Traditional industrial control systems (ICS) tend to be “insecure by legacy / design” which presents great challenges to secure. To add insult to injury, it is also proprietary, highly bespoke, and often managed by third-party vendors. As practitioners of cybersecurity, “one of everything” resonates.
IT focuses on CIA (confidentiality, integrity, and availability) which is counterintuitive in ICS...
Read more