Reader feedback: Three key issues correlating to cybersecurity problems outside ICS

April 13, 2015
A reader says there are three reasons why companies outside the ICS realm are more vulnerable to cybersecurity attacks.

In response to Joe Weiss's blog post (Observations from Advisen Cyber Risk Conference March 3rd in San Francisco): There are at least three key issues correlated to the symptoms of this problem:

  1. Lines of ownership and accountability are generally unclear when it comes to cyber vulnerabilities impacting the ICS infrastructure. The question really is: who is accountable for industrial infrastructure security, and do they have the authority and subject matter expertise to establish the necessary security controls for ICS? What is the governance model associated with the security model?
  2. The primary focus at the organizational level seems to be security for IT systems. The distinction between IT and OT is not well understood. Infrastructure owners have to recognize that compliance does not necessarily equal protection.
  3. Control system cybersecurity requires an interdisciplinary approach. Again, the question is: are businesses investing in their workforce to ensure knowledge sharing and skills enhancement between and across the multiple disciplines of security, IT, OT, cyber, process, etc?

Amit Kumar
[email protected]

Sponsored Recommendations

The tiny EZminiWiFi is a godsend for the plant maintenance engineers who need to make a minor modification to the HMI program or, for that matter, the PLC program. It's very easy...
Discover the benefits of American-made automation products, including stable pricing, faster delivery, and innovative features tailored to real-world applications. With superior...
Over the past 50 years, the automation technology landscape has changed dramatically, but many of the underlying industry needs remain unchanged. To learn more about what’s changed...
Watch EZAutomation's recent feature on the popular FOX Network series "Manufacturing Marvels" and discover what makes them a force to be reckoned with in industrial automation...