The Need to Change the Paradigm of Control System Cyber Security – Article 2: Lack of Control System Cyber Incident Information Sharing

Dec. 3, 2020
I have prepared a three-part series for the Cyber Observatory. Part 2 provides actual control system cyber incidents to demonstrate control system cyber security is a real issue. It addresses the lack of control system cyber incident information sharing, control system cyber forensics, and the need for cyber security training for the engineers. It can be found at https://cyberstartupobservatory.com/the-need-to-change-the-paradigm-of-control-system-cyber-security-part-2-lack-of-control-system-cyber-incident-information-sharing/

There have been many articles, webinars, surveys, webinars, and books on cyber security of Operational Technology (OT) networks and control systems. I put them into three bins. The first bin includes those presentations, papers, webinars, and surveys that apply to “keeping lights on and water flowing”. The second bin includes those presentations, papers, webinars, and surveys that apply to Operational Technology (OT) networks but do not include “keeping lights on and water flowing”. This is generally where the IT/OT convergence discussions lie. The third bin are those presentations, papers, webinars, and surveys that are factually not correct or not applicable to control systems. Unfortunately, there are very few articles, discussions, books, webinars, or surveys that fit into the first bin. Most fit into the second bin. Consequently, I have prepared a three-part series for the Cyber Observatory with the first part describing the history of control system cyber security and differences between control systems and networking. Part 1 can be found at https://cyberstartupobservatory.com/the-need-to-change-the-paradigm-of-control-system-cyber-security-part-1-background/. The second part that was just published provides actual control system cyber incidents to demonstrate control system cyber security is a real issue. It addresses the lack of control system cyber incident information sharing, control system cyber forensics, and the need for cyber security training for the engineers. Part 2 can be found at https://cyberstartupobservatory.com/the-need-to-change-the-paradigm-of-control-system-cyber-security-part-2-lack-of-control-system-cyber-incident-information-sharing/.

Joe Weiss

Sponsored Recommendations

IEC 62443 4-1 Cyber Certification – Why ML 3 is So Important

The IEC 62443 Security for Industrial Automation and Control Systems - Part 4-1: Secure Product Development Lifecycle Requirements help increase resilience for control systems...

Multi-Server SCADA Maintenance Made Easy

See how the intuitive VTScada Services Page ensures your multi-server SCADA application remains operational and resilient, even when performing regular server maintenance.

Your Industrial Historical Database Should be Designed for SCADA

VTScada's Chief Software Architect discusses how VTScada's purpose-built SCADA historian has created a paradigm shift in industry expectations for industrial redundancy and performance...

Linux and SCADA – What You May Not Have Considered

There’s a lot to keep in mind when considering the Linux® Operating System for critical SCADA systems. See how the Linux security model compares to Windows® and Mac OS®.