There Must Be Standard Operating Procedures for the OT Network

What are the top three pieces of advice you would give a CISO to make the plant OT/ICS environment more secure from cyber attacks?Jose Mendez is responsible for formulating and deploying a cybersecurity strategy around the industrial networks in the mining industry. According to Mendez, the mining industry is starting to pay closer attention to OT security, due in part to a kind of “creeping” OT/IT convergence... Read more

OT Security Begins with a Technical Standard of Your Critical Security Elements

What are the top three pieces of advice you would give a CISO to make the plant OT/ICS environment more secure from cyber attacks? Jacob Laas Glass is responsible for integrated operations and ICS security on six offshore oil platforms. As the ICS industry gives more consideration to cybersecurity, vendors must develop a more holistic view. Until then, he has adopted several practices that have greatly... Read more

Strategies for Securing Digital Assets in Nuclear Power Plants

What are the top three pieces of advice you would give a CISO to make the plant OT/ICS environment more secure from cyber attacks?Unlike some OT environments, nuclear power plants are heavily regulated. Nuclear Regulatory Commission (NRC) inspections, which include an evaluation of cybersecurity, typically occur every two years during scheduled outages for plant refueling. This is also when other plant maintenance occurs... Read more

Reducing Risk in a Converging IT/OT World

Industrie 4.0 and the rapid expansion of the Internet of Things (IoT) require increased access to the Operational Technology (OT) that propels production. Twenty to thirty years ago, assets were proprietary, different for every vendor, and offered limited connectivity to third party systems. Over time, owner-operators demanded more openness and access to these proprietary systems. As a result, vendors are using more... Read more

ICS Cybersecurity Cognitive Dissonance

ICS Cybersecurity's Cognitive Dissonance

In the recently released survey from SANS, Securing Industrial Control Systems—2017, there were two results that stood out more than most. The first came from a question assessing which control systems had the greatest impact if compromised and exploited; the second related to which systems had the strongest data collection and analysis. In the case of impact, survey respondents ranked computer assets with... Read more

Displaying results 1-5 (of 28)
 |<  < 1 2 3 4 5 6  >  >|