Simplifying the ICS Cyber Security Vendor Selection Process

Simplifying the ICS Cyber Security Vendor Selection Process

Defining ICS cyber security needs and selecting a trusted partner can be challenging for industrial operators, so Kim Legelis sat down with ARC Advisory Group VP Research Larry O’Brien to see if he could help simplify the process.

From the challenges of IT/OT convergence to ensuring asset visibility, read on to learn what that Larry thinks are important considerations, and ways to streamline the selection process.

Electric Grid Cyber Security: Ten Actions Utilities Can Do Now

Electric Grid Cyber Security: Ten Actions Utilities Can Do Now

Concerns about cyber attacks on the U.S. critical infrastructure have reached a new level with The Wall Street Journal reporting “an evolution in the U.S. government’s thinking about how to deter malicious cyberactors”.

Find out ten actions that can be done quickly to monitor and secure the electrical grid against determined threat actors.

Advancing ICS Cyber Security for Low-Impact Electricity Carriers

Advancing ICS Cyber Security for Low-Impact Electricity Carriers

Cyber security threats to the power grid are a continuous danger nowadays, and because of this, regulation in North America may expand from covering bulk electricity carriers to low-impact carriers. Last month FERC, the U.S. Federal Energy Regulatory Commission, proposed a new rule for low-impact carriers, covering transient electronic devices such as USBs and laptops, and incident response policies.
While the regulation is still in the review stage, some low-impact utilities are not waiting to improve their cyber security posture and get a head start on compliance. They are taking advantage of the latest innovation for cyber threat monitoring and detection systems. Vermont Electric Coop is one such entity, and they have realized multiple benefits from their proactive approach.

ARC Forum: 4 Key Criteria for ICS Cyber Security Anomaly Detection

ARC Forum: 4 Key Criteria for ICS Cyber Security Anomaly Detection

At the recent ARC Forum in Orlando, the automation community met to discuss pressing issues for the future. Cyber security was on top of the list of topics, with a full track led by ARC’s lead industrial security analyst Sid Snitkin. He led a panel that addressed an important new tool: ICS anomaly and breach detection solutions. Let’s look at the four critical capabilities ARC identified for these products, and how Nozomi Networks’ technology addresses them.