What have we learned since Stuxnet – when it comes to control system cyber security not much

For SCADASec

Fifteen years ago, I wrote the blog – “Malicious vs unintentional cyber incidents – why it is necessary to include unintentional incidents” This blog was written weeks before Stuxnet and its impact on control systems and centrifuge damage were made public. Stuxnet demonstrated that cyberattacks could be made to look like equipment malfunctions and therefore go unidentified as cyber-related. Control system field devices have neither cyber forensics nor cybersecurity training sufficient to identify control system incidents as being cyber-related. Monitoring OT networks does not provide this information. Not only are we missing identifying unintentional control system incidents as being cyber-related, but we are also missing identifying control system cyberattacks as being cyber-related. What have we learned since Stuxnet? When it comes to control system cybersecurity, not much.

https://www.controlglobal.com/blogs/unfettered/blog/55308599/the-hidden-threats-in-control-system-cybersecurity-lessons-from-stuxnet

http://www.realtimeacs.com

Control Systems Cybersecurity Expert, Joseph M. Weiss, is an international authority on cybersecurity, control systems and system security. Weiss weighs in on cybersecurity, science and technology, security emerging threats and more.