Industrial Control System Security: Getting a Grip on OT Cyber Security
- LANGUAGE: English DATE: Thursday, March 05, 2015 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Common Problems and Unique Challenges of Protecting OT networks in Critical and Non-Critical Infrastructures
What makes ICS systems so difficult to secure? Although these systems suffer the same security issues as any other networks, such as outdated software, inadequate patch management and malware attacks, there are other factors that traditional IT security solutions are not yet able to address. This includes both technical issues such as securing proprietary programmable logic controllers and business requirements such as ensuring industrial process safety and reliability.
Historically, industrial control systems have been a very separate area of the software development market, with their own business drivers, requirements and regulations, and were never designed with security in mind. For decades, these systems were based on proprietary hardware, software, network protocols and were largely isolated from corporate networks. This has changed. In the 1990’s, many control systems switched to commodity computer, networking and even software components, and control networks were widely interconnected with corporate networks to realize cost savings and productivity improvements. 20 years later, most organizations are still struggling with the security implications of this shift.
The consequences of current-day industrial cyber security are adding up. Very recently, a German government report explained how a blast furnace at a steel mill suffered serious damage as a result of a cyber attack. Many authorities are warning that even low-tech “erase the control system hard drives” types of attacks could cripple manufacturing, utilities and other infrastructures for long periods of time. And more sophisticated attacks are possible.
In this KuppingerCole webinar, you will learn about:
- How IT cyber security is similar to OT cyber security, and how they differ
- Common and specific security challenges for OT networks
- Security solutions for protecting OT networks and systems
- Unidirectional Security Gateways: hardware-enforced protection for OT network perimeters
In the first part of the webinar, Martin Kuppinger, founder and principal analyst and Alexei Balaganski, senior analyst at KuppingerCole, introduce to the field of industrial network security. They look at security challenges that the industry is facing, both common to all areas of information security and the challenges unique to industrial networks and critical infrastructures. Finally, they outline the ways current IT trends will shape the future ICS security solutions and discuss the possibility of convergence between traditional and industrial network security.
In the second part of the webinar, Andrew Ginter, VP Industrial Security at Waterfall Security Solutions presents deeper insights into specific industrial security challenges that traditional IT security products cannot reliably address. He introduces the concept of a Unidirectional Security Gateway, a hardware-enforced network perimeter protection able to safely and reliably integrate IT and OT networks without the complexity and vulnerabilities that always accompany firewall deployments.
The march of the cloud is unstoppable. Eager to outsource the tedious and expensive maintenance of their IT infrastructures to a reliable 3rd party, most companies would dream of becoming cloud-native, at least in the long term. Needless to say, letting someone else run your identity management out there sounds like a great idea as well, hence the rising popularity of Identity-as-a-Service solutions that combine the latest technology achievements with the flexibility of the cloud.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.