Voices: Security Focus

Cyber Warfare and the Control Systems Community

What Must the Control Systems Community Do to Adapt to the Threat of Cyber Warfare?

Robert Lee By Robert M. Lee[mailto:robertmichael.lee@gmail.com], Cyberspace Officer, USAF

Read more

More from this voice


Protecting ICSs from Electronic Threats, II

ICS Security Is a Lifecycle Process that Begins With Conceptual Design of a System and Continues Through to Its Retirement


Protecting ICSs from Electronic Threats, Part 1

It Takes a Team of Experts in IT Security, Telecom, Networking, ICS and More to Understand Cyber Security


Do Firms Expect Too Much Cyber Threat Data?

A Key Expectation from Industry Is for Actionable Cyber-Threat Information from the Federal Government


Wolves at the Security House Door(s), Part 2

If the Single Firewall is not Secure Enough for Control Systems, What Security Model Is?


Edge protection a first layer of defense-in-depth security

Control system security expert Eric Byres presents defense-in-depth strategies for process control systems to some 150 attendees at the Honeywell Users' Group Americas 2007 Symposium in Phoenix.


How Shell E&P assesses and addresses control system security risks

Dan McDougall of Shell Exploration and Production speaks about the company’s drive to ensure security of its global assets at the Honeywell User Group Americas 2007 Symposium in Phoenix.


Invensys appointment signals shift of emphasis to services

Here are excerpts from the February 2007 issue of Andrew Bond’s Industrial Automation Insider, a monthly newsletter covering the important industrial automation news and issues as seen from the U.K.


SCADA system makers pushed toward security

Idaho National Laboratory and the New York State Office of Cyber Security and Critical Infrastructure have teamed up with utilities and makers of distributed control system software to offer advice on how to make system security a major part of the critical infrastructure.


Practical methods for protecting industrial networks

The Fall Issue of Industrial Networking magazine features a cover story that discusses ways process control engineers can protect against potentially destructive attacks on vulnerable networks.


Raising the bar for control system security

Security researchers at Wurldtech Analytics are partnering with ISA to establish procedures and an operations model for the security testing and certification of products used for control.


Are your security practices up to IT standards?

Joe Weiss and Jay Abshier, world class security consultants for process automation, write about the battle between the world of IT and Plant Operations. So, who’s right in the fight for control system security?


Safety is no accident

Plant safety and security has never been more important given the current political climate. Here are some web resources for a coordinated, plant-wide response to madness and mayhem.


What you should know about plant security

By being aware of the red flags, process plant personnel can enhance the potential for preventing security breaches in their industrial control systems.


A word about cyber security

A determined hacker can wreak havoc with your plant or steal your secrets without blinking an eye. But don't leave it to the folks in the IT Department to protect your control systems. Read why.


Who's working at your plant?

The backgrounds of intruders may be a mystery, but the backgrounds of people regularly on your site shouldn't be. How carefully does your company check the references of people at your plant?


A disaster safety checklist

There is no one-size-fits-all solution for business resumption following a negative event. However, ASSE offers this safety and security checklist to assist you before, during and after a disaster.


Security: A Practical Approach to Plant Protection

Just thinking about the possible threats out there today can give you sleepless nights. Here’s a calm look at principles, approaches and practical tools you can use to increase security at your facility.


SecureSystems Insider: Top Five White Paper downloads

SecureSystems Insider probes the latest system advances designed to safely control and securely your critical SCADA control systems. The following are the Top Five White Paper downloads from the SSI monthly E-newsletters.


SecureSystems Insider: Archived issues

SecureSystems Insider probes the latest system advances designed to safely control and secure your critical SCADA control systems.


10 principles for securing control systems

KEMA Consultant Jay Abshier takes an unbiased and highly detailed look at where plant security really is, and what is being done to better protect our process automation systems and infrastructure.