Shutterstock 505066699 6384f7c929dfc

Effective cybersecurity efforts in process operations

Nov. 28, 2022
Cybersecurity week 2022: The articles that follow highlight effective cybersecurity efforts in process operations

Cybersecurity is constantly evolving. While it's important to keep up with the latest potential threats, maintaining a cybersecurity routine as part of overall process operations is key to developing effective security. 

In the articles that follow, Jim Montague seeks the advice of experts in the field and shares some successful cybersecurity case studies from system integrators, vendors and end users. 

Everyday cybersecurity

Interstates' Alan Raveling explains that effective cybersecurity must be a routine part of process operations—even as new cyber-threats and defenses arrive daily. Read more.

Software saves mining labor

"The intention was always to aim for the next generation of endpoint security as part of our overall security strategy.” Orica's Sean Lasinker explains how the explosives company implemented CrowdStrike software to automate cyber threat detection. Read more.

Bake cybersecurity in a safety pan

Experts from SANS Institute put process operations cybersecurity in context and explain how to gain IT’s awareness about cybersecurity paths into ICSs. Read more.

Cope with change—protect PLCs

"The stakes are high as these attacks grow more sophisticated, so it’s not just about controlling your own internal processes anymore.” Huffman Engineering's Keith Mandachit outlines some key cybersecurity mitigation strategies. Read more.

Five controls for OT cybersecurity

Operations technology cybersecurity is finally getting more of the attention it deserves, but Dragos Inc. reports that executive buy-in and five control policies/procedures are needed for a successful cybersecurity program. Read more.

Armor up during upgrades

How ABB revamped San José-Santa Clara Regional Wastewater Facility’s legacy DCI controllers with its HPC 800 Symphony Plus controllers, installed ABB Ability Cyber Security software, and customized the plant’s cybersecurity to protect it from malware and other cyber-threats in just one week. Read more.

Shield with OT’s software-defined networking

“Software-defined networking (SDN) is going to change how OT networking and cybersecurity is done.” Dynics' Jeff Smith explains how SDN microsegments for simpler security. Read more.

Cyber-informed engineering protects proactively

The Idaho National Laboratory advocates using Cyber-Informed Engineering (CIE) to design cybersecurity into equipment, process applications and networks early in their lifecycles. CIE uses design skills, physics and think-like-an-adversary practices to engineer out security risks, and emphasizes the partnership needed for designers and engineers to work with cybersecurity professionals. Read more.

About the Author

Jim Montague | Executive Editor

Jim Montague is executive editor of Control. 

Sponsored Recommendations

Measurement instrumentation for improving hydrogen storage and transport

Hydrogen provides a decarbonization opportunity. Learn more about maximizing the potential of hydrogen.

Get Hands-On Training in Emerson's Interactive Plant Environment

Enhance the training experience and increase retention by training hands-on in Emerson's Interactive Plant Environment. Build skills here so you have them where and when it matters...

Learn About: Micro Motion™ 4700 Config I/O Coriolis Transmitter

An Advanced Transmitter that Expands Connectivity

Learn about: Micro Motion G-Series Coriolis Flow and Density Meters

The Micro Motion G-Series is designed to help you access the benefits of Coriolis technology even when available space is limited.