The need for critical infrastructure specialists

Specialized experts for specific critical infrastructure projects are becoming more and more common as projects become more complex and more demanding.

03/24/2016


It's becoming very important for those needing to protect refineries, power grids, healthcare institutions, traffic systems and other solutions that are run by automated controls to use specialized security researchers to perform site assessments and, later, certifications.

Those needing to protect critical infrastructures using operation technology (OT) cannot rely on information technology (IT) security specialists. Both use computers, but they work in very different environments.

Just as someone would not ask the plant manager to fix the flaw in a Microsoft Windows system, the IT director can't be expected to have all the answers to protecting the OT system. IT specialists strive to protect data; OT environments work to keep machines producing. Therefore, the byproducts of IT versus OT attacks are also different.

During the 2015 RSA security conference, Wurldtech's Frank Marcus, director of technology, led a peer discussion that underscored the heightened profile of cyber security in the age of the Industrial Internet. Addressing the audience of global critical infrastructure experts, Marcus spoke about the evolution of threats against critical infrastructure. While enterprise cyber attacks may grab bigger headlines, cyber attacks on physical infrastructures can have greater consequences, including environmental damage and human safety.

Protecting these types of attacks are not the focus of IT departments. While the primary goal in IT is to protect data, OT security strives to keep processes running. Whether from outside threats, like hackers or state sponsored actors, or inside threats, like human error, in an environment where companies are operating drills, electric grids, MRI's or locomotives, unplanned downtime is simply not acceptable. This is especially true for industries such as oil and gas, energy producers, health facilities and transportation systems in which even a couple minutes of downtime can yield tens of thousands of dollars lost. 

Developing OT specialists

In the real world, Wurldtech began with "white hat" hackers who recognized there is an incredible amount of risk in our critical infrastructure. In-house hackers tested all the possible ways these machine-to-machine (M2M) networks could be infiltrated to identify where vulnerabilities exist and determine how to protect against them.

Once there was enough data, the team was able to create a comprehensive cyber security solution to help provide critical infrastructure protection against the persistent and dynamic cyber threats that challenge production environments, transportation systems and healthcare operations. If a system is successfully hacked, it is possible to help stop that attack from getting to the internal Internet where it can wreck havoc on the factory, grid or drilling station.

Once the solution is installed, a security and quality testing service that simulates attackers challenging the system is needed to make sure that the user is controlling who is talking to whom. Such a service imitates attackers challenging the company's system.

Ask questions

Nate Kube founded Wurldtech Security Technologies in 2006 and, as the company's chief technology officer, is responsible for strategic alliances, technology, and thought leadership. Courtesy: ISSSource, Wurldtech Security TechnologiesAlso, be sure to ask the mission critical device manufacturers if they have been tested to repel cyber attacks. Have they had their products monitored to both network and operational parameters, allowing vulnerabilities to be discovered and faults to be reproduced, isolated, identified and resolved before these products are introduced to the market? Are they certified to be secure?

In addition, management needs assurance the security experts they hire are not only highly certified and trained to carefully assess, design and implement OT security but to do so in their industry environments. For instance, oil management needs to assure that the security experts they hire are certified and trained to carefully assess, design, and implement OT security in offshore and onshore environments. If the goal is to help secure operational assets, reduce compliance penalties, and enforce supplier security, specialized expertise is absolutely needed.

Nate Kube founded Wurldtech Security Technologies in 2006 and, as the company's chief technology officer, is responsible for strategic alliances, technology, and thought leadership. This content originally appeared on ISSSource. Edited by Chris Vavra, production editor, CFE Media, cvavra@cfemedia.com.

ONLINE extra

- See additional stories from Kube and from ISSSource linked below.



No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Sensor-to-cloud interoperability; PID and digital control efficiency; Alarm management system design; Automotive industry advances
Make Big Data and Industrial Internet of Things work for you, 2017 Engineers' Choice Finalists, Avoid control design pitfalls, Managing IIoT processes
Engineering Leaders Under 40; System integration improving packaging operation; Process sensing; PID velocity; Cybersecurity and functional safety
This article collection contains several articles on the Industrial Internet of Things (IIoT) and how it is transforming manufacturing.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

SCADA at the junction, Managing risk through maintenance, Moving at the speed of data
Flexible offshore fire protection; Big Data's impact on operations; Bridging the skills gap; Identifying security risks
The digital oilfield: Utilizing Big Data can yield big savings; Virtualization a real solution; Tracking SIS performance
click me