There Must Be Standard Operating Procedures for the OT Network

What are the top three pieces of advice you would give a CISO to make the plant OT/ICS environment more secure from cyber attacks?Jose Mendez is responsible for formulating and deploying a cybersecurity strategy around the industrial networks in the mining industry. According to Mendez, the mining industry is starting to pay closer attention to OT security, due in part to a kind of “creeping” OT/IT convergence... Read more

OT Security Begins with a Technical Standard of Your Critical Security Elements

What are the top three pieces of advice you would give a CISO to make the plant OT/ICS environment more secure from cyber attacks? Jacob Laas Glass is responsible for integrated operations and ICS security on six offshore oil platforms. As the ICS industry gives more consideration to cybersecurity, vendors must develop a more holistic view. Until then, he has adopted several practices that have greatly... Read more

Are You in Control of your Control Loops?

Control loops are the first line of defense for safety and process stability, and act as an engine for profitability. With hundreds or thousands of loops in operation in a single facility, it is complex to monitor, analyze, assess and diagnose potential issues. Over time, basic control loop performance can deteriorate significantly, leading to sub‐optimal operations and even unplanned shutdowns. Continuous monitoring of... Read more

Strategies for Securing Digital Assets in Nuclear Power Plants

What are the top three pieces of advice you would give a CISO to make the plant OT/ICS environment more secure from cyber attacks?Unlike some OT environments, nuclear power plants are heavily regulated. Nuclear Regulatory Commission (NRC) inspections, which include an evaluation of cybersecurity, typically occur every two years during scheduled outages for plant refueling. This is also when other plant maintenance occurs... Read more

VxWorks: Another Cybersecurity Wake-up Call for the Industrial Sector

The Triton/Trisis attack, made public in August of 2017, was a major wake-up call for the industrial sector to take cybersecurity risk to industrial operations even more seriously. What was initially thought to be an equipment failure on an emergency shut down (ESD) system, turned out to be a complex, well-engineered cyber attack. This attack was believed to have compromised two separate engineering systems, however... Read more

Displaying results 26-30 (of 76)
 |<  <  2 3 4 5 6 7 8 9 10 11  >  >|