Making progress – one person at a time

Jan. 1, 2000

I received the following Link-in request and thought it would be of interest as I believe it covers a broad swath of the utility infrastructure. 
 
“We met several years ago, I think back in 2002, when you spoke at a SCADA system users group meeting. I was just becoming acquainted with the world of SCADA having working most of my career in IT. At the time, I did not quite understand why there was such a concern about SCADA systems and their vulnerability to public networks. I had my system designed within a private network and felt that it was secure. Doesn't everyone do the same thing? Well it was not until these past few years that I became exposed to other companies and their network designs and realized the extreme difference between the areas of IT and ICS.

I received the following Link-in request and thought it would be of interest as I believe it covers a broad swath of the utility infrastructure. 
 
“We met several years ago, I think back in 2002, when you spoke at a SCADA system users group meeting. I was just becoming acquainted with the world of SCADA having working most of my career in IT. At the time, I did not quite understand why there was such a concern about SCADA systems and their vulnerability to public networks. I had my system designed within a private network and felt that it was secure. Doesn't everyone do the same thing? Well it was not until these past few years that I became exposed to other companies and their network designs and realized the extreme difference between the areas of IT and ICS.

I recently watched a YouTube video of you conducting a lecture at Stanford on the topic of cyber security and how it affects industrial control systems. I understood everything you spoke about, more deeply than your audience, and remembered how passionate you were about those topics back at the OSI user's group. This brief lecture has given me additional inspiration to pursue the area of cyber security and help bridge the gap between the IT and ICS realms. These fields are becoming more associated and require individuals with skills that can effectively work in both.

Thank you for your insight and knowledge in these areas of ICS security. Hopefully, having you as a contact will allow me to follow you more closely and keep up to date on the future progression of this field.”

How can we get more people willing to acknowledge the depth of the ICS cyber security problem?

Joe Weiss

Sponsored Recommendations

Make Effortless HMI and PLC Modifications from Anywhere

The tiny EZminiWiFi is a godsend for the plant maintenance engineers who need to make a minor modification to the HMI program or, for that matter, the PLC program. It's very easy...

The Benefits of Using American-Made Automation Products

Discover the benefits of American-made automation products, including stable pricing, faster delivery, and innovative features tailored to real-world applications. With superior...

50 Years of Automation Innovation and What to Expect Next

Over the past 50 years, the automation technology landscape has changed dramatically, but many of the underlying industry needs remain unchanged. To learn more about what’s changed...

Manufacturing Marvels Highlights Why EZAutomation Is a Force to Be Reckoned With

Watch EZAutomation's recent feature on the popular FOX Network series "Manufacturing Marvels" and discover what makes them a force to be reckoned with in industrial automation...