2016 ended with reports of 2 electric utility organizations, on different sides of the world (Ukraine and Vermont), citing cyberattacks or cyber infections. Both incidents highlight that corporate computer infections can threaten power systems and the need for robust ICS security in 2017. This article highlights the steps involved in the watershed 2015 Ukraine utility cyberattack as it moved from IT to OT systems and suggests ways of improving threat detection and mitigation.
CrashOverride Critical Infrastructure Cybersecurity Critical Infrastructure Cyber security cyber security deep packet inspection Defense in Depth ICS anomaly detection ICS Asset Inventory ICS Asset Management ICS Cybersecurity ICS cyber security ICS Cybersecurity for Substations and Power Grids ICS Detection Challenge ICS intrusion detection ICS Network visibility ICS Operational Visibility ICS ransomware ICS security ICS Threat Detection IEC 61850 IEC 62443 IIoT IIoT Security industrial control system Industrial Cyber Security Industrial Cybersecurity industrial security Industroyer IoT Security IT/OT Nozomi Networks Operational Technology Risk Assessment OT cyber security OT security OT Security Management. ICS Risk Management Petya Power Grid S4 S4x18 SANS ICS Survey SCADAguardian SCADA security TRITON WannaCry WG15