With cyber incidents and reported vulnerabilities on the rise, industrial cybersecurity leaders must deploy proactive industrial endpoint detection and response (EDR) across the entire process control network – including the proprietary industrial control systems and smart field instruments.
This paper will examine how EDR should extend to proprietary endpoints, what security controls have the greatest effect on reducing risk for these cyber assets, and what best practices apply.09/11/2017
Eastman Chemicals, one of the world’s largest chemical companies, recently decided to strengthen their information security and reliability, as well as develop a path forward to lower software maintenance costs. This Case Study shows how Eastman achieved their goals by globally standardizing on Bentley's ProjectWise software in order to replace an aging, but critical, in-house records management system. The ProjectWise solution has enabled Eastman to significantly reduce their IT costs, and is helping them achieve greater security of their vital plant information while providing a modern data-centric environment to move beyond engineering records into asset performance improvement.04/14/2015
In the decade before Stuxnet attacked process control systems in Iran, there were just five known supervisory control and data acquisition (SCADA) vulnerabilities for all control systems in the world, according to the U.S. Department of Homeland Security's Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). In 2011, the year after Stuxnet, that vulnerability count jumped to more than 215. Last year, it reached 248. No surprise then that Chemical makers are increasingly focusing on protecting their process control systems from intrusion both from the inside and outside. In this Chemical Processing Special Report: Protect Process Control Systems, we take a look at:
- How to better protect your control system - "Defense in depth" is crucial, and new and maturing technologies may help
- Cyber Security Challenges - learn about countermeasures to protect control systems
- Case Study: A vulnerability assessment reveals critical gaps in the security of a natural gas pipeline
- How to mitigate security risks in legacy process control systems - several steps can help protect against threats and extend the life of legacy equipment
Learn how to secure your process control systems - and your plant. Download your copy of this Chemical Processing Special Report: Protect Process Control Systems now.10/29/2014
As companies and industries increasingly rely on technology, security risks become greater. With growing numbers of Windows machines and increased scarcity of skilled technical resources, a “perfect storm” of cyber threats in production facilities is looming.09/21/2012
As the security threat landscape continues to evolve, so must your response. With increasing numbers of attempted intrusions, cautionary tales of security breaches and the potential for resulting damages at your site, application whitelisting can be an important addition to your security arsenal.09/21/2012
The past two years have been a real wakeup call for the industrial automation industry. For the first time ever it has been the target of sophisticated cyber attacks like Stuxnet, Night Dragon and Duqu.
In addition, an unprecedented number of security vulnerabilities have been exposed in industrial control products and regulatory agencies are demanding compliance to complex and confusing regulations. Cyber security has quickly become a serious issue for professionals in the process and critical infrastructure industries.
If you are a process control engineer, an IT professional in a company with an automation division, or a business manager responsible for safety or security, you may be wondering how your organization can get moving on more robust cyber security practices.
In order to provide you with guidance in this area, Tofino Security and exida Consulting LLC have condensed material from numerous industry standards and best practice documents. They also combined experience in assessing the security of dozens of industrial control systems.
The result is an easy-to-follow 7-step process.02/28/2012
The technology advances in control systems and open systems have afforded us improved efficiency, productivity and the ability to advance our operations. However, these improved technology advances have also come with risks that threaten these efficiencies. Viruses; an increased dependency on uptime, availability and reliability; operator errors and increased regulations are just some of the threats today's manufacturers need to contend with when managing their operations. In this Putman Media Special Report, we take a look at the cyber security issues today's manufacturers need to contend with; identify control systems vulnerabilities and offer a three-step approach for building better cyber security at your operations.02/09/2012
The power industry is susceptible to a variety of cyber threats, which can wreak havoc on control systems. Management, engineering and IT must commit to a comprehensive approach that encompasses threat prevention, detection and elimination.03/27/2006
1-8 of 8 < | | | >
1-8 of 8 < | | | >