ICS Design and Implementation

//ICS Design and Implementation

What’s Your Backup and Recovery Strategy?

By |2018-08-22T17:28:36+00:00August 22nd, 2018|ICS Cybersecurity, ICS Design and Implementation, Jim Gilsinn|

While reading the Wired article, titled The Untold Story of NotPetya, the Most Devastating Cyberattack in History, I thought a lot about backups. Backing up your data and systems in order to maintain critical services is a cornerstone of any disaster recovery program (DRP). I hadn’t realized how fast NotPetya spread through some organizations. From [...]

Comments Off on What’s Your Backup and Recovery Strategy?

Control System SIEM Implementation

By |2018-01-26T11:43:26+00:00August 30th, 2017|ICS Cybersecurity, ICS Design and Implementation, Jim Gilsinn, Jim McGlone|

Network appliances like firewalls and switches, have software (commonly referred to as firmware) on them that monitor and log security events. Unfortunately, the logs are rarely read by anyone. In fact, most people have never logged into their home router to look at the logs or change the administrator password. If the firmware was compromised, [...]

Comments Off on Control System SIEM Implementation