German China India

Industrial Cyber Security

Cyber Security for Process Plants: The Core Principles of ICS Cybersecurity

powered by: aeSolutions

Cyber Security for Process Plants: The Core Principles of ICS Cybersecurity

Protecting an industrial process control system against cyber-attacks is by no means an easy task. While the industry has made huge strides towards awareness, the challenge is immense. For cyber security in operations technology and automation is challenging and different from enterprise level security – as our new whitepaper shows…

The design and implementation of Industrial Control Systems (ICS) cybersecurity program poses significant challenges due to the stringent requirements of a manufacturing plant and how control systems and their networks are engineered, operated and maintained.
While industry has made significant strides in gaining awareness and applying resources to address these requirements, many organizations have also come to realize that implementing cybersecurity measures in the ICS environment– also referred to as Operations Technology or OT, is challenging and quite different from implementing cybersecurity in the enterprise IT environment.
Many of the concepts proven and accepted in enterprise IT are either too difficult and/or complex to execute or simply not relevant to the operating environment.
Guidance provide by the NIST framework and other publications are helpful to getting started, and experience also dictates that there are a core set of cybersecurity elements for the ICS environment that must be done right.
 
This paper highlights the uniqueness of the ICS environment and offers core principles for a successful development and launch of an ICS cybersecurity program.

Whitepaper from company „aeSolutions“

By clicking on the button I agree that Vogel transmits my data to the above mentioned provider of this offer and that he uses my data for the advertising of his product also by email, telephone and fax. For this purpose he receives my address and contact data, as well as data to prove this consent, which he processes on his own responsibility.
You have the right to revoke this consent at any time with effect for the future.
If the responsible recipient is located in a country outside the EU, we must inform you that the level of data protection may be lower than in the EU.


Published: 12/01/2016 | aeSolutions

The provider of this whitepaper

aeSolutions

Commonwealth Drive 2
SC 20615 Greenville
USA