All controlglobal.com Blogs
August 19th, I spent a day with the NERC Critical Infrastructure Protection (CIP) Version 5 Drafting team working on one of the NERC CIP Standards. The focus was on boundary protection, not on the actual control system devices and serial communications which were explicitly excluded.
The highest value added products use batch operations. Batches can take days to complete and be worth millions of dollars. In many cases bad batches cannot be fixed downstream. Bad batches must be avoided. There are many techniques for making batches more repeatable and faster by better monitoring and control.
The 14th ICS Cyber Security Conference (www.icscybersecurityconference.com) will have 5 major themes: Actual ICS cyber incidents; ICS cyber security standards; ICS cyber security solutions; ICS cyber security demonstrations; and ICS policy issues. The Conference focuses on what has REALLY happened and what is being done that affects the CONTROL SYSTEMS.
August 12th, the Silicon Valley Leadership Group hosted the 2014 Silicon Valley Cyber Security Summit. The attendance was very high level with 2 US Senators, 2 US Representatives, senior leadership from McAfee, Symantec, RSA, etc. There was almost no ICS focus or discussions though there were discussions about the need for...
There is still a prevailing view that control system cyber security is not real and the cost of addressing it is not commensurate with the “benefits”. There have already been more than 350 actual control system cyber incidents.
All of us are conscious that international standards play an important role in the design and implementation of automation and control systems as these are the areas in which we are most closely aligned. However in addition to automation standards the IEC and ISO also develop a wide range of...
Los Alamos National Laboratory is helping the DOE develop advanced predictive computer models of nuclear reactor performance.
Software for auto tuning and adaptive control provide the opportunity to identify key loop dynamics besides providing a sound fundamental and automated basis for getting the best PID settings. Presented are uses of the knowledge gained and the setup of the automation system and testing/monitoring of PID performance to get...
The most recent Washington think tank to write a paper involving cyber security and the electric grid is the Center for the Study of the Presidency and Congress and the paper is “Understanding the threats to the most critical infrastructure while securing a changing grid”.
The Software Assurance Market Place aims to help software developers make their programs more secure by finding weaknesses such as Heartbleed-like vulnerabilities.