I have prepared a three-part series for the Cyber Observatory with the first part describing the history of control system cyber security and differences between control systems and networking. Part 1 can be found at
https://cyberstartupobservatory.com/the-need-to-change-the-paradigm-of-control-system-cyber-security-part-1-background/ . The second part will provide actual control system cyber incidents to demonstrate control system cyber security is a real issue. It will also address the lack of control system cyber incident information sharing, control system cyber forensics, and the need for cyber security training for the engineers. The third part will address the hole in control system cyber security – the lack of cyber security, authentication, and cyber logging in Purdue Reference Model Level 0,1 devices (e.g., process sensors, actuators, drives, etc.).