Cyber-Security Archives - Emerson Automation Experts - Emerson Automation Experts

Archive for the ‘Cyber-Security’ Category

Energy Infrastructure and Cybersecurity

Posted in Cyber-Security on Tuesday, March 12th, 2019. No comments yet
Tags: , ,

It’s hard to talk about digital transformation without talking about cybersecurity. At CERAWeek 2019, Emerson’s Michael Lester joined a panel, Energy Infrastructure: How vulnerable to cyber attack? The panel opened with each panelist describing what got them into cybersecurity. Mike noted that the failure of the North East power grid that led to the NERC […]

Collaboration for Cybersecurity Resiliency and Robustness

Posted in Cyber-Security on Thursday, November 1st, 2018. No comments yet
Tags: , , , ,

Maintaining robust defenses from cyber-attacks is a priority for manufacturers. They rely on their automation suppliers to provide security-hardened technologies and cybersecurity services to help defend against new attacks and maintain resiliency and robustness over time. One key element in robustness is quickly finding, fixing and distributing patches for newly discovered vulnerabilities. Industrial control systems […]

Practical Tips for System Security

Posted in Cyber-Security on Wednesday, August 1st, 2018. No comments yet
Tags: , , ,

Emerson’s Nick Janouskovec shared his practical tips for attaining and managing Ovation system security at the 2018 Ovation Users’ Group Conference. With so many different standards, regulations, technologies and approaches to cybersecurity, it can be challenging to figure out what you really need. Developing a security program that truly secures your control system, meets your […]

Power and Water Cybersecurity Suite Modules

Posted in Cyber-Security on Tuesday, July 31st, 2018. No comments yet
Tags: , , , ,

At the 2018 Ovation Users’ Group Conference, Emerson’s Jose Pablo Bonilla and Levi Crosier described the different components of the Power and Water Cybersecurity Suite (PWCS). This presentation included providing users with guidance for configuring their systems, identifying custom reports & dashboards along with establishing a cadence for performing routine security tasks effectively & efficiently. […]

Cybersecurity Worst Practices: The Good-the Bad-the Ugly

Posted in Cyber-Security on Tuesday, July 31st, 2018. No comments yet
Tags: , ,

At the 2018 Ovation Users’ Group Conference, Emerson’s David Foose shared examples of bad practices in securing control systems. Dave opened describing how the focus on control system security over the past decade has changed from bothersome to imperative. The five stages of cyber grief include denial, frustration, bargaining, burn out and finally acceptance. Burn […]