ID
× COMMENTARYCOVER STORYIN THE NEWSNEWSFRONTS
DechemaAchema 2018 Review
Sustainability, digitalization and flexible production approaches emerged as major themes…
CHEMENTATOR + Show More BUSINESS NEWSTECHNICAL & PRACTICALFEATURE REPORTFACTS AT YOUR FINGERTIPSTECHNOLOGY PROFILEENGINEERING PRACTICEEQUIPMENT & SERVICESFOCUS
CADWorx & Analysis SolutionsFocus on Software
Software enables interactive analytics on collected data This company recently…
NEW PRODUCTS + Show More

Comment PDF Automation & Control

Cybersecurity: You Cannot Secure What You Cannot See

By David Zahn, PAS Inc. |

Follow this guidance to understand today’s cybersecurity risk landscape and take the necessary steps to create a sound industrial control system cybersecurity program, including the development of a comprehensive, in-depth cyber-asset inventory In industrial facilities, cyber incidents typically result from three basic scenarios: a malicious attack from an outside individual or group; a cyber incident that results from an engineer making a mistake that alters a control process or diminishes safe operations; or the work of a disgruntled employee or ex-employee. No matter which of these scenarios you believe is real or presents the most risk, companies must take steps to protect their industrial control systems (ICS) from cyber incidents. What should companies do and how far should they go to ensure that risk is managed to a sufficient level? This article addresses the fundamental elements that an ICS cybersecurity program must contain, and shares guidance on how to develop an in-depth cyber asset inventory.   Figure 1. Cybersecurity risks can arise from several scenarios — malicious attack, human errors and the intentional actions of disgruntled current or former employees[/caption] Cyber incidents A malicious attack…
Related Content
Focus on Software
Software enables interactive analytics on collected data This company recently updated its Seeq R20 advanced-analytics solution (photo) for engineers and…
Focus on Plant Security
Protect plant assets from cybersecurity threats The fully integrated Claroty Platform (photo) incorporates realtime vulnerability monitoring and network “hygiene” insights…
Focus on Process Control Hardware
Wired network bridge enables remote troubleshooting This company has added the PLX35-NB2 Network Bridge to its slate of Secure Remote…

Chemical Engineering publishes FREE eletters that bring our original content to our readers in an easily accessible email format about once a week.
Subscribe Now
Three reasons to measure pH in-line
ABB Ability™ technology to transform BASF rotating equipment into intelligent machinery and improve uptime and reliability
Detect and correct anomalies early in your batch processes
ABB at ACHEMA 2018
The Future of Project Execution

View More

Live chat by BoldChat