takes to run this new endeavor.

Q. How did you first get interested in cybersecurity? Why is it such a passion for you?

Advertisement. Scroll to continue reading.

A. Ever since I was little, I had a penchant for technology. I was able to take things apart, put them back together (most of the time), and personally explore the increasing involvement of computers in our lives. I wanted to understand the ins and outs of MS-DOS; I programmed complex games on my graphing calculator for fun when we had to use them in high school; and I wanted to break the protections on games so I could modify them to make them more interesting. “Cybersecurity” when I worked in information security as a cadet at West Point pretty much consisted of running around with golden disks whenever a virus struck, or patches needed to be rolled out and it wasn’t much more complex when I was an Army Officer.

My passion for cybersecurity comes from a lifelong passion for service and protection. Cybersecurity isn’t an esoteric nerd thing: it is the regular people trying to live their lives and be able to manage money; it is local schools, hospitals, and towns trying to provide a good quality of life for their citizens.

Q. Tell me why the intense focus on industrial control systems (ICS) and why you co-founded ICS Village. It seems the focus on this has accelerated significantly in the last five years. Why?

A. Most people only know industrial control systems as “Stuxnet” and, even then, with a limited idea of what exactly that means. These are the computers that run critical infrastructure, manufacturing plants, and dialysis machines in hospitals. A bad day with normal computers means ransomware where a business can’t run, espionage where a company loses valuable data, or a regular person getting scammed out of their bank account. All pretty bad, but at least everyone is still breathing. With ICS, a bad day can mean loss of life or limb and that’s just at the point of use. The downstream effects of water or electricity being disrupted sends us to the Stone Ages immediately and there is a direct correlation to loss of life in those scenarios.

I co-founded the ICS Village, a non-profit 501c3 with a mission to educate and build awareness for critical infrastructure security, with Tom VanNorman in 2017 because we both believe something needs to change. And for years, no one really cared. Then, Oldsmar happened (ironically, nothing actually happened, but it still got the right attention) and we had been demonstrating that attack for years on our custom-built water plant (pictured above). Then, Colonial Pipeline was the real game changer. As I wrote in a USA Today op-ed with Dr. Paul Rosenzweig, you definitely get the attention in a hydrocarbon-based (gas) economy where disruption affects daily life.

Q.  Many career cyber folks can get myopic by only applying security solutions to the problems security practitioners face. Your approach is perceived as building a community that embraces security far beyond the industry. What makes this important?

A. Together we will succeed, individually we will continue to struggle and fail.

Q.  What is the best advice that you’ve ever been given?

A. The Law of N which is derivative of Dunbar’s Number, the limit of the number of people with which you can maintain good social relationships. The military is built on the organizational concept of squads, 4-10 soldiers, which allows the agility to respond to a rapidly changing environment with a cohesive team with the capability to drive those changes. Then, the unit scales up into platoons, companies, battalions, etc. As an officer, you learn how to manage at different echelons for a greater impact.

As an entrepreneur, it’s the same and the Law of N is the variable number of people that you can lead where you personally have a visible impact on their daily requirements. The second you hit N+1, it is another leader below you in the chain who now has that impact. In summary: 1) you can’t do it alone, being an individual contributor (no matter how talented) is never going to be as impactful as a squad/team; 2) the structure you build is going to dictate the success or failure of the execution of your ideas; and 3) you have leadership limits of what you can control.

Q.  Finally, you do a lot of work and coaching with students and future cyber leaders. What advice do you specifically have for them?

A. You are the next generation; you are the ones who are gonna pick up the mantle. Don’t fear AI. Humankind over and over again has had tools that disrupt, but with critical thinking and lifelong learning, you’ll master anything that comes, and you’ll still be in charge of it. Our society is growing increasingly dependent on you.

Cybersecurity is not just this thing where we can debate what’s happening in Ukraine; it’s happening here with multiple nations and bad actors all over the world trying to ruin our lives daily. They don’t care that you don’t work for the military or at the NSA; you and American citizens are fair game. You are the front lines where they’re attacking our schools, our cities, our homes, our hospitals. So, whether you do it on behalf of the government or not, you are the future of our national security.

About The Author

Jennifer Leggio

See author's posts

Original post here

What do you feel about this?

  • Security Week

Post navigation

Previous: Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gateways
Next: China Admitted to US That It Conducted Volt Typhoon Attacks: Report

Author's Other Posts

RSA Conference Playbook: Smart Strategies from Seasoned Attendees RSA-Conference-2024.jpg

RSA Conference Playbook: Smart Strategies from Seasoned Attendees

March 14, 2025 0 0

Related Stories

Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Ionut Arghire April 15, 2025 0 0
ransomware.jpeg
  • Security Week

Kidney Dialysis Services Provider DaVita Hit by Ransomware

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

Ionut Arghire April 15, 2025 0 0
VC-Funding_China-tech.jpg
  • Security Week

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

Associated Press April 15, 2025 0 0
Satellite-Link-Cybersecurity.jpg
  • Security Week

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Kevin Townsend April 15, 2025 0 0

Trending Now

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools hacked.jpg 5
  • The Hacker News

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

December 2, 2025 0 0
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools npm-mal.jpg 6
  • The Hacker News

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

December 2, 2025 0 1
Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks iran-hacking.jpg 7
  • The Hacker News

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

December 2, 2025 0 0

You may have missed

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

Sean December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

Sean December 4, 2025 0 0
whatsapp-sim.jpg
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

[email protected] The Hacker News December 2, 2025 0 0
korean.jpg
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

[email protected] The Hacker News December 2, 2025 0 1
Copyright © 2026 All rights reserved. | MoreNews by AF themes.