- by Patrick O'Brien
- Thursday, December 06, 2018
- Industrial Cybersecurity
Cyber Risk Assessments and Security Level Verification: Security Level Verification (Part 3 of 3)
The exposure of industrial facilities to cybersecurity threats has never been higher. An analysis performed by IBM security found that the number of attacks on SCADA systems increased 636% from 2012 to 2014, with 675,816 cybersecurity incidents in January 2014 [1]. Finding an effective method for evaluating the current…
Read More...
- by Michael Medoff , CFSE, CISA
- Tuesday, July 16, 2013
- Industrial Cybersecurity
Cyber Security, Beyond the Internet: An Automation Engineer’s View
The world of automation has changed significantly over the past 30 years. I have fond memories of starting my career by calibrating, adjusting, and tuning pneumatic control loops while working my way through the electronic age right up to the present digital and cyber generation of automation. If you…
Read More...
- by Ted Stewart, CFSP, exidaCSP
- Thursday, January 17, 2019
- Industrial Cybersecurity
Cyberattacks Succeed Where Humans and Systems Are Weak
Have you noticed that over the last several years, cybersecurity seems to be “trending?”
Companies of all sizes are starting to learn how to prevent, or at least minimize, these attacks. They hire third-party experts and attend trainings to learn more about the human and system weaknesses that are…
Read More...
- by Jim Sweeney
- Thursday, January 27, 2022
- Industrial Cybersecurity
Demystifying the Threat Modeling Process
The thought of tackling a threat model (TM) might not be the most appetizing to some people. Doing a quick Internet search, someone could get stuck under a mountain of acronyms and terms. I mean, what is a CVSS anyway? And then there are the diagrams, attack trees and feedback loops that…
Read More...
- by Dave Gunter
- Tuesday, January 08, 2019
- Industrial Cybersecurity
Does Your ICS Service Provider Need Training?
Today’s owner operators and lease operators of industrial production facilities frequently employ service providers for projects and upgrades, as well as operations and maintenance. These contractors often travel to many sites, carry their own copies of source code and files, and use multiple PCs with multiple engineering tools for…
Read More...
- by Dave Gunter
- Thursday, June 08, 2017
- Industrial Cybersecurity
exida Cyber Blog Series 03 - Process Safety and Cybersecurity, Related or Still Distant Cousins?
To be clear, the above title is meant to capture your attention. We all understand and know that it is unusual for a Process Safety engineer and the IT architect to possess detailed knowledge of both safety and security. In today’s world, the operators, engineers, design and support personnel of…
Read More...
- by Dave Gunter
- Thursday, July 06, 2017
- Industrial Cybersecurity
exida Cyber Blog Series 04 - Cybersecurity Metrics, Diagnostics, and Alarms: What’s What?
Co-written by Todd Stauffer, Director of Alarm Management Services at exida
A wise man once said, “You can’t manage what you don’t measure.” Let's apply this to the world of cybersecurity to discuss the importance of cybersecurity metrics and how they are different from a cyber diagnostic and a…
Read More...
- by Dave Gunter
- Friday, May 12, 2017
- Industrial Cybersecurity
exida Cyber Blog Series: 01 - What is Cyber Hygiene?
exida would like to welcome our new director of cybersecurity services Dave Gunter. Dave will be taking us through a multi part blog series based on general cybersecurity evolving into how it pertains to your industrial work environment and what you should do to protect your company…
Read More...
- by Dave Gunter
- Wednesday, May 24, 2017
- Industrial Cybersecurity
exida Cyber Blog Series: 02 - Does your position qualify as a Cyber Sensitive position?
That’s a great question.
What is a Cyber sensitive position?
A cyber sensitive position is a subset of a job position description that can be graded as Ultra, High, Medium or Low sensitivity with respect to cybersecurity assets and associated potential consequences that may impact an operating company.
What…
Read More...
- by Dr. William Goble, CFSE
- Friday, January 10, 2014
- Certification
Functional Safety, Cybersecurity, and Alarm Management in 2013
2013 was a good year for functional safety progress. exida Certification issued a record number of new product functional safety certifications in mostly every product category - valves, actuators, solenoid valves, PLCs, fire and gas sensors, process sensors, and components. The component category is one of the most…
Read More...
- by Dr. William Goble, CFSE
- Thursday, January 09, 2020
- Certification
Getting the Best IEC 62443 Cybersecurity Certification?
After careful planning and development of your system, the last thing you want to worry about is the credibility of your certification. Although it may seem like a given for your certification to be well accepted by your customers, it is never a bad idea to dig a little…
Read More...
- by Todd Stauffer
- Tuesday, May 19, 2020
- Industrial Cybersecurity
Grasping the Power of the (Stuxnet) Virus (or What I did during the COVID-19 Pandemic)
The travel and group meeting restrictions from COVID-19 have allowed me to catch up on some reading about viruses; not the type that get transmitted to humans. This article is about the Stuxnet virus and what I learned from the book “Countdown to Zero Day: Stuxnet and the Launch of…
Read More...
- by Rick Smith
- Thursday, August 20, 2015
- Industrial Cybersecurity
How Cybersecurity is like a Goldfish
Oh look! Squirrel!
I am not much of a blogger. I should be but I’m not. This is strange, because I always have plenty to say.
This subject just gets me going so I am writing about it. I welcome feedback and opinions.
I have been in cybersecurity in…
Read More...
- by Dr. William Goble, CFSE
- Thursday, June 21, 2018
- Industrial Cybersecurity
How Does the IEC 62443 Cybersecurity Standard Apply to Integrators?
The IEC 62443 series of cybersecurity standards include over ten documents covering various subjects. Buying a full set is a bit expensive, but for me the real cost is the time needed to read and understand them. So I often ask one of the experts at exida…
Read More...
- by Dr. William Goble, CFSE
- Thursday, August 30, 2018
- Industrial Cybersecurity
How Much Cybersecurity Do I Need?
During an IACS cybersecurity risk analysis, each zone of a network is given a target security level. The levels are one to four, with one being the least amount of protection and four giving the most protection. For each zone we ask, “How much cybersecurity protection do we…
Read More...
- by Jeff Davis
- Thursday, November 08, 2018
- Industrial Cybersecurity
IACS Cybersecurity IEC 62443: Agile Lifecycle and Documentation
Industrial Automation Control Systems (IACS) Cybersecurity based on IEC 62443 was created to be compatible with agile development methodology. The standard deliberately talks about processes and not phases, such as those in the waterfall model. The processes defined can be met simultaneously and are, most likely, already being followed…
Read More...
- by Steve Gandy, CFSP
- Monday, February 08, 2021
- Industrial Cybersecurity
IEC 62443 - The Evolution of IACS Cybersecurity
When we were doing safety system designs in the 1980s, there was no Windows, there was no TCP/IP, there was no in Ethernet. We had to write our own protocols to transmit data to our I/O and our controllers.
Fault-finding was always a challenge . What we ended up…
Read More...
- by Michael Medoff , CFSE, CISA
- Monday, July 23, 2018
- Industrial Cybersecurity
IEC 62443 : The Road to More Secure Products
As the incidence of cybersecurity threats in automation systems continue to rise, the automation world continues to grapple with how to address these issues. There are many good practices published in the IEC 62443 series of standards available to end users such as creating demilitarized zones between the business…
Read More...
- by Michael Medoff , CFSE, CISA
- Thursday, July 12, 2018
- Industrial Cybersecurity
IEC 62443: Levels, Levels and More Levels
By now we’ve all become familiar with safety integrity levels (SIL), as they have become part of our everyday lives. However, with the recent release of several cybersecurity standards in the IEC 62443 series, things are getting more complicated. This series of standards introduces two more levels…
Read More...
- by Ted Stewart, CFSP, exidaCSP
- Wednesday, June 19, 2019
- Industrial Cybersecurity
IEC62443 - Learning Cybersecurity (Prevention Techniques)
Last Saturday, I read an article about hackers who were behind at least two potentially fatal intrusions on oil and gas industrial facilities (Yes I read cyber articles on the weekend 😉). Besides the fact that I enjoy learning about cybersecurity on my days off, what I noticed is…
Read More...