664772091d722971c8cd4847 The 2024 Rsa Cybersecurity Conference

The 2024 RSA Cybersecurity Conference: What wasn’t addressed can hurt you

May 17, 2024
Was the real scope of control system cyber incidents properly addressed?

The RSA Cybersecurity Conference in San Francisco is billed as the largest cybersecurity conference in the world with something like 40,000 attendees. I have been attending the RSA Cybersecurity Conference since the early 2000’s and have spoken there a few times. RSA is a five-day conference with the IT cybersecurity rock stars presenting.

I only attended for two days. My observations are unscientific. Given that preamble, on the surface, things are getting better as most everyone I talked to had heard of OT, though most only knew the title, not what it really meant. Those that knew what OT stood for felt it was just about the OT networks. Very few people had heard of control system cybersecurity, and even some of the OT vendors were not aware of the lack of cybersecurity in the process sensors that are inputs to their network monitoring.

No one I talked to was aware of the real scope of the problem or was aware that have been millions of control system cyber incidents. This was evident in that the control system cybersecurity rock stars were not speaking. This year, critical infrastructure cybersecurity took a prominent position with the issuance of NSM 22. NSM22 states: “it is diverse and complex, and includes distributed networks, varied organizational structures, operating models, interdependent systems, and governance constructs.” There was no mention of hardware.

Yet the critical infrastructure is dependent on hardware – pumps, motors, valves, relays, transformers, turbines, robots, etc. As a result, there were no discussions of hardware control system cyber issues such as hardware backdoors in Chinese electric power transformers, port cranes, inverters and circuit breakers; possible control logic compromises with the Iranian Unitronics’ PLC attacks; Russian cyberattacks against U.S. critical infrastructures; the Aurora vulnerability which manipulates physics not data; data center shutdowns from process sensors and chiller motor issues; and medical device control system cyber incidents that have injured hundreds.

Maybe next year RSA will have more of a focus on critical infrastructure cybersecurity.

Sponsored Recommendations

IEC 62443 4-1 Cyber Certification – Why ML 3 is So Important

The IEC 62443 Security for Industrial Automation and Control Systems - Part 4-1: Secure Product Development Lifecycle Requirements help increase resilience for control systems...

Multi-Server SCADA Maintenance Made Easy

See how the intuitive VTScada Services Page ensures your multi-server SCADA application remains operational and resilient, even when performing regular server maintenance.

Your Industrial Historical Database Should be Designed for SCADA

VTScada's Chief Software Architect discusses how VTScada's purpose-built SCADA historian has created a paradigm shift in industry expectations for industrial redundancy and performance...

Linux and SCADA – What You May Not Have Considered

There’s a lot to keep in mind when considering the Linux® Operating System for critical SCADA systems. See how the Linux security model compares to Windows® and Mac OS®.