2016 ended with reports of 2 electric utility organizations, on different sides of the world (Ukraine and Vermont), citing cyberattacks or cyber infections. Both incidents highlight that corporate computer infections can threaten power systems and the need for robust ICS security in 2017. This article highlights the steps involved in the watershed 2015 Ukraine utility cyberattack as it moved from IT to OT systems and suggests ways of improving threat detection and mitigation.
CrashOverride Critical Infrastructure Cybersecurity Critical Infrastructure Cyber security cyber security deep packet inspection Defense in Depth ICS anomaly detection ICS Asset Inventory ICS Asset Management ICS Cybersecurity ICS cyber security ICS Cybersecurity for Substations and Power Grids ICS Detection Challenge ICS intrusion detection ICS ransomware ICS security ICS Security Industrial Cyber Security ICS Threat Detection IEC 61850 IEC 62351 IEC 62443 IIoT IIoT Security industrial control system Industrial Cybersecurity Industrial Cyber Security industrial security Industroyer IoT Security IT/OT Nozomi Networks Operational Technology Risk Assessment OT cyber security OT security OT Security Management. ICS Risk Management Petya Power Grid S4 S4x18 SANS ICS Survey SCADAguardian SCADA security TRITON WannaCry WG15