Identifying control system cyber incidents requires expertise not readily available and government reporting changes

Identifying control system incidents as being cyber-related is difficult. It is complicated when government and industry organizations rush to judgment by stating that incidents weren’t cyberattacks without knowing the actual cause or setting reporting thresholds that exclude many actual control system cyber incidents. Consequently, it is difficult to identify trends when so many real cases are excluded. Control system cyber incidents have occurred in multiple sectors with similar causes and similar equipment, but there has been no “connecting the dots”. An interesting example is there have been at least two cyber-related Colonial Pipeline pipe ruptures though neither was identified as being cyber-related. Ironically, neither would be covered by the TSA cyber security requirements stemming from the Colonial Pipeline shutdown. The same can be said of control system cyber incidents in other sectors including water, power, and manufacturing. The training to recognize control system incidents as being cyber-related is missing.

https://www.controlglobal.com/blogs/unfettered/blog/55088324/identifying-control-system-cyber-incidents-requires-expertise-not-readily-available-and-government-reporting-changes

http://www.realtimeacs.com

Control Systems Cybersecurity Expert, Joseph M. Weiss, is an international authority on cybersecurity, control systems and system security. Weiss weighs in on cybersecurity, science and technology, security emerging threats and more.