Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Security Week
  • Rising Tides: Bryson Bort on Cyber Entrepreneurship and the Needed Focus on Critical Infrastructure
  • Security Week

Rising Tides: Bryson Bort on Cyber Entrepreneurship and the Needed Focus on Critical Infrastructure

Jennifer Leggio Published: April 11, 2025 | Updated: April 11, 2025 7 min read
1 views

Very few people in the cybersecurity industry do not know, or know of, Bryson Bort. Yes, he’s the CEO/Founder of SCYTHE, but he’s also the co-founder of ICS Village (the next one at RSA Conference from April 28 to May 1, 2025). This event, and all of our industry’s attention on critical infrastructure, is pivotal as it often comes down to a life-threatening situation if something were to go wrong. Read on for more about Bort, why he started SCYTHE, how that led him further down the ICS path, and be sure to check out ICS Village at RSAC.

Q. Tell me about SCYTHE, what it does, and why you started it–and why the industry needs the offerings it provides.

A. I started an offensive cybersecurity consultancy called GRIMM in 2013 after leaving the government. In 2016, Target came to us with a request to build a custom implant. I love the story of Target: their breach in 2013 created the modern cybersecurity ecosystem of organizational investment and market innovation we all enjoy now. Instead of it being a consulting project where we build a tool that trains their defense and we have to build another later, I proposed a platform that would allow you to scale any threat behavior that could ever exist on your terms—and SCYTHE was born. 

Bryson Bort
Bryson Bort

I realized I couldn’t do it alone and Ron Gula and Dmitri Alperovitch helped me raise and launch the company. The concept is simple: once a threat has breached you, they can only: 1) communicate with the protocols already in your environment to blend, 2) execute on computers you already have, 3) capabilities; only do so many things to accomplish their goals on those hosts. SCYTHE is an offensive box of Legos of communications and capabilities that allow you to no-code create anything a threat might do in your organization. This is key.

Cybersecurity is “hard” because it has to be yours. No one else can give the expert prescription at a distance for the right preventative and detective controls for you. Security is defined by the threat; it’s the only measurement that matters. Our platform allows companies to easily drive that understanding safely and easily across all teams with recommendations.

Q. SCYTHE is not your first endeavor as an entrepreneur. Please tell me about your entrepreneurial journey and what advice you might give to would-be entrepreneurs.

A. When I founded GRIMM, I learned that it’s not the idea you start with, but the agility to pivot. Which we first did by moving from specialized government work to commercial. When Target approached me in 2016 to help them build custom red team tooling, I realized it was a possible product and asked to keep the intellectual property while co-developing what became the SCYTHE platform with them for two years. Along the way, I realized I knew absolutely nothing about commercial software sales and development  which is why I reached out and expanded my network to learn. This led to Gula and Alperovitch helping me spin out SCYTHE from GRIMM. Then, I learned the hard lesson of Total Addressable Market (TAM). We were building a red team tool, there is no red team market; it’s a $3B market of in-house or outsourced experts with little budget beyond. So, we looked at how we could make it valuable outside of that scope and it’s why we were one of the leading initial proponents of purple teaming.

There are three key qualities to an entrepreneur (and being the smartest is not one of them!): risk tolerance, risk and reward of living or dying based on what you can do, and tolerance for pain. You are the chief executive officer (CEO) and the janitor for everything it takes to run this new endeavor.

Q. How did you first get interested in cybersecurity? Why is it such a passion for you?

Advertisement. Scroll to continue reading.

A. Ever since I was little, I had a penchant for technology. I was able to take things apart, put them back together (most of the time), and personally explore the increasing involvement of computers in our lives. I wanted to understand the ins and outs of MS-DOS; I programmed complex games on my graphing calculator for fun when we had to use them in high school; and I wanted to break the protections on games so I could modify them to make them more interesting. “Cybersecurity” when I worked in information security as a cadet at West Point pretty much consisted of running around with golden disks whenever a virus struck, or patches needed to be rolled out and it wasn’t much more complex when I was an Army Officer.

My passion for cybersecurity comes from a lifelong passion for service and protection. Cybersecurity isn’t an esoteric nerd thing: it is the regular people trying to live their lives and be able to manage money; it is local schools, hospitals, and towns trying to provide a good quality of life for their citizens.

Q. Tell me why the intense focus on industrial control systems (ICS) and why you co-founded ICS Village. It seems the focus on this has accelerated significantly in the last five years. Why?

A. Most people only know industrial control systems as “Stuxnet” and, even then, with a limited idea of what exactly that means. These are the computers that run critical infrastructure, manufacturing plants, and dialysis machines in hospitals. A bad day with normal computers means ransomware where a business can’t run, espionage where a company loses valuable data, or a regular person getting scammed out of their bank account. All pretty bad, but at least everyone is still breathing. With ICS, a bad day can mean loss of life or limb and that’s just at the point of use. The downstream effects of water or electricity being disrupted sends us to the Stone Ages immediately and there is a direct correlation to loss of life in those scenarios.

I co-founded the ICS Village, a non-profit 501c3 with a mission to educate and build awareness for critical infrastructure security, with Tom VanNorman in 2017 because we both believe something needs to change. And for years, no one really cared. Then, Oldsmar happened (ironically, nothing actually happened, but it still got the right attention) and we had been demonstrating that attack for years on our custom-built water plant (pictured above). Then, Colonial Pipeline was the real game changer. As I wrote in a USA Today op-ed with Dr. Paul Rosenzweig, you definitely get the attention in a hydrocarbon-based (gas) economy where disruption affects daily life.

Q.  Many career cyber folks can get myopic by only applying security solutions to the problems security practitioners face. Your approach is perceived as building a community that embraces security far beyond the industry. What makes this important?

A. Together we will succeed, individually we will continue to struggle and fail.

Q.  What is the best advice that you’ve ever been given?

A. The Law of N which is derivative of Dunbar’s Number, the limit of the number of people with which you can maintain good social relationships. The military is built on the organizational concept of squads, 4-10 soldiers, which allows the agility to respond to a rapidly changing environment with a cohesive team with the capability to drive those changes. Then, the unit scales up into platoons, companies, battalions, etc. As an officer, you learn how to manage at different echelons for a greater impact.

As an entrepreneur, it’s the same and the Law of N is the variable number of people that you can lead where you personally have a visible impact on their daily requirements. The second you hit N+1, it is another leader below you in the chain who now has that impact. In summary: 1) you can’t do it alone, being an individual contributor (no matter how talented) is never going to be as impactful as a squad/team; 2) the structure you build is going to dictate the success or failure of the execution of your ideas; and 3) you have leadership limits of what you can control.

Q.  Finally, you do a lot of work and coaching with students and future cyber leaders. What advice do you specifically have for them?

A. You are the next generation; you are the ones who are gonna pick up the mantle. Don’t fear AI. Humankind over and over again has had tools that disrupt, but with critical thinking and lifelong learning, you’ll master anything that comes, and you’ll still be in charge of it. Our society is growing increasingly dependent on you.

Cybersecurity is not just this thing where we can debate what’s happening in Ukraine; it’s happening here with multiple nations and bad actors all over the world trying to ruin our lives daily. They don’t care that you don’t work for the military or at the NSA; you and American citizens are fair game. You are the front lines where they’re attacking our schools, our cities, our homes, our hospitals. So, whether you do it on behalf of the government or not, you are the future of our national security.

About The Author

Jennifer Leggio

See author's posts

Original post here

What do you feel about this?

  • Security Week

Post navigation

Previous: Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gateways
Next: China Admitted to US That It Conducted Volt Typhoon Attacks: Report

Author's Other Posts

RSA Conference Playbook: Smart Strategies from Seasoned Attendees RSA-Conference-2024.jpg

RSA Conference Playbook: Smart Strategies from Seasoned Attendees

March 14, 2025 0 0

Related Stories

Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Ionut Arghire April 15, 2025 0 2
ransomware.jpeg
  • Security Week

Kidney Dialysis Services Provider DaVita Hit by Ransomware

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

Ionut Arghire April 15, 2025 0 2
VC-Funding_China-tech.jpg
  • Security Week

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

Associated Press April 15, 2025 0 0
Satellite-Link-Cybersecurity.jpg
  • Security Week

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Kevin Townsend April 15, 2025 0 1

Trending Now

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0
NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions nist-cve.jpg 5
  • The Hacker News

NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

April 17, 2026 0 1
Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts europol.jpg 6
  • The Hacker News

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

April 17, 2026 0 0
Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation apachemq.jpg 7
  • The Hacker News

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

April 17, 2026 0 0

You may have missed

grinex.jpg
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

[email protected] The Hacker News April 19, 2026 0 0
botnet-ddos.jpg
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

[email protected] The Hacker News April 19, 2026 0 0
defender.jpg
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

[email protected] The Hacker News April 19, 2026 0 0
google-ads-android.jpg
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

[email protected] The Hacker News April 19, 2026 0 0
Copyright © 2026 All rights reserved. | MoreNews by AF themes.