The most recent Washington think tank to write a paper involving cyber security and the electric grid is the Center for the Study of the Presidency and Congress and the paper is “Understanding the threats to the most critical infrastructure while securing a changing grid”.
Real ICS cyber incidents including cyber attacks against critical infrastructure ICSs continue to occur. Yet, ICSs continue to be connected to the Internet. Moreover, the information is not being adequately shared. Additionally, vulnerabilities such as Aurora are not being adequately addressed yet the government has made the information public.
Automating any process can yield big improvements by eliminating human error and adding repeatability and predictability. The benefits are greatest when the best technology and practices are automated, the novice is protected against mistakes, and the specialist is enabled to capitalize on creativity and expertise.
Unisys sponsored a report by the Ponemon Institute: “Critical Infrastructure: Security Preparedness and Maturity”. It is being widely quoted even thought there was little Operational input and many of the questions were not relevant control systems. Consequently, the results need to be questioned as to their relevance.
Wireless installations in industrial settings have different challenges and requirements than those found in the typical office environment. A new application guide jointly developed by Rockwell Automation and Cisco is one document to help you better understand what some of those challenges are and how to overcome them.
I will be attending the Air Force Research Institute’s C-ACTS meeting on July 17th. The intent of the meeting is to identify and highlight strategic issues, foster research, collaboration, and develop educational programs that explore national security and military operations in cyber space.
For the first time, we are having a formal call for presentations for the 2014 ICS Cyber Security Conference - www.icscybersecurityconference.com. The call for presentations can be found at http://www.marketwatch.com/story/2014-ics-cyber-security-conference-call-for-papers-now-open-2014-07-10.
July 3, 2014 DHS made the INL Aurora information public despite the request being for the Google Aurora information. With the exception of two utilities, industry has still not responded to mitigate this problem. DHS claims they released the information because the information is old and industry has addressed the problem.
Gaining an understanding of the changes in the rapidly evolving industrial wireless sector will be valuable to not only manufacturers but also end users and engineering companies to help determine longer term planning. This annual survey from WINA is a valuable tool to assist in gathering this information.