Archive for July, 2012

What Is Control System Cybersecurity and What Are the Appropriate Metrics?

In preparation for the October ICS Control System Cybersecurity Conference, I had a meeting with a utility and a major ICS supplier to initiate a project to secure legacy control systems for reliability (not NERC CIP compliance) considerations. The fir…

What is control system cyber security and what are the appropriate metrics?

In preparation for the October ICS Control System Cyber Security Conference, I had a meeting with a utility and a major ICS supplier to initiate a project to secure legacy control systems for reliability (not NERC CIP compliance) considerations. The fi…

DNA Analyzers can also be cyber vulnerable

I attended a High Tech Crime Task Force meeting where we were given a tour of the high tech crime lab. One of the locations on the tour was the DNA lab. There were several DNA analyzers which are available 24/7. Effectively, the DNA analyzer is a chemi…

Have You Read Our July 2012 Magazine Digital Edition?

Don’t miss the content-rich July issue of Control.  Our cover story "Process Automation Jobs: Help Wanted" tells you how to take advantage of the job boom in the process automation industries.read more

12th ICS Cyber Security Conference Draft Agenda (Selected Topics)

Pre-Conference Tutorials- "SCADA for Dummies" – This is a two-hour session to introduce control systems and control system protocols to the non-control system user. Specific examples are provided from different industries.- "IT for Dummi…