Building Intuition into Monitoring for OT/ICS Security - Pentestmag

Building Intuition into Monitoring for OT/ICS Security

Feb 22, 2023

by Danielle Jablanski

The current state of operational technology and industrial control systems cybersecurity is turning a corner. It has progressed from decades of admiring hypothetical scenarios, to realizing the significance of very real threats and vulnerabilities that exist across critical infrastructure all over the globe. Recent revelations from Industroyer2 and INCONTROLLER teach us that you can only alert on and potentially catch what you know how to look for in these environments. 

The evolution of the technologies we care about in OT/ICS began with on premises connectivity between systems, often using ethernet, to connecting multiple sites and often remote locations, to the expansion of SCADA architectures, and are increasingly adopting cloud technologies. Some sectors are experiencing technological revolutions, changing the principles of operations, and introducing increasingly smart and connected devices. Others are refocusing their attention on industrial and legacy systems difficult and costly to replace, shoring up their security approaches in a renaissance of enlightened approaches to a difficult problem set. 

This evolution has ushered in waves of complexity for communication across the levels and zones of the Purdue model, and new layers of centralized management on top of many decentralized nodes and systems with limited embedded or enabled security features. In practice, this involves thousands of congruent and incongruent systems, security zones, segmented networks, interfaces, data types, and conduits. 

March 1, 2023
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

13 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Ibraham Jacob
4 months ago

“Fantastic insights on integrating intuition into OT/ICS security monitoring! The blend of human expertise with advanced technology is crucial for staying ahead of potential threats. This approach not only enhances detection capabilities but also fosters a proactive security culture. Looking forward to more such informative sessions!”

Fauxjacket
9 months ago

The best faux leather jackets are the ones that make you happy. Our effort is to provide you with faux sheepskin jacket mens. So visit our site now.

christome
christome
1 year ago

great

who are ya
1 year ago

We appreciate you submitting this information. I am thrilled to stumble onto this excellent article. 

among12
among12
1 year ago

Great article it’s really informative and creative which helps us to post new updates. it’s really worth it. Thanks a lot. If you have more time, please visit: dordle game

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023