Shutterstock
7 steps to cybersecurity
7 steps to cybersecurity
7 steps to cybersecurity
7 steps to cybersecurity
7 steps to cybersecurity

The 7 Steps to ICS and SCADA Security

Feb. 28, 2012
This 7-step process will help you implement a robust cybersecurity protocol.

The past two years have been a real wakeup call for the industrial automation industry. For the first time ever it has been the target of sophisticated cyber attacks like Stuxnet, Night Dragon and Duqu.

In addition, an unprecedented number of security vulnerabilities have been exposed in industrial control products and regulatory agencies are demanding compliance to complex and confusing regulations. Cyber security has quickly become a serious issue for professionals in the process and critical infrastructure industries.

If you are a process control engineer, an IT professional in a company with an automation division, or a business manager responsible for safety or security, you may be wondering how your organization can get moving on more robust cyber security practices.

In order to provide you with guidance in this area, Tofino Security and exida Consulting LLC have condensed material from numerous industry standards and best practice documents. They also combined experience in assessing the security of dozens of industrial control systems.

The result is an easy-to-follow 7-step process.