The Kundankulam Nuclear Power Plant (KKNPP) is India's largest and newest nuclear facility. Owned by the Nuclear Power Corporation of India Limited (NPCIL), KKNPP rests on a legacy of controversy from safety issues and a nearly decade-delay in construction to absent offsite spent fuel storage and subsequent court battles—the recent cyber attack being the latest in the list. What exactly happened at KKNPP? Uncovering a cyber attack: On October 28th, reports began circulating that computer...
For organizations in oil & gas, maritime, critical infrastructure and defense, the ultimate goal is cyber resiliency—to ensure the safety and security of operations in the face of a cyber attack. Control system veteran, Mark Baggett, discusses his experience in the field, insights and current gaps in protecting control systems in today’s digital era. With more than 25 years of experience, Mark’s worked on control systems for the industry’s most prominent players.
We’re all about control systems for NCSAM 2019. Week one covered building ICS cybersecurity awareness within organizations, followed by ‘owning’ industrial control systems during week two. This week, dive into securing operational technology or OT with Paul Arceneaux, Vice President of Product. Leading product development at IT and OT cybersecurity companies, learn more about how a product leader and innovator views the OT world and what organizations can do to “secure OT” going forward.
Building awareness is the first step to greater cybersecurity and safety. What you don’t know can hurt you. So, take action and identify your risks. Once #CyberAware, it’s time to take measures to protect your operations. And that starts with ownership. So, this week, we dive into ‘owning ICS’ with Don Ward, Senior Vice President of Global Services at MSi. Gain insights from the frontlines as Don shares challenges, surprises and how his team is helping organizations ‘own’ control system and OT cybersecurity.
Cybersecurity is what we do. In support of NCSAM 2019, we’re taking an operational technology (OT) and industrial control system (ICS) approach to this year’s theme. Kicking off October, we sat down with Mission Secure CRO, Kent Pope, to discuss and gain his insights on building cybersecurity awareness in the industry. Having spent his 30-year career in cybersecurity, Kent discusses the state of OT cybersecurity, industry challenges and building awareness within organizations.
Cyber protection for Purdue Model Level 0 and 1 control system assets—that’s the topic industry veteran, Mark Baggett, discusses at the fall Industrial Control Systems Joint Working Group (ICSJWG) meeting hosted by the U.S. Cybersecurity and Infrastructure Security Agency (CISA). As he prepares for his presentation and trip, we caught up with Baggett to discuss his insights from the frontlines and today’s best practices for industrial control system (ICS) cybersecurity.
Following cyber attacks on critical infrastructure and government assets in Bahrain, the Wall Street Journal reports increasing “…fears among leaders in the region that Tehran is stepping up its cyberattacks…” Iranian geopolitical tensions continue to rise across nations. With kinetic and non-kinetic actions taking place in the Persian Gulf, retaliation against U.S. government and critical infrastructure, and recent events illuminating this new era of warfare, cyber attacks on physical assets are becoming more frequent. The next era of geopolitical warfare has arrived. What now?
The pursuit of nuclear weapons (followed by sanctions), oil tanker explosions in the Gulf of Oman, $180 million-dollar drones shot down, cyber attacks disabling military weapons systems and counterattacks against critical infrastructure all converged the past few weeks...Has the next era of geopolitical warfare arrived, and what now?
The day has come - the adage of “assume they’re already in and will stay in” applies to not only IT networks, but OT networks as well. Not all intruders go straight to a visible attack. High-level intruders exploit vulnerabilities, then set up conditions to maintain a state of compromise, especially in the event there is a detection. We call this persistence.