Shutterstock 505066699

Effective cybersecurity efforts in process operations

Nov. 28, 2022
Cybersecurity week 2022: The articles that follow highlight effective cybersecurity efforts in process operations

Cybersecurity is constantly evolving. While it's important to keep up with the latest potential threats, maintaining a cybersecurity routine as part of overall process operations is key to developing effective security. 

In the articles that follow, Jim Montague seeks the advice of experts in the field and shares some successful cybersecurity case studies from system integrators, vendors and end users. 

Everyday cybersecurity

Interstates' Alan Raveling explains that effective cybersecurity must be a routine part of process operations—even as new cyber-threats and defenses arrive daily. Read more.

Software saves mining labor

"The intention was always to aim for the next generation of endpoint security as part of our overall security strategy.” Orica's Sean Lasinker explains how the explosives company implemented CrowdStrike software to automate cyber threat detection. Read more.

Bake cybersecurity in a safety pan

Experts from SANS Institute put process operations cybersecurity in context and explain how to gain IT’s awareness about cybersecurity paths into ICSs. Read more.

Cope with change—protect PLCs

"The stakes are high as these attacks grow more sophisticated, so it’s not just about controlling your own internal processes anymore.” Huffman Engineering's Keith Mandachit outlines some key cybersecurity mitigation strategies. Read more.

Five controls for OT cybersecurity

Operations technology cybersecurity is finally getting more of the attention it deserves, but Dragos Inc. reports that executive buy-in and five control policies/procedures are needed for a successful cybersecurity program. Read more.

Armor up during upgrades

How ABB revamped San José-Santa Clara Regional Wastewater Facility’s legacy DCI controllers with its HPC 800 Symphony Plus controllers, installed ABB Ability Cyber Security software, and customized the plant’s cybersecurity to protect it from malware and other cyber-threats in just one week. Read more.

Shield with OT’s software-defined networking

“Software-defined networking (SDN) is going to change how OT networking and cybersecurity is done.” Dynics' Jeff Smith explains how SDN microsegments for simpler security. Read more.

Cyber-informed engineering protects proactively

The Idaho National Laboratory advocates using Cyber-Informed Engineering (CIE) to design cybersecurity into equipment, process applications and networks early in their lifecycles. CIE uses design skills, physics and think-like-an-adversary practices to engineer out security risks, and emphasizes the partnership needed for designers and engineers to work with cybersecurity professionals. Read more.

About the Author

Jim Montague | Executive Editor

Jim Montague is executive editor of Control. 

Sponsored Recommendations

2024 Industry Trends | Oil & Gas

We sit down with our Industry Marketing Manager, Mark Thomas to find out what is trending in Oil & Gas in 2024. Not only that, but we discuss how Endress+Hau...

Level Measurement in Water and Waste Water Lift Stations

Condensation, build up, obstructions and silt can cause difficulties in making reliable level measurements in lift station wet wells. New trends in low cost radar units solve ...

Temperature Transmitters | The Perfect Fit for Your Measuring Point

Our video introduces you to the three most important selection criteria to help you choose the right temperature transmitter for your application. We also ta...

2024 Industry Trends | Gas & LNG

We sit down with our Industry Marketing Manager, Cesar Martinez, to find out what is trending in Gas & LNG in 2024. Not only that, but we discuss how Endress...