ICS Cybersecurity Cognitive Dissonance

ICS Cybersecurity's Cognitive Dissonance

In the recently released survey from SANS, Securing Industrial Control Systems—2017, there were two results that stood out more than most. The first came from a question assessing which control systems had the greatest impact if compromised and exploited; the second related to which systems had the strongest data collection and analysis. In the case of impact, survey respondents ranked computer assets with... Read more

WannaCry: A Serious Threat and Patching Challenge for Critical Infrastructure

It happened. The ransomware known as WannaCry was confirmed this week as having made it into industrial process facilities. This should put all companies who rely upon industrial control systems (ICS) – particularly companies classified as critical infrastructure – on high alert. Why? Because the choices available to protect the systems within an industrial facility’s network are much more... Read more

Avoid the ICS Cybersecurity Blind Spot

The Verizon Data Breach Investigations Report (DBIR) is as interesting for the unexamined risks as it is for the examined ones. If you look at the cyber assets on which the report gathered security data (page 10), there is not a single industrial control system (ICS) category listed. Why is this important? Because ICS are the systems that have direct responsibility for running volatile chemical and oil... Read more

ICS Cybersecurity and the Winds of Change

I had the pleasure of attending the RSA conference in San Francisco last week along with the PAS Founder and CEO Eddie Habibi. One of the largest cybersecurity conferences on the planet, this year’s event attracted more than 45,000 attendees. What stood out this year? For the first time, the keynote focused on the potential consequences of an attack on critical Infrastructure (power, water, fuel) in a multimedia... Read more

Too Many Changes, Too Much Noise

Most industrial companies with whom I speak are aware of the amount of control system changes that occur on a daily basis, but lack the proper automation to monitor and manage those changes. This means that significant changes can go uninvestigated, which means unplanned outage, safety, and other risk increases.  Major regulations and standards, including NERC-CIP, IEC 62443, NEI 08-09, and NIST 800-53, to name a few,... Read more

Displaying results 1-5 (of 24)
 |<  < 1 2 3 4 5  >  >|