Shutterstock 505066699 6384f7c929dfc

Effective cybersecurity efforts in process operations

Nov. 28, 2022
Cybersecurity week 2022: The articles that follow highlight effective cybersecurity efforts in process operations

Cybersecurity is constantly evolving. While it's important to keep up with the latest potential threats, maintaining a cybersecurity routine as part of overall process operations is key to developing effective security. 

In the articles that follow, Jim Montague seeks the advice of experts in the field and shares some successful cybersecurity case studies from system integrators, vendors and end users. 

Everyday cybersecurity

Interstates' Alan Raveling explains that effective cybersecurity must be a routine part of process operations—even as new cyber-threats and defenses arrive daily. Read more.

Software saves mining labor

"The intention was always to aim for the next generation of endpoint security as part of our overall security strategy.” Orica's Sean Lasinker explains how the explosives company implemented CrowdStrike software to automate cyber threat detection. Read more.

Bake cybersecurity in a safety pan

Experts from SANS Institute put process operations cybersecurity in context and explain how to gain IT’s awareness about cybersecurity paths into ICSs. Read more.

Cope with change—protect PLCs

"The stakes are high as these attacks grow more sophisticated, so it’s not just about controlling your own internal processes anymore.” Huffman Engineering's Keith Mandachit outlines some key cybersecurity mitigation strategies. Read more.

Five controls for OT cybersecurity

Operations technology cybersecurity is finally getting more of the attention it deserves, but Dragos Inc. reports that executive buy-in and five control policies/procedures are needed for a successful cybersecurity program. Read more.

Armor up during upgrades

How ABB revamped San José-Santa Clara Regional Wastewater Facility’s legacy DCI controllers with its HPC 800 Symphony Plus controllers, installed ABB Ability Cyber Security software, and customized the plant’s cybersecurity to protect it from malware and other cyber-threats in just one week. Read more.

Shield with OT’s software-defined networking

“Software-defined networking (SDN) is going to change how OT networking and cybersecurity is done.” Dynics' Jeff Smith explains how SDN microsegments for simpler security. Read more.

Cyber-informed engineering protects proactively

The Idaho National Laboratory advocates using Cyber-Informed Engineering (CIE) to design cybersecurity into equipment, process applications and networks early in their lifecycles. CIE uses design skills, physics and think-like-an-adversary practices to engineer out security risks, and emphasizes the partnership needed for designers and engineers to work with cybersecurity professionals. Read more.

About the Author

Jim Montague | Executive Editor

Jim Montague is executive editor of Control. 

Sponsored Recommendations

IEC 62443 4-1 Cyber Certification – Why ML 3 is So Important

The IEC 62443 Security for Industrial Automation and Control Systems - Part 4-1: Secure Product Development Lifecycle Requirements help increase resilience for control systems...

Multi-Server SCADA Maintenance Made Easy

See how the intuitive VTScada Services Page ensures your multi-server SCADA application remains operational and resilient, even when performing regular server maintenance.

Your Industrial Historical Database Should be Designed for SCADA

VTScada's Chief Software Architect discusses how VTScada's purpose-built SCADA historian has created a paradigm shift in industry expectations for industrial redundancy and performance...

Linux and SCADA – What You May Not Have Considered

There’s a lot to keep in mind when considering the Linux® Operating System for critical SCADA systems. See how the Linux security model compares to Windows® and Mac OS®.