ICS cybersecurity Archives - Emerson Automation Experts - Emerson Automation Experts

Posts Tagged ‘ICS cybersecurity’

The Industrial Cyber Threat Landscape

Posted in Cyber-Security on Tuesday, July 30th, 2019. No comments yet
Tags: , , ,

At the 2019 Ovation Users’ Group conference, Dragos CEO Robert M. Lee provided an update on the cyber threats facing manufacturers and producers. Emerson and Dragos yesterday announced an agreement, Emerson Selects Dragos to Collaborate on Cybersecurity Protection for Power and Water Industries. The news: Emerson and Dragos, Inc., developer of the Dragos Platform for […]

Collaboration for Cybersecurity Resiliency and Robustness

Posted in Cyber-Security on Thursday, November 1st, 2018. No comments yet
Tags: , , , ,

Maintaining robust defenses from cyber-attacks is a priority for manufacturers. They rely on their automation suppliers to provide security-hardened technologies and cybersecurity services to help defend against new attacks and maintain resiliency and robustness over time. One key element in robustness is quickly finding, fixing and distributing patches for newly discovered vulnerabilities. Industrial control systems […]

Practical Tips for System Security

Posted in Cyber-Security on Wednesday, August 1st, 2018. No comments yet
Tags: , , ,

Emerson’s Nick Janouskovec shared his practical tips for attaining and managing Ovation system security at the 2018 Ovation Users’ Group Conference. With so many different standards, regulations, technologies and approaches to cybersecurity, it can be challenging to figure out what you really need. Developing a security program that truly secures your control system, meets your […]

Power and Water Cybersecurity Suite Modules

Posted in Cyber-Security on Tuesday, July 31st, 2018. No comments yet
Tags: , , , ,

At the 2018 Ovation Users’ Group Conference, Emerson’s Jose Pablo Bonilla and Levi Crosier described the different components of the Power and Water Cybersecurity Suite (PWCS). This presentation included providing users with guidance for configuring their systems, identifying custom reports & dashboards along with establishing a cadence for performing routine security tasks effectively & efficiently. […]

Cybersecurity Worst Practices: The Good-the Bad-the Ugly

Posted in Cyber-Security on Tuesday, July 31st, 2018. No comments yet
Tags: , ,

At the 2018 Ovation Users’ Group Conference, Emerson’s David Foose shared examples of bad practices in securing control systems. Dave opened describing how the focus on control system security over the past decade has changed from bothersome to imperative. The five stages of cyber grief include denial, frustration, bargaining, burn out and finally acceptance. Burn […]