CONTACT US FOR A DEMO

The Mission Secure Blog

Delivering the latest in operational technology (OT) cybersecurity. Take plant, facility, SCADA and control system security to unparalleled levels.

All Blogs

Cyber Attack Briefing: India’s Largest Nuclear Power Plant and the Truth About Air-gapping

Author | Mission Secure

The Kundankulam Nuclear Power Plant (KKNPP) is India's largest and newest nuclear facility. Owned by the Nuclear Power Corporation of India Limited (NPCIL), KKNPP rests on a legacy of controversy from safety issues and a nearly decade-delay in construction to absent offsite spent fuel storage and subsequent court battles—the recent cyber attack being the latest in the list. What exactly happened at KKNPP? Uncovering a cyber attack: On October 28th, reports began circulating that computer...

Read More

NCSAM 2019 Perspectives on ICS & OT Cybersecurity: Helping organizations ‘protect’ operations

Author | Mission Secure

For organizations in oil & gas, maritime, critical infrastructure and defense, the ultimate goal is cyber resiliency—to ensure the safety and security of operations in the face of a cyber attack. Control system veteran, Mark Baggett, discusses his experience in the field, insights and current gaps in protecting control systems in today’s digital era. With more than 25 years of experience, Mark’s worked on control systems for the industry’s most prominent players.

Read More

NCSAM 2019 Perspectives on ICS & OT Cybersecurity: Helping organizations ‘secure’ OT

Author | Mission Secure

We’re all about control systems for NCSAM 2019. Week one covered building ICS cybersecurity awareness within organizations, followed by ‘owning’ industrial control systems during week two. This week, dive into securing operational technology or OT with Paul Arceneaux, Vice President of Product. Leading product development at IT and OT cybersecurity companies, learn more about how a product leader and innovator views the OT world and what organizations can do to “secure OT” going forward.

Read More

NCSAM 2019 Perspectives on ICS & OT Cybersecurity: Helping organizations ‘own’ ICS cybersecurity

Author | Mission Secure

Building awareness is the first step to greater cybersecurity and safety. What you don’t know can hurt you. So, take action and identify your risks. Once #CyberAware, it’s time to take measures to protect your operations. And that starts with ownership. So, this week, we dive into ‘owning ICS’ with Don Ward, Senior Vice President of Global Services at MSi. Gain insights from the frontlines as Don shares challenges, surprises and how his team is helping organizations ‘own’ control system and OT cybersecurity.

Read More

NCSAM 2019 Perspectives on ICS & OT Cybersecurity: Building cybersecurity awareness in the industry

Author | Mission Secure

Cybersecurity is what we do. In support of NCSAM 2019, we’re taking an operational technology (OT) and industrial control system (ICS) approach to this year’s theme. Kicking off October, we sat down with Mission Secure CRO, Kent Pope, to discuss and gain his insights on building cybersecurity awareness in the industry. Having spent his 30-year career in cybersecurity, Kent discusses the state of OT cybersecurity, industry challenges and building awareness within organizations.

Read More

Expert Interview: How low can you go? Establishing real-time protection for Level 0 and 1 assets

Author | Mission Secure

Cyber protection for Purdue Model Level 0 and 1 control system assets—that’s the topic industry veteran, Mark Baggett, discusses at the fall Industrial Control Systems Joint Working Group (ICSJWG) meeting hosted by the U.S. Cybersecurity and Infrastructure Security Agency (CISA). As he prepares for his presentation and trip, we caught up with Baggett to discuss his insights from the frontlines and today’s best practices for industrial control system (ICS) cybersecurity.

Read More

Defense in a Cyber-Physical Era: Escalating cyber attacks and inadequate protections

Author | David Dresher

Following cyber attacks on critical infrastructure and government assets in Bahrain, the Wall Street Journal reports increasing “…fears among leaders in the region that Tehran is stepping up its cyberattacks…” Iranian geopolitical tensions continue to rise across nations. With kinetic and non-kinetic actions taking place in the Persian Gulf, retaliation against U.S. government and critical infrastructure, and recent events illuminating this new era of warfare, cyber attacks on physical assets are becoming more frequent. The next era of geopolitical warfare has arrived. What now?

Read More

Do recent kinetic and cyber attacks in the Middle East and U.S. signal a next era of warfare?

Author | David Dresher

The pursuit of nuclear weapons (followed by sanctions), oil tanker explosions in the Gulf of Oman, $180 million-dollar drones shot down, cyber attacks disabling military weapons systems and counterattacks against critical infrastructure all converged the past few weeks...Has the next era of geopolitical warfare arrived, and what now?

Read More

Cyber Attacks: Assume They’re Already in the OT

Author | Paul Robertson

The day has come - the adage of “assume they’re already in and will stay in” applies to not only IT networks, but OT networks as well. Not all intruders go straight to a visible attack. High-level intruders exploit vulnerabilities, then set up conditions to maintain a state of compromise, especially in the event there is a detection. We call this persistence.

Read More