Cyber protection for Purdue Model Level 0 and 1 control system assets—that’s the topic industry veteran, Mark Baggett, discusses at the fall Industrial Control Systems Joint Working Group (ICSJWG) meeting hosted by the U.S. Cybersecurity and Infrastructure Security Agency (CISA). As he prepares for his presentation and trip, we caught up with Baggett to discuss his insights from the frontlines and today’s best practices for industrial control system (ICS) cybersecurity.
Following cyber attacks on critical infrastructure and government assets in Bahrain, the Wall Street Journal reports increasing “…fears among leaders in the region that Tehran is stepping up its cyberattacks…” Iranian geopolitical tensions continue to rise across nations. With kinetic and non-kinetic actions taking place in the Persian Gulf, retaliation against U.S. government and critical infrastructure, and recent events illuminating this new era of warfare, cyber attacks on physical assets are becoming more frequent. The next era of geopolitical warfare has arrived. What now?
The pursuit of nuclear weapons (followed by sanctions), oil tanker explosions in the Gulf of Oman, $180 million-dollar drones shot down, cyber attacks disabling military weapons systems and counterattacks against critical infrastructure all converged the past few weeks...Has the next era of geopolitical warfare arrived, and what now?
The day has come - the adage of “assume they’re already in and will stay in” applies to not only IT networks, but OT networks as well. Not all intruders go straight to a visible attack. High-level intruders exploit vulnerabilities, then set up conditions to maintain a state of compromise, especially in the event there is a detection. We call this persistence.