ICS Cyber Convergence

Monitor asset performance in real-time with new widgets available with Industrial Defender ASM version 6.2

The Industrial Defender ASM has always been more than an event monitoring platform. Now there’s one more reason why this technology is rapidly becoming the de facto solution to monitor, manage and protect ICS assets.

Asset Trends offers operational end-users a new set of widgets to track and trend asset performance. This investigative tools can be used to review a specific set of asset details for a finite span of time. When comparing trends it’s easy to identify anomalies and under-performing asset(s). Further analysis can be done to review the resources on the under-performing asset by spinning up a widget with settings set to compare I/O, memory and disk usage. These widgets display continuous, analog information in both a graph and table format over a selectable time interval using menus of metric categories and associated metric names for display. There are four standard widgets available: CPU usage, memory usage, disk usage and networking.

Read more

Today we are proud to announce that the latest release of the Industrial Defender Automation Systems Manager™ (ASM), version 6.2, is available! Our dedicated product team works along-side existing end-users to continually improve functionality and develop advanced capabilities within this single, unified platform. The Industrial Defender ASM is specifically designed and purpose built to assist asset owners in the task of ensuring the safe and reliable operations of industrial control systems (ICS). 

The 6.2 release addresses features that will assist cybersecurity, compliance and change management requirements for ICS enviornments. The latest version expands ICS operational management capabilities with a new, highly customizable module that tracks ICS asset performance indicators. Additionally ASM v6.2 delivers features and enhancements to assist customers in meeting the rapidly approaching NERC CIP v5 April 2016 start date. The ASM continues to win customers and has become the de-facto standard for operational technology (OT) cybersecurity by automating many of the manual processes required to secure global critical infrastructure operational assets.

Read more

If you aren’t using firewalls right now,
get up and go get some!”

Last month at the Schneider Electric TEC user conference, our Industrial Control System (ICS) expert, Mike Dugent, presented a session entitled: ICS Cybersecurity, Lessons from the Field. In it, he told a crowd of ICS engineers and executives, what they already knew; that they must move up the cybersecurity maturity curve to defeat the advanced persistent threats (APT) targeting their organizations’ critical infrastructure assets. The audience was a who’s-who of leading oil and gas companies, power producers, pipeline operators and others, and they nodded as Mike recognized the challenge these companies face to “catch up” with other industries to mature their cybersecurity posture.

Read more

Last month we sponsored the webcast “Diving deeper into the details of nuclear power security”, hosted by Intelligent Utility. The webcast features two speakers, well-respected within the nuclear energy community, William Gross, Sr. Project Manager, Engineering, Nuclear Energy Institute, and Matt Gibson, Senior Technical Leader, Plant Technology Nuclear Sector, EPRI. This blog will concentrate on William Gross’s piece in the webcast, focusing on Design Basis Threats, the first step in the NRC Cyber Security Framework.

Read more

The Gartner Security & Risk Management Summit held in National Harbor, MD in June fostered a lot of great conversations. As one of the most important gatherings of the IT security and risk community, it was the ideal venue for discussing the ever-evolving threat landscape and ways to stay ahead of the adversary.

Lockheed Martin took the opportunity to engage with attendees on the show floor about ongoing cyber trends and current challenges facing their organizations.

Recent 2015 Ponemon surveys on Intelligence Driven Cyber Defense and Risk & Innovation in Cybersecurity Investments paint a consistent picture across all industries:

  1. Leadership is engaged in the cybersecurity conversation more than ever
  2. Cyber budgets are increasing
  3. Adversaries are relentless

Below are some of the results from the survey we conducted.

Read more

We had the pleasure of sponsoring the webcast “Cybersecurity and Infrastructure Protection: What You Need to Know to Keep Your Hydro Facility Safe”, hosted by Hydro Review. The webcast features four authoritative speakers including Dr. Smart Ocholi, Andrew Dressel, John Holbrook, and Matthew Neely. This blog reviews content discussed during John Holbrook’s portion of the webcast on how to integrate cybersecurity using a Physical Security Perimeter.

Read more

Arguably one of the most important aspects of cybersecurity is Threat Intelligence. Yet despite its importance, this particular discipline as part of a solid security posture is often underestimated in terms of importance.

Read more

Recently, cybersecurity firm Darktrace announced an $18 million investment to hire new information security specialists in an effort to expand globally. According to Upstart Business Journal this investment represents a cash infusion in a woman-led cybersecurity company with a history of hiring female IT specialists. The result of this major infusion, according to the online journal, could “pave the way for a more equally representative industry.”

Read more

Ever get the feeling that your business-as-usual (BAU) mentality might get you into trouble? If you do and you’re in cybersecurity, you’re not alone. This feeling is not without good cause; organizations are not prepared to deal with severe and frequent cyber-attacks.

Read more

Advanced Persistent Threat (APT), as a term, is perhaps over-used in cybersecurity. Like the Boogie-Man that strikes fear into the minds and hearts of children at night, APTs work just as hard to ensure that CISOs and CIOs never rest easily. But just like the Boogie-Man, the trick to not being afraid of APTs is to understand them. Unfortunately, understanding APTs isn’t as simple as a bed time story.

Read more