Stanford CISAC Seminar - ICS Cybersecurity and National Security

Sept. 12, 2012
I have been invited to give a presentation on control system cybersecurity at Stanford's Center for International Security and Cooperation (CISAC) as part of their CISAC seminar series on October 8 at Stanford (http://cisac.stanford.edu/research/2956/). The Science Seminars are a lunchtime series that features top scientists and other scholars from the CISAC and Stanford communities and beyond.

I have been invited to give a presentation on control system cybersecurity at Stanford's Center for International Security and Cooperation (CISAC) as part of their CISAC seminar series on October 8 at Stanford (http://cisac.stanford.edu/research/2956/). The Science Seminars are a lunchtime series that features top scientists and other scholars from the CISAC and Stanford communities and beyond. The Seminar series encourages in-depth discussions of the scientific dimensions of security issues from an audience of scientists, engineers and other researchers.

"Cybersecurity of Industrial Control Systems - What does it mean to National Security?"

Industrial Control Systems (ICSs) are used throughout the industrial infrastructure and military applications. These systems are designed to be highly reliable and safe, but were not designed to be cyber secure. Moreover, many of these systems do not even have cyber logging or forensics. Consequently, these systems, which constitute the "soft underbelly" of the American economy and defense, can enable a "cyber Pearl Harbor" to occur without having the capability of even knowing the impacts were cyber-induced. Stuxnet and Aurora have demonstrated that cyber can be used as a weapon to damage or destroy engineering equipment and systems.

To date, there have been more than 225 actual control system cyber incidents worldwide affecting electric power, water, chemicals, pipelines, manufacturing, mass transit, and even aircraft. Most of the incidents have been unintentional. Selected unintentional incidents will be addressed at the ICS Cybersecurity Conference (www.icscybersecurityconference.com). However, there have been a number of targeted cyber attacks. The Stanford presentation will focus on Stuxnet and Aurora. It will address the lack of air-gaps, insecureable legacy ICSs, lack of cyber forensics, and cultural issues between IT and Operations that can enable these attacks to occur and evade detection.

Joe Weiss

Sponsored Recommendations

Make Effortless HMI and PLC Modifications from Anywhere

The tiny EZminiWiFi is a godsend for the plant maintenance engineers who need to make a minor modification to the HMI program or, for that matter, the PLC program. It's very easy...

The Benefits of Using American-Made Automation Products

Discover the benefits of American-made automation products, including stable pricing, faster delivery, and innovative features tailored to real-world applications. With superior...

50 Years of Automation Innovation and What to Expect Next

Over the past 50 years, the automation technology landscape has changed dramatically, but many of the underlying industry needs remain unchanged. To learn more about what’s changed...

Manufacturing Marvels Highlights Why EZAutomation Is a Force to Be Reckoned With

Watch EZAutomation's recent feature on the popular FOX Network series "Manufacturing Marvels" and discover what makes them a force to be reckoned with in industrial automation...