Industrial Automation: Cyber Security makes a difference!

We read about cyber incidents and data breaches almost daily in the newspaper, and the number of cyber attacks on companies with industrial processes is increasing. Marcel Jutte (Hudson Cybertec) and Jacco van der Kolk (Ministry of Economics affairs) have outlined the problems using practical examples at the Industrial Cyber Security event. They also offered insights on how entrepreneurs can improve their digital resilience. Hudson Cybertec can look back on a very successful event with attentive listeners.

Presentation FHI 2019

Source: Dimitri Reijerman

Online consumers should always be alert. More media reports on wrongdoings are published, including cybercrime, resulting in increased awareness. Businesses have also become more open about cyber security in recent years, except about themselves, says Van der Kolk, working at the Digital Trust Center of the Ministry of Economic Affairs: A taboo still exists on admitting cyber incidents. Despite legislation, which includes a duty of care for the vital infrastructure, organizations were noticeably reluctant to report cyber incidents.

Jutte adds: “It is still not normal procedure for companies to publish this. Somehow a brand incident is dealt with differently than a cyber incident. Yet precisely through sharing information, the entire industry sector can learn from these incidents. If an OT-device gets infected at company A, the same can happen at company B, you can learn from each other. We do understand that it might cause reputational damage. Unfortunately, The question is not whether you will be hit, but when you will be hit by a cyber incident. It is important to take the correct precautions right now.“

Vulnerability of OT-systems

In addition to the vulnerability of IT-systems, found in almost every company, hardware and software on the OT side is increasingly becoming a risk factor within Industrial Automation. Van der Kolk: “Systems within the OT where autonomous systems for years, separated from the regular IT-systems and definitely not connected to the internet. Some systems have been running for decades and were not designed with security in mind, but mainly with business continuity. Social and economic developments have led to increased connectivity. Increasingly more OT-systems are accessible via the internet. This seems practical for operators to quickly check settings from home. But is this done securely?”

“The question is not whether you will be hit but when you will be hit”

Not only existing, relatively old OT-systems are vulnerable, so are some new components. According to Jutte thought should be given to new systems as well: “Even now, components are put on the market that are not cyber-secure. This will continue due to companies still choosing to use them consciously or unconsciously. They should be more aware of the risks involved with the use of technology.” Jutte adds: “There are ongoing (inter)national initiatives that will oblige suppliers to support updates for a number of years to their products. Several (European) initiatives exist to introduce a seal of approval for cyber security. Certification of components and parts of the installation on cyber security aspects is very important and more organizations will start demanding proof of cyber security.”

Increase the resilience

During the Industrial Cyber Security event, both presented visitors with several options on improving resilience of their OT-systems. Jutte gave direction to what a plan of action might look like: “Globally, you need to think about possible actions before an incident occurs and what actions to take during and after an incident. A general lack of awareness of cyber risks and the possible consequences is common. Knowing what is important in your company is a good to start with awareness. Then ensuring safety through backups, firewalls, good passwords, agreements with the system integrator and the most important thing: ensure that your staff members are aware and create a culture where they feel they can report if something is wrong. This ‘human firewall’ is an important line of defense for your company against cyber incidents and attacks.”

Van der Kolk has some additional tips: “Having a baseline measurement or assessment of cyber security is a good option to start with. The outcome indicates which parts of the installation are vulnerable to digital incidents.”

Role for the government

Van der Kolk also sees a role for the government, through the Digital Trust Center (DTC) for example. “Besides legislation the government has also taken on the task of helping companies with the organization of information sharing and collaboration on this topic. The DTC has experience on this and supports partnerships in the Netherlands in which companies collaborate on resilience. Additionally, both the government and private parties are involved with national and EU legislation on the quality of digital products and services.”

“There is a program running, the digital hard- and software roadmap, in which the customers’ side is informed, but suppliers and producers will also be held accountable for their responsibility. The government also stimulates scientific research into cyber security by various means. This is initiated from the Ministry of Economic Affairs with the intention of creating a safe environment that allows entrepreneurial Netherlands to further develop itself.”

In the spotlight

Monitoring your OT environment is essential. You know what is happening on your network and see to what extent you are compliant with various cyber security standards and laws and regulations.

IEC 62443 Standard

The IEC 62443 standard offers your organization tools to improve the digital security and safety of your IACS environment. Implementation of the standard improves the cybersecurity level of your organization's OT / ICS / SCADA environment.

The IEC 62443 is the international cybersecurity standards framework for operational technology (OT). The framework consists of a collection of standards, technical reports and related information for securing Industrial Automation and Control Systems (IACS).

read more

Hudson Cybertec’s IEC 62443 Competence Center has extensive experience with this standard. We play an active role in the development of the standard, actively promote it internationally and have developed a training program around the IEC 62443.

read more

It is becoming increasingly important for organizations to be able to demonstrate that the digital security of the OT environment is in accordance with standards frameworks. It is therefore possible to certify (parts of) your IACS environment according to IEC 62443.

read more

If you want to know more about this standard and need training on how to apply it within your own organization or at your clients, Hudson Cybertec has a number of very interesting training courses for you.

read more

The IEC 62443 standard provides organizations with tools to improve the digital security and safety of OT / ICS / SCADA environments.

read more

How digitally safe is your organization?

Curious about the possibilities? Please contact us!

Contact us

Newsletter

Sign up for our newsletter. We will keep you posted on the latest developments in our cybersecurity services.

  • This field is for validation purposes and should be left unchanged.