Control Systems Cybersecurity Expert, Joseph M. Weiss, is an international authority on cybersecurity, control systems and system security. Weiss weighs in on cybersecurity, science and technology, security emerging threats and more.
In preparation for a new book, I was able to find information about an actual Aurora event. The event affected a non-utility facility (no generator involved) where it experienced multiple Aurora events over a multi-day span resulting in damage to motors.
According to “official” sources, the US electric grid has never been cyber attacked. However, that is not true. There have been several cases where nation-states and others (not identified) have cyber attacked the US electric grid.
The 2016 ICS Cyber Security Conference was held October 24-27, 2016 at Georgia Tech in Atlanta. The agenda can be found at www.icscybersecurityconference.com. Attendees represented multiple world-wide industries, defense, ICS vendors, cyber security vendors, cyber security researchers, consultants, and educators.
The demonstration of hacking the SEL751A not only showed how the system could be hacked and the operator “blinded” but also offered a solution. An SEL conference attendee, under the pretense of asking a question, told the audience the test was rigged to make the relay fail which was not...
The 2016 edition of SecurityWeek’s ICS Cyber Security Conference takes place on October 24-27 at the Georgia Tech Hotel & Conference Center in Atlanta, Georgia. This year’s keynote speaker is Admiral Michael S. Rogers, Director of the U.S. National Security Agency (NSA) and Commander of the U.S. Cyber Command.
All too often, people claim their systems are air-gapped, and therefore have no cyber vulnerability. But Alternating Current (AC) power cords cross the ostensible “air gap”, and power supplies for laptops, servers, ICSs, etc. have rarely been addressed for cyber security vulnerabilities.
There continues to be reticence from many to believe the grid can be cyber vulnerable or that equipment can be damaged from a cyber attack. There have been numerous major impacts from inappropriate relay settings. Consequently, we will be providing a demonstration at the 2016 ICS Cyber Security Conference (www.icscybersecurityconference.com)...