October 8, 2015 By Dave McMillen 2 min read

Endangered Services

Those of us living in developed, industrialized nations may take many modern-day services for granted. Envision this typical end-of-workday scenario: You disembark from a train that arrived on schedule at your final destination. You flip a light switch to illuminate your home. You turn on the tap and clean water flows freely.

These types of ordinary events are expected to be delivered without any hiccups. Now, imagine a world where the delivery of sustained services is suddenly interrupted, increasing the industrial risk and putting your personal safety immediately at risk due to the lack of clean water, the disappearance of electrical power, the interruption of mass transit or even a nuclear meltdown. Suddenly, safety is much harder to achieve, and industrial risk becomes more of a concern.

Vulnerability of Critical Systems

In the last 25 years, big industry has slowly attached itself to the digital age, with the intent of making their production environments much more stable and efficient. Programmable logic controllers that allow authority of industrial equipment are now largely implemented across the globe and are used extensively in almost all industrial processes.

Computerizing these industrial control systems (ICS) has ultimately led to their being highly prized targets for many threat actors, largely because of the amount of damage that can be perpetrated and the resulting chaos that may follow. Stories of such sabotage are legion and frequently make the headlines.

Download the full report: Security Attacks on Industrial Control Systems

Mitigating Industrial Risk

That’s why mitigating the industrial risk to an ICS is increasingly the focus of government and private institutions around the world. Our post-industrial societies are reinventing themselves every single day. Advances in the delivery of power and water systems often go unnoticed by the consumer until a sudden blackout occurs or the tap stops running.

Companies that deliver life-sustaining utilities need to take full responsibility for protecting their own assets and their own consumers. There should be no exceptions, especially because the solution to keeping adversaries out of an ICS is implementation of simple safeguards and risk managers.

IBM’s latest research report, “Security Attacks on Industrial Control Systems,” takes a look at the history of ICS, the susceptibility of these systems to certain attacks and how the systems can be defended.

More from Risk Management

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

When you shouldn’t patch: Managing your risk factors

4 min read - Look at any article with advice about best practices for cybersecurity, and about third or fourth on that list, you’ll find something about applying patches and updates quickly and regularly. Patching for known vulnerabilities is about as standard as it gets for good cybersecurity hygiene, right up there with using multi-factor authentication and thinking before you click on links in emails from unknown senders.So imagine my surprise when attending Qualys QSC24 in San Diego to hear a number of conference…

CISOs drive the intersection between cyber maturity and business continuity

4 min read - The modern corporate landscape is marked by rapid digital change, heightened cybersecurity threats and an evolving regulatory environment. At the nexus of these pressures sits the chief information security officer (CISO), a role that has gained newfound influence and responsibility.The recent Deloitte Global Future of Cyber Survey underscores this shift, revealing that “being more cyber mature does not make organizations immune to threats; it makes them more resilient when they occur, enabling critical business continuity.” High-cyber-maturity organizations increasingly integrate cybersecurity…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today