Process instrumentation and other field devices generally have minimal cybersecurity protection but can have VERY significant impacts. Security researchers have demonstrated the ability to compromise these devices on wired and wireless networks.
January 15, 2016, CyberWire published an interview with me on the implications of the Ukrainian power grid cyber attack and other current ICS cyber security issues - http://thecyberwire.com/interviews/interview_with-Joe-Weiss.html
The Journal of the Naval PostGraduate School Center for Homeland Defense and Security published an article assessing homeland security risks. The study does not adequately address control system cyber security.
Composition, pH and temperature loops that largely determine product quality have a hidden factor that affects the loop linearity and particularly the ability to perform well at low production rates. Here we detail the factor, the consequences and the solutions for continuous unit operations and fed-batch reactions.
Moody’s, S&P, and insurance companies are starting to consider cyber risk strongly implying the Board of Directors of industrial companies and ICS vendors can be expected to have to explicitly address ICS cyber security.
There is at least one control system vendor that has addressed cyber security as part of its initial design. I think it is important to acknowledge that it is possible to build a more secure control system from initial design that addresses known control system cyber vulnerabilities.
November 18 at 10am Pacific, Joe Weiss will be presenting a Bright Talk Webinar sponsored by Lockheed Martin – “ICS Cyber Incidents are Real but Not Being Identified” - https://www.brighttalk.com/search?q=ics.
The ISA Mentor Program, started by Greg McMillan and Hunter Vegas in 2011, is extending its invitation to prospective protégés/protégées and resources to include any engineer or technician currently employed in a plant or at an engineering center or supplier of services that is applying or maintaining process control systems.
Considering the vulnerabilities of our critical infrastructures as demonstrated by the red team exercise discussed at the 15th ICS Cyber Security Conference (an effectively NERC CIP-compliant utility being compromised within 30 minutes with no indication), the results of the ICS honeypots and other studies, the availability of ICS cyber exploits,...