All controlglobal.com Blogs
The 14th ICS Cyber Security Conference (www.icscybersecurityconference.com) will have 5 major themes: Actual ICS cyber incidents; ICS cyber security standards; ICS cyber security solutions; ICS cyber security demonstrations; and ICS policy issues. The Conference focuses on what has REALLY happened and what is being done that affects the CONTROL SYSTEMS.
August 12th, the Silicon Valley Leadership Group hosted the 2014 Silicon Valley Cyber Security Summit. The attendance was very high level with 2 US Senators, 2 US Representatives, senior leadership from McAfee, Symantec, RSA, etc. There was almost no ICS focus or discussions though there were discussions about the need for...
There is still a prevailing view that control system cyber security is not real and the cost of addressing it is not commensurate with the “benefits”. There have already been more than 350 actual control system cyber incidents.
All of us are conscious that international standards play an important role in the design and implementation of automation and control systems as these are the areas in which we are most closely aligned. However in addition to automation standards the IEC and ISO also develop a wide range of...
Los Alamos National Laboratory is helping the DOE develop advanced predictive computer models of nuclear reactor performance.
Software for auto tuning and adaptive control provide the opportunity to identify key loop dynamics besides providing a sound fundamental and automated basis for getting the best PID settings. Presented are uses of the knowledge gained and the setup of the automation system and testing/monitoring of PID performance to get...
The most recent Washington think tank to write a paper involving cyber security and the electric grid is the Center for the Study of the Presidency and Congress and the paper is “Understanding the threats to the most critical infrastructure while securing a changing grid”.
The Software Assurance Market Place aims to help software developers make their programs more secure by finding weaknesses such as Heartbleed-like vulnerabilities.
Real ICS cyber incidents including cyber attacks against critical infrastructure ICSs continue to occur. Yet, ICSs continue to be connected to the Internet. Moreover, the information is not being adequately shared. Additionally, vulnerabilities such as Aurora are not being adequately addressed yet the government has made the information public.
Automating any process can yield big improvements by eliminating human error and adding repeatability and predictability. The benefits are greatest when the best technology and practices are automated, the novice is protected against mistakes, and the specialist is enabled to capitalize on creativity and expertise.