Much has transpired since I first got involved in ICS cyber security in 2000. At that time, cyber security was almost universally viewed as an IT problem. There has been a tremendous increase in awareness of the issue. When I held the first Control System Cyber Security Conference in 2002, the only other ICS cyber security discussions were at the
There has been significant improvement in securing the Windows-based Human-Machine
Interface - HMI. There are now many companies offering firewalls,
There has also been the establishment of a cottage industry in compliance monitoring and reporting to meet NERC CIP requirements.
However, work is still needed in securing the Programmable Logic Controllers (PLCs) and other
resource-constrained, deterministic field devices that could cause devastating
failures and loss-of-life. This includes both Internet Protocol (IP) and serial
communications. Many of the high impact cyber incidents to date including
Stuxnet and Aurora were control system issues that would not be addressed by existing
IT or even many of the ICS HMI solutions. There is also a need to
identify what an ICS cyber attack would look like (Stuxnet was obviously not
detected as it was in the wild for more than a year). As with the HMI, the
appropriate ICS technologies applied appropriately should help reduce cyber risk and improve safety and reliability. I will have several vendors presenting control system solutions that I believe address important security issues at the September
Joe Weiss