CONTACT US FOR A DEMO

The Mission Secure Blog

Delivering the latest in operational technology (OT) cybersecurity. Take plant, facility, SCADA and control system security to unparalleled levels.

All Blogs

NCSAM 2019 Perspectives on ICS & OT Cybersecurity: Helping organizations ‘own’ ICS cybersecurity

Author | Mission Secure

Building awareness is the first step to greater cybersecurity and safety. What you don’t know can hurt you. So, take action and identify your risks. Once #CyberAware, it’s time to take measures to protect your operations. And that starts with ownership. So, this week, we dive into ‘owning ICS’ with Don Ward, Senior Vice President of Global Services at MSi. Gain insights from the frontlines as Don shares challenges, surprises and how his team is helping organizations ‘own’ control system and OT cybersecurity.

Read More

NCSAM 2019 Perspectives on ICS & OT Cybersecurity: Building cybersecurity awareness in the industry

Author | Mission Secure

Cybersecurity is what we do. In support of NCSAM 2019, we’re taking an operational technology (OT) and industrial control system (ICS) approach to this year’s theme. Kicking off October, we sat down with Mission Secure CRO, Kent Pope, to discuss and gain his insights on building cybersecurity awareness in the industry. Having spent his 30-year career in cybersecurity, Kent discusses the state of OT cybersecurity, industry challenges and building awareness within organizations.

Read More

Expert Interview: How low can you go? Establishing real-time protection for Level 0 and 1 assets

Author | Mission Secure

Cyber protection for Purdue Model Level 0 and 1 control system assets—that’s the topic industry veteran, Mark Baggett, discusses at the fall Industrial Control Systems Joint Working Group (ICSJWG) meeting hosted by the U.S. Cybersecurity and Infrastructure Security Agency (CISA). As he prepares for his presentation and trip, we caught up with Baggett to discuss his insights from the frontlines and today’s best practices for industrial control system (ICS) cybersecurity.

Read More

Defense in a Cyber-Physical Era: Escalating cyber attacks and inadequate protections

Author | David Dresher

Following cyber attacks on critical infrastructure and government assets in Bahrain, the Wall Street Journal reports increasing “…fears among leaders in the region that Tehran is stepping up its cyberattacks…” Iranian geopolitical tensions continue to rise across nations. With kinetic and non-kinetic actions taking place in the Persian Gulf, retaliation against U.S. government and critical infrastructure, and recent events illuminating this new era of warfare, cyber attacks on physical assets are becoming more frequent. The next era of geopolitical warfare has arrived. What now?

Read More

Do recent kinetic and cyber attacks in the Middle East and U.S. signal a next era of warfare?

Author | David Dresher

The pursuit of nuclear weapons (followed by sanctions), oil tanker explosions in the Gulf of Oman, $180 million-dollar drones shot down, cyber attacks disabling military weapons systems and counterattacks against critical infrastructure all converged the past few weeks...Has the next era of geopolitical warfare arrived, and what now?

Read More

Cyber Attacks: Assume They’re Already in the OT

Author | Paul Robertson

The day has come - the adage of “assume they’re already in and will stay in” applies to not only IT networks, but OT networks as well. Not all intruders go straight to a visible attack. High-level intruders exploit vulnerabilities, then set up conditions to maintain a state of compromise, especially in the event there is a detection. We call this persistence.

Read More