1660318572725 12daysofcybersecurity

12 days of cybersecurity: A mini-series

Dec. 12, 2019

With the Industrial Internet of Things (IIoT) and digitalization dominating headlines, it's hard to ignore the impact that new, connected technologies are having on industry. But just like any other good thing, the bad side has made itself known, too. More than ever, we're seeing the effects of malware and coordinated cyberattacks, which have left manufacturers paying the price for insufficient protection of their systems.  

In the collection of content that follows, executive editor Jim Montague explores the increasing importance of cybersecurity, proven methods and how you can do your part to protect your facility. 

Day 1: How Pfizer does cybersecurity

 "If you don't have some cybersecurity protections in place, by the time you've figured out you have a problem, it will be too late, and you'll be toast." Jim LaBonty, director of global technology and engineering at Pfizer, about why Pfizer needed to better secure its supply chain, and how it did it. Read more.

Day 2: Grantek takes cybersecurity steps

Jacob Chapman, director, Industrial IT and Cybersecurity at Grantek, explains how the CSIA-certified system integrator (SI) and business consultant follows CIS Critical Security Controls for Effective Cyber Defense, with examples of successful implementations, as well as the results of ignoring this critical protection. Read more.

Day 3: aeSolutions gets physical with cybersecurity

 "People who previously believed their last-line-of-defense safety systems were untouchable have now realized they're just as vulnerable." John Cusimano, vice president of industrial cybersecurity, aeSolutions, on how it follows operations technology (OT) requirements and shares some advice for protecting safety systems from cyber attacks and malware. Read more.

Day 4: Seven cybersecurity commandments

Though every user, application and organization should be well-aware of their primary cybersecurity tasks, they always bear repeating to get them fully instilled into an effective cybersecurity routine. Read more.

Day 5: Weiss calls for ground-up cybersecurity

"Process sensors have been hacked. Consequently, it's crucial to understand how these and other Level 0 components must secure their own ecosystems for any control system cybersecurity program to be effective." Control's Unfettered blogger pushes for awareness and response beginning on the plant-floor and in the field. Read more.

Day 6: Extra helping of cybersecurity resources

Control's monthly guide to web-based tutorials, videos, guidelines, whitepapers and other educational materials. This month focuses on cybersecurity resources. Read more.

 Day 7: Cogenerator cuts patch time

As the largest natural gas-fired, combined-cycle, electricity and steam generating plant in the U.S., Midland Cogeneration Venture (MCV) in Midland, Mich., has always taken cybersecurity seriously. Here's how the plant uses Emerson patch management module to comply with NERC CIP rules. Read more.

Day 8: System integrator takes cybersecurity page from IT

"We can speak both IT and control languages, so we can help IT be comfy with the solution we provide, and understand the needs of OT and production." Process Data Automation reports information technology methods can enable plant-floor security programs. Read more.

Day 9: IT-OT convergence chips in

"In the past year or so, more manufacturers are formalizing their cybersecurity programs to include converged IT and OT, and are frequently assigning responsibility for all cybersecurity to their chief information security officer (CISO)." Rockwell Automation reports IT/OT collaboration cures many cybersecurity ills. Read more. 

Day 10: Baked-in cybersecurity toolbox

As more users wake up and demand cybersecurity in their software, devices and services, more suppliers are seeking to design, instill and build it in from the beginning. Here are some of their solutions and services. Read more.

Day 11: Top off cybersecurity tank

While it's always useful to read the latest coverage about a topic like cybersecurity, no single article can be more than a snapshot about what's happening right now. Looking back over previous coverage and articles can show how its players, priorities and capabilities have evolved over time. Here are some of Control's recent cybersecurity articles. Read more.

Day 12: Closing the cybersecurity loop

Despite the worry and stress that it can generate in many control engineers, operators and technicians, cybersecurity turns out to be just another process that needs to be stabilized and optimized. Read more.

About the author: Jim Montague
About the Author

Jim Montague | Executive Editor

Jim Montague is executive editor of Control. 

Sponsored Recommendations

Measurement instrumentation for improving hydrogen storage and transport

Hydrogen provides a decarbonization opportunity. Learn more about maximizing the potential of hydrogen.

Get Hands-On Training in Emerson's Interactive Plant Environment

Enhance the training experience and increase retention by training hands-on in Emerson's Interactive Plant Environment. Build skills here so you have them where and when it matters...

Learn About: Micro Motion™ 4700 Config I/O Coriolis Transmitter

An Advanced Transmitter that Expands Connectivity

Learn about: Micro Motion G-Series Coriolis Flow and Density Meters

The Micro Motion G-Series is designed to help you access the benefits of Coriolis technology even when available space is limited.