Topics of the Day
Tick, tick, tick, tick, tick; there is no way to stop a second hand, which shifts to minutes and then hours and then days. Like waves crashing on the shore, time keeps moving no matter what.
Safety technology and the professionals behind it provide a solid assurance the process and facility remain safe and sound on a daily basis, there is no doubt. While that is a vital element of process automation, there can be so much more.Making Time for Security
Not too long ago, a young Polish boy found a hole in the network of a European tram system. He was able to get into the system, navigate his way around and then, using a television remote, he was able to switch tracks using the infrared device on the remote.
How does your company’s perception of ICS risk compare to that of other organizations? How are other asset owners defining the boundaries between OT systems and external systems? How do your ICS security roadblocks compare to others? Where does your company rank in terms of managing OT/IT convergence?
An attacker’s next point of entry to your corporate network just might be the Internet-connected smart TV in the boardroom, or a connected HVAC device accessed remotely by a third-party service technician. Once inside your network, the attacker can find a way to pivot to the OT network and compromise plant operations and safety. In the plant itself, an unmanaged weak point could be an unpatched Internet-facing VPN router or even a wireless access point.
One of the many unique aspects of the manufacturing industry is its diversity of operating systems in terms of purpose, vintage and version.