At last year’s Cyber Security for ICS Europe conference, one of the liveliest topics of discussion considered the widespread segregation of IT (information technology) and OT (operational technology) departments, and the prospects for convergence.
As the list of questions surrounding this issue grows, many experts involved in ICS are doing what they can to guide others towards convergence before the risks become overwhelming. This article offers a few of those perspectives ahead of the 2016 event.
In February 2017, two researchers at the Georgia Institute of Technology simulated a cyber attack on a water treatment plant. Using ransomware, the academics managed to access programmable logic controllers (PLCs) to shut off valves, increase the chlorine content of water and show false information on computer displays.
The ICS world is riddled with weaknesses that are ready to be exploited by switched-on wrongdoers for currency and chaos. In this analysis we look at five of the most dangerous roots of ICS breach and how to best prevent them.
The number of cyber attacks is on the rise and Industrial Control Systems must be secured, in order for global organisations to avoid suffering real, physical damage.
Ahead of the ICS Cyber Security conference, more than 350 experts from all around the world have answered our recent survey and shared their views on the nature of the cyber threat, implementing solutions and in what time frame and their thoughts on the through-life support offered by the industry.
Cyber security solutions are already in place in various sectors to secure ICS from attacks, but assaults keep happening. This poses now the challenge to assess whether these solutions are enough to protect both digital and physical assets.
Ahead of the ICS Cyber Security conference, we recently surveyed more than 350 experts on their views on the maturity of their cyber security and balanced their answers with an expert insight from Professor Chris Hankin, co-Director of the Institute for Security Science and Technology at the Imperial College London and speaker at the conference.
Cyber security solutions are in place for industrial control systems, and yet the gap between OT and IT is not addressed, leaving a risk for organisations' cyber security. The challenge now is to mitigate it, by improving the communication between these two departments and assess who is liable for the cyber security.
Ahead of ICS Cyber Security 2018, we had the opportunity to discuss with Andy Oliver, current Project Manager for OT Cyber Security at a major pharma company and speaker at the event, on the need for a OT/IT convergence and what strategy organisations need to implement to ensure the digital safety of their organisation.