2016 ended with reports of 2 electric utility organizations, on different sides of the world (Ukraine and Vermont), citing cyberattacks or cyber infections. Both incidents highlight that corporate computer infections can threaten power systems and the need for robust ICS security in 2017. This article highlights the steps involved in the watershed 2015 Ukraine utility cyberattack as it moved from IT to OT systems and suggests ways of improving threat detection and mitigation.
Advanced Persistent Threats CrashOverride Critical Infrastructure Cybersecurity cyber security deep packet inspection Defense in Depth ICS anomaly detection ICS Asset Inventory ICS Asset Management ICS Cybersecurity ICS Cybersecurity for Substations and Power Grids ICS Detection Challenge ICS Incident Response ICS intrusion detection ICS ransomware ICS security ICS Security Industrial Cyber Security ICS Threat Detection ICS Vulnerability Detection IEC 61850 IEC 62443 IIoT IIoT Security Industrial Automation Cybersecurity industrial control system Industrial Cybersecurity Industrial Cyber Security industrial security Industroyer IoT Security IT/OT Nozomi Networks Operational Technology Risk Assessment OT security OT Security Management. ICS Risk Management Petya Ponemon Institute Power Grid S4 S4x18 SANS ICS Survey SCADAguardian SCADA security WannaCry WG15