September 12th, I participated in a cyber security panel at the WaTech Water Technology Conference in Tel Aviv, Israel. One of the focuses of the conference was the “digitization” of water. September 13th, I gave a presentation at the DHS ICSJWG conference on the lack of cyber security and authentication...
We learned in control theory courses that too high a PID gain causes oscillations and can lead to instability. Operators do not like the large sudden changes in PID output from a high PID gain. Operators may see what they think is the wrong valve open in split range control...
Chapter 9 of Richard Clarke and R.P. Eddy’s book, Warning – Finding Cassandras to Stop Catastrophes, is defining the “Casandra Coefficient”. In reading the chapter, many of the issues that have prevented industry from adequately addressing ICS cyber security becomes evident.
There are various threat scenarios which confront our entire national critical infrastructures that involve insecure process sensors. These scenarios can lead to loss of safety and resilience and to be addressed.
The key to a much brighter future of our profession depends upon management providing the funding and support and millennials seeking to improve process performance by the use of the best automation and process control. There are some common approaches to these seemingly very different groups.
Dale Peterson had a twitter poll on DigitalBond.com asking what people think about the availability of security in sensors, actuators, instruments (Purdue Model Level 0 devices). The response was that most people agreed there was no security. So why isn’t there more of a drive to address this deficiency?
For ICS cyber security, Operations, cyber security, physical security, and risk management organizations need to coordinate and training is required for Operations to know when to work with IT Security following upset conditions.
ICS cyber threats are morphing from malware/insecure-by-design issues that can be found by network monitoring to compromise of system or component functionality which can be very difficult to detect, can cause significant physical damage and injuries, and probably cannot be found by network monitoring.
I will be giving a presentation at Defcon’s ICS Village Saturday July 29 at 2pm on cyber security of process sensing. As I have not attended Black Hat or Defcon before, I am looking forward to the experience.