Craig Morris: Risk Management Requires Effective Collaboration
You need to have a holistic picture of how everything in the OT environment works to truly understand the full range of vulnerabilities that may exist. An engineer will always be able to provide a logical explanation as to why an asset was configured in a particular...
Omar Sherin: Don’t Measure OT Cybersecurity Risk In Terms Of Financial Impact
Plant segmentation, in which different teams are responsible for different areas, makes cataloging assets possible, especially in very large infrastructures. One way to get plant operators and equipment vendors to focus on cybersecurity is to make it a question of...
Agustin Valencia: OT Security Requires A Holistic View Of Plant Risk
Classify assets according to risk, so you know what you need to protect and can prioritize vulnerability management strategies and ICS maintenance. OT cybersecurity is not just an IT problem. Everyone in the plant needs to understand their roles and responsibilities...
Spencer Wilcox: For Better OT Security, Control And Monitor Your Environment
It’s important not just to have a comprehensive understanding of the types of communication transpiring on your ICS network but detailed monitoring in place as well. Establishing a baseline for what normal behavior looks like will allow you to identify anomalous...
Ayo Folorunso Agunbiade: For Better ICS Security, Reduce Your Attack Surface
Application whitelisting and proper configuration and patch management reduces the attack surface and helps keep control systems more secure. Analyze potential attack vectors to reduce your environment’s overall attack surface and make it much more challenging for...
Robin Familara: Identity Access, Asset Inventory, And Incident Response Are Key
Identity access, asset inventory, and procedures for responding to and recovering from an attack are keys to a strong ICS cybersecurity program. Good communication between remote network engineers, on-site engineers and system owners makes it easier to update the...
Scott Saunders: Understanding Your Systems Is Key To ICS Security
Security professionals must first acquire a clear understanding of what they have and what it does before designing security controls to match. It’s important for plants to preserve institutional knowledge of the OT environment proactively before experienced...
James Shank: Robust ICS Security Requires A Multi-Layered Approach
To defend your ICS environment against an attack, analyze and assess network communications touching the outside world—particularly inbound transmissions. A single layer of defense can easily be defeated, but a multilayered system is much harder to compromise without...
Luiz Cancado: OT Cybersecurity Requires Total Business Buy-In
Understanding OT and IT environments not only means knowing what is in them, but also understanding how they operate together, and how they are different. The challenge in integrating IT and OT is not starting the process—because it’s already happening—but in doing it...
Everardo Trujillo: Security Professionals Need To Win The Trust Of OT Engineers
To be successful, the first thing security people need to do is sit down with OT engineers and learn from them. Gaining that trust is essential. Tools that provide visibility into the OT network help security gain a clearer idea of what they must protect, but they...