(CS)²AI Webinar – ICS Cyber Security – Build It In or Bolt it On? – June 2021
Legacy industrial control systems (ICS), including distributed control systems, programmable logic controllers, and supervisory control and data acquisition systems, were engineered using cyber technologies and tools from as far back as the 1970s and 1980s. These industrial control systems are now up against rogue actors and nations armed with cyber weapons that are orders of magnitude more capable than those older technologies. Typical cyberattack vectors of legacy platforms, as identified by ISA99 committee standards research, include message flooding, eavesdropping, message spoofing, message alteration, message replay, malformed messages, server profiling, session hijacking, rogue servers, module counterfeiting, and compromised user credentials. The purpose of these attacks is to achieve remote control, operational disruption, or theft of intellectual property. All ICS modules that compute process control logic, including but not limited to sensors, actuators, I/O, control, power, communication, application, and workstation modules are vulnerable, with varying consequences to the safety of personnel and security of the infrastructure.
In this webinar, Albert Rooyakkers, Bedrock Automation Founder, CEO, CTO explains why protecting these critical legacy systems requires more than bolted-on cybersecurity countermeasures.