Shutterstock 505066699 6384f7c929dfc

Effective cybersecurity efforts in process operations

Nov. 28, 2022
Cybersecurity week 2022: The articles that follow highlight effective cybersecurity efforts in process operations

Cybersecurity is constantly evolving. While it's important to keep up with the latest potential threats, maintaining a cybersecurity routine as part of overall process operations is key to developing effective security. 

In the articles that follow, Jim Montague seeks the advice of experts in the field and shares some successful cybersecurity case studies from system integrators, vendors and end users. 

Everyday cybersecurity

Interstates' Alan Raveling explains that effective cybersecurity must be a routine part of process operations—even as new cyber-threats and defenses arrive daily. Read more.

Software saves mining labor

"The intention was always to aim for the next generation of endpoint security as part of our overall security strategy.” Orica's Sean Lasinker explains how the explosives company implemented CrowdStrike software to automate cyber threat detection. Read more.

Bake cybersecurity in a safety pan

Experts from SANS Institute put process operations cybersecurity in context and explain how to gain IT’s awareness about cybersecurity paths into ICSs. Read more.

Cope with change—protect PLCs

"The stakes are high as these attacks grow more sophisticated, so it’s not just about controlling your own internal processes anymore.” Huffman Engineering's Keith Mandachit outlines some key cybersecurity mitigation strategies. Read more.

Five controls for OT cybersecurity

Operations technology cybersecurity is finally getting more of the attention it deserves, but Dragos Inc. reports that executive buy-in and five control policies/procedures are needed for a successful cybersecurity program. Read more.

Armor up during upgrades

How ABB revamped San José-Santa Clara Regional Wastewater Facility’s legacy DCI controllers with its HPC 800 Symphony Plus controllers, installed ABB Ability Cyber Security software, and customized the plant’s cybersecurity to protect it from malware and other cyber-threats in just one week. Read more.

Shield with OT’s software-defined networking

“Software-defined networking (SDN) is going to change how OT networking and cybersecurity is done.” Dynics' Jeff Smith explains how SDN microsegments for simpler security. Read more.

Cyber-informed engineering protects proactively

The Idaho National Laboratory advocates using Cyber-Informed Engineering (CIE) to design cybersecurity into equipment, process applications and networks early in their lifecycles. CIE uses design skills, physics and think-like-an-adversary practices to engineer out security risks, and emphasizes the partnership needed for designers and engineers to work with cybersecurity professionals. Read more.

About the Author

Jim Montague | Executive Editor

Jim Montague is executive editor of Control. 

Sponsored Recommendations

Make Effortless HMI and PLC Modifications from Anywhere

The tiny EZminiWiFi is a godsend for the plant maintenance engineers who need to make a minor modification to the HMI program or, for that matter, the PLC program. It's very easy...

The Benefits of Using American-Made Automation Products

Discover the benefits of American-made automation products, including stable pricing, faster delivery, and innovative features tailored to real-world applications. With superior...

50 Years of Automation Innovation and What to Expect Next

Over the past 50 years, the automation technology landscape has changed dramatically, but many of the underlying industry needs remain unchanged. To learn more about what’s changed...

Manufacturing Marvels Highlights Why EZAutomation Is a Force to Be Reckoned With

Watch EZAutomation's recent feature on the popular FOX Network series "Manufacturing Marvels" and discover what makes them a force to be reckoned with in industrial automation...