2016 ended with reports of 2 electric utility organizations, on different sides of the world (Ukraine and Vermont), citing cyberattacks or cyber infections. Both incidents highlight that corporate computer infections can threaten power systems and the need for robust ICS security in 2017. This article highlights the steps involved in the watershed 2015 Ukraine utility cyberattack as it moved from IT to OT systems and suggests ways of improving threat detection and mitigation.
Critical infrastructure Critical Infrastructure Cyber security Critical Infrastructure Cybersecurity cyber security cyber security conference deep packet inspection Defense in Depth ICS anomaly detection ICS Asset Inventory ICS Asset Management ICS cyber security ICS Cybersecurity ICS cyber security event ICS Cybersecurity for Substations and Power Grids ICS Detection Challenge ICS intrusion detection ICS Network visibility ICS Operational Visibility ICS security ICS Threat Detection IEC 61850 IEC 62351 IEC 62443 IIoT IIoT Security industrial control system Industrial Cybersecurity Industrial Cyber Security industrial security Industroyer IoT Security IT/OT Nozomi Networks Operational Technology Risk Assessment OT cyber security OT security OT Security Management. ICS Risk Management Power Grid S4 S4x18 SANS ICS Survey SCADAguardian SCADA security TRITON WG15