Control Systems Cybersecurity Expert, Joseph M. Weiss, is an international authority on cybersecurity, control systems and system security. Weiss weighs in on cybersecurity, science and technology, security emerging threats and more.
I have been invited to participate in “The Infrastructure Modernization Initiative - Homeland Security Implications and Challenges” conference at the Naval Post Graduate School in Monterey March 16-17. Perry Pederson and I are the only control system representatives. I hope to get our needs and desires into the discussions.
Many people believe control systems can be isolated from other networks and an “air-gap” maintained. Unfortunately, there is a disconnect between that assumption and reality. This conflict was very evident at Distributech, IEEE T&D Conference, ISA Expo, ads in automation and control system literature, and today’s Smart Grid Alliance webinar.
NERC is creating a group called Hydra that will be a network of electric industry subject matter experts (SME) to handle modern fast-moving threats to the bulk power system. There is an open invitation for two hundred SME’s.
I have been attending and participating in the Distributech Conference for many years and attended this year’s Conference in San Diego Wednesday and Thursday. I had an opportunity to “walk the floor” and had several observations I would like to share: - My very unofficial observation was that Distributech was...
The first question that comes up with any discussion of the Smart Grid is what is it? I know of no single definition. The one aspect I believe that applies to any definition of the Smart Grid is two-way communications with consequent cyber security considerations.
I organized the first two control system cyber security panels at ISA Expo 2001 in Houston on 9/10. At that time, control system cyber security was a reliability and economic issue and did not become a national security issue until the next day – 9/11.
I had some recent experiences with very knowledgeable people that demonstrate how little we really communicate with each other. Yesterday I had a discussion with an IT security vendor who has a security solution for endpoint devices.