Voices: Montague

Challenges of Covering Cybersecurity News Beat

Executive Editor Jim Montague Wonders About the Stillborn Security Stories That Got Away

By Jim Montague

I remember some stories that got away, but I'll never forget those that were researched and written, but couldn't run. For instance, the most difficult topic we cover is cybersecurity. It can take months of inquiries and phone calls to secure a few good examples of how end users protect their process controls and networks. Understandably, almost nobody wants to discuss security for fear it will make them a target for some hacker, intrusion or cyber attack. This makes the few engineers and organizations willing to talk about security especially brave and precious to others in their profession.

A few years ago, I was lucky enough to secure an interview with two guys who were the cybersecurity experts at one of the world's largest oil and gas companies. Their firm was acknowledged to be a shining example of security best practices. They described in basic terms how cybersecurity is very similar to process safety, so the same risk assessment methods used to evaluate frequency and severity of potential safety incidents can also be used to gauge cybersecurity risks and help form a response. I think they also described how process control networks need to be segmented and divided by managed Ethernet switches serving as firewalls. Nothing groundbreaking, but I knew this advice would mean a lot to our readers because it came from such a big end user.

I was pleased, too, until the oil and gas firm's public relations person refused to approve or correct the story's text and referred me to a third security expert, who has repeatedly refused to be quoted. I eventually found other, less cowardly, end users who did agree to stand up and be counted. I completed my story, and have come up with several good cybersecurity articles since then. However, it's always bugged me that I couldn't get that oil and gas company on the record.

So why am I reminding you of stillborn security stories? Well, I was at the Honeywell User Group 2014 on June 3-5 in San Antonio, Texas, and I covered another cybersecurity presentation. It was well attended, but the audience was grim and seemed to be pretty depressed. I've experienced more than a few cybersecurity lectures, and the audience usually has a higher-than-average ratio of attendees with serious expressions and folded arms—as if they were subconsciously trying to protect themselves.

 And I slowly realized that the original oil and gas firm's uncommunicative, third security expert was in the audience, too. He and a colleague were apparently willing to attend, but all they contributed were a few smug questions and I-told-you-so remarks from the sidelines. I asked for a comment once more, but he was again unwilling to be quoted in any way.

I politely responded that I thought they were as bad or worse than hackers and cyber terrorists because they offer no help to other professionals in their own field, who desperately need some advice and encouragement, and don't have the resources of a huge firm to research and implement the best cybersecurity methods. They said it was just business, but I think refusing to try to lessen suffering and despair is the same as causing it in the first place.

When Scrooge says Marley was a good man of business in A Chrstmas Carol, the ghost laments, “Mankind was my business. The common welfare was my business. Charity, mercy, forbearance and benevolence were all my business. The dealings of my trade were but a drop of water in the comprehensive ocean of my business!”

Some folks never learn this, and it's just another sad, missed opportunity for everyone involved. However, as with any bad or unwilling source, I just have to get on to the next one and hope they're more willing and helpful. Likewise, if you don't get help on cybersecurity, just keep asking. I always find someone useful eventually, and you will too. Oh, and if you find a good solution, please have some guts and let others benefit from it.

More from this voice

Title

Worry Wart

A Flood Around Your Ankles Is a Lot Different Than One Around Your Neck. So Pick Up Your Canoe and Get Moving

04/01/2008

Workingman's Wireless

More Routine Process Control Applications Are Adopting Wireless to Save Cable, Secure Added Signals, and Transfer Data from Spots Where Wire Can't Go. Here's How Veteran Users Do It Every Day

08/07/2013

Wireless Mind

It's Easy to Say That a Lightbulb Must Go On Over Someone's Head, but It Can Be Very Hard to Make It Happen

09/03/2009

Wireless Has Opened Up a World of New Process Control Capabilities

Wireless Delivers Signals That Can’t Be Secured Any Other Way

05/06/2014

Wireless Applications Coming to Light

Wireless case studies are scarce, so it’s ironic that Emerson, Honeywell, Invensys and others are coming up with them.

09/27/2007

Winds of Change Complicate Automation Lifecycle

Forecast Tumultuous, but "the Cloud" May Actually Help

10/29/2012

Whalers and Wayfinders

There Are Many Parallels Between Whalers and Wayfinders and Profound Lessons One Can Teach the Other

10/14/2010

Watch Your Mouth

Did We Truly Need to Replace Programmable Logic Controllers with Programmable Automation Controllers? Why Not Just Call Them Computers and Leave It at That?

02/04/2008

VPN System Harnesses Cow Power

Remote Access Lets OEM Monitor, Control and Troubleshoot Solid-Waste Digester Systems on Small Farms

01/12/2014

Voices of Experience

Some Users Ask Us for Transmitters with 0.10% Accuracy, and Then Buy a Sensor That’s Off by Up to 10 °F at Different Temperature Levels

01/12/2009

Virtualized Computing Aids Process Visualization

There's More than One Way to Display Graphics on a Remote Screen, and Not All Are Created Equal

04/25/2012

Virtualization Streamlines System Lifecycle

Consolidation, Decoupling of Software Applications from Physical Hardware Saves Time and Effort

09/11/2013

Valero's Good Examples

Automation in the Refinery of Today It's Not Business as Usual

11/12/2012

Valero Streamlines Wireless Gains with Experience

Practice Makes Perfect--and Wireless Process Monitoring Is No Exception

06/19/2013

User Groups Useful Way Beyond Scheduled Events

Here At Control We Report Live While The Conferences Happen, but You can Find Information about the Event and Beyond Even After the Conferences Are Long Gone

01/09/2013

Use your own head

Executive Editor Jim Montague implores us to think and act like a reporter, don’t trust opinions (including mine and yours), remember to take all stories with a grain of salt, and of course, don't despair.

03/21/2006

Two Days in Austin

I’ve Never Attended a Tradeshow Where at Least a Dozen Parents Brought Their Kindergarteners to Try Out the Equipment

09/09/2008

True Commitment Meets Changing World's Challenges

How Do You Cope with Increasing Process Accidents, Accelerating Cyber Attacks, Ever More Remote Resources, Aging Workforces and Recovering but Delicate Economies?

06/17/2013

Three End Users = Three Shades of Green

Here's How ABB Helped Three Diverse End Users to Get Greener

06/06/2012

The Process Automation Assisted by Audio

Our Articles Get Accompanying Audio and Video Recordings. Check Them Out

04/30/2013