Kal Mian: OT And IT Must Understand Each Other’s Domain
Performing a risk assessment is key to establishing a stronger OT security practice. Vulnerability identification and prioritization should be done based on the criticality of the site and its systems to the business. "In the industrial control world, some controls...
Michael Jacobs: OT Security Begins With People, Understanding The Environment, And Selecting The Right Controls
Begin an asset inventory with a physical walkthrough to trace cables and boxes. Then use the control network and network traffic to identify devices and configurations. Prioritize controls in a manner that address the right threats, is implementable within the...
Elewa Ali: Recommendations For Building A Comprehensive ICS Cybersecurity Program
Risk assessments enable leadership to make informed, high-level business decisions about cybersecurity initiatives. Restructuring the network and proactively updating aging hardware and software can help a plant better secure its control systems. "Standalone machines...
Gabriel Agboruche: Strategies For Securing Digital Assets In Nuclear Power Plants
People often don’t recognize there are risks when you open up your network to certain types of technologies or even vendors. Know what you have, all the current configurations of those devices, understand what those devices control, and understand how the data is...
Jacob Laas Glass: OT Security Begins With A Technical Standard Of Critical Security Elements
New tools detect OT devices and their configurations and providing greater visibility, but there still can be areas of uncertainty. When in doubt, assume a protection is not there. When something is added to the system, one way or another the standard of critical...
Jose Mendez: There Must Be Standard Operating Procedures For The OT Network
One way to document everything is to start with a vendor who can make a complete assessment and report on all your PLCs and controllers, and then move forward from there. OT network controls need to include proper onboarding of new systems, proper patching, proper...
Christophe Rey-herme: Security Awareness Is Key To ICS Cybersecurity
OT engineers need to see security as a threat to operational continuity in order to take it seriously. When plants connect to enterprise networks, OT engineers are often unaware of the risk, and IT people are often unaware of the connections, or they do not know how...
Brian Foster: In Critical Infrastructure, Safety Comes First
Securing 30 year-old-equipment which was not built with security in mind is a great challenge in the power generation and distribution industry. In the IT world, it’s common to prevent suspicious packets from reaching their destination. You can’t do that in critical...
Benoît Vittek: How data helps commentators tell a better sports story
The really big breakthrough has come in just the past couple of years with live rider data provided by Dimension Data, collected from GPS trackers, along with Twitter postings and analysis. Rather than simply describing a sprint, we can now provide a different...
Peter Gray: Using business process automation to operate at a new level
Automation allows us to have a virtualised infrastructure and systems managed remotely by experts as part of a managed service. That reduces the number of people on the ground while providing access to a broader range of expertise. Complex supply chains often use big,...