Drives and Control Solutions

Motors, Control Solutions, Power Transmission and Advanced Motion Technology                                                                 

November 20, 2018

Leading industrial cybersecurity officials from government and private industry gathered in Houston on Monday, October 29, to discuss new ways of countering the rising threats of cyberattack in the energy sector.

"Using the Power of Analytics to Address Cyber Security" was a half-day workshop sponsored by the International Society of Automation (ISA) and its Premier Strategic Partner in Industrial Cybersecurity, Siemens. The workshop was held prior to ISA's PCS 2018-Process Industry Event, a technical conference for professionals in the energy processing and process manufacturing industries.

During the workshop, featured experts reported that the rapid pace of digital technology and the increasing sophistication of cyber tools at the disposal of foreign entities are making it more difficult to protect critical infrastructure and the industrial control systems that operate them. However, they said advances in security analytics and machine learning are improving detection and threat assessment, and enabling more proactive and responsive defense measures.

Owners and operators of energy infrastructure also are recognizing the real threats to their businesses that cyberattacks pose and are more willing to invest in cybersecurity solutions-such as best-practice standards and in-house or outsourced security operations-and hire a qualified cybersecurity work force.

The workshop was kicked off by Leo Simonovich, Vice President and Global Head of Industrial Cyber and Digital Security at Siemens. Simonovich set the stage by explaining digital technology and the cyber world in general are evolving too fast for government and private industry to fully keep pace.

Companies must take the lead, he said, "and data analytics are the key." Armed with these tools, companies can "own their environment" by significantly improving detection when an operation system is being attacked and implement effective risk mitigation efforts. "Context and speed," according to Simonovich, are the two necessary ingredients needed to identify and thwart a cyberattack.

Providing a vital perspective from the US government was Bob Kolasky, Director of the National Risk Management Center for the US Department of Homeland Security. Kolasky outlined the federal government's functional approach to risk management in protecting the nation's critical infrastructure. He reinforced the point that data analytics and data aggregation are critical in order to better anticipate and evaluate possible threats.

Kolasky reported that while many nations in the world do not pose a significant military threat to the US, they often do present threats from the cyber realm. He said that while some of these nation states are not currently attacking US domestic infrastructure, they are conducting attacks throughout the world and could, at some point, turn their attention to the US.

Because of the public/private nature of US infrastructure, Kolasky said it's important to implement consistent cybersecurity standards and practices across public and private sectors. To further these efforts, he said the US government is incentivizing R&D and cybersecurity investment. He emphasized the importance of greater engagement among private companies in cybersecurity as solutions cannot come solely from government.

Kolasky agreed that data and security analytics hold great promise in identifying those risks that require greater and more immediate levels of response and connecting patterns and instances of vulnerability.

Sean Plankey, Global Cyber Intelligence Advisor at BP, urged more companies to take a more active approach to cybersecurity given the risks cyberwarfare presents to business operations. He said he is constantly gathering intelligence and scanning the external environment to identify and evaluate potential threats.

He is particularly focused on the operations side, where continuous processes may be affected by an attack. He agreed with Kolasky that cyberattacks differ in their ability to cause actual damage and impact business operations. By defining threats in a hierarchical manner, a business can establish a baseline.

This "baseline" concept was a recurring theme at the workshop. Given the number and types of cyberattack, it's difficult for cybersecurity systems to engage them all. Plankey said for a security system to be effective, it must work from a baseline so it can accurately distinguish viable threats from non-viable ones. Plankey said one factor to determine is whether the attack is levied by individuals acting alone or through state sponsorship. State-sponsored actors, he noted, are much more capable of executing a potentially damaging intrusion. 

Ernesto Ballesteros, the State Cybersecurity Coordinator for Texas, said he focuses his efforts largely on information sharing and analysis because his mandate extends beyond government facilities and systems. "We're trying to secure the state as a whole," he explains.

To combat the shortage of workers trained in cybersecurity, Ballesteros said Texas encourages students through scholarships, and supports workforce development programs and apprenticeships so staff can gain vital skills on the job.

Matt Stewart, Head of Research and Development for Industrial Cyber Security at Siemens, highlighted Siemens' advanced security monitoring solutions. He acknowledged that many companies don't have the resources to staff a dedicated Security Operation Center (SOC) and said it can be more efficient to outsource data analysis.

Siemens, he pointed out, can extract data on potential threats at a customer facility and then rapidly get the metadata analysis in front of Siemens' cyber experts. Stewart explained that Siemens uses an industrial security product to monitor traffic on the customer networks, looking for anomalies. Using machine learning, the system monitors all network traffic, defines what is "normal" operation based on millions of transactions, then continues to seek out and flag any abnormal activity.

Siemens technology, he said, can also distinguish between activity that is simply "different" from normal, and that which could be considered dangerous. Potentially harmful activity is either acted upon by the software, or circulated up to an expert, on-call team at Siemens that can evaluate and counter high-level threats.

Source

 

Latest Articles

  • Prev
  The way we generate power has been undergoing a radical shift over the last few years ...
  Trash compactors are one way that we can improve the environment by reducing the volume ...
  Robots are an integral part of the manufacturing industry worldwide to the extent ...
  The Ontario government has concluded a successful trade mission to South Korea and ...
  ABB and Hydrogen Optimized Inc. (HOI), the Canadian technology innovator unlocking ...
  What’s the secret to providing superior service and staying competitive in a changing ...
  When the Swiss engineering company Peter Huber AG won the order to upgrade and ...
  IEC 62061 / EN IEC 62061 represents a sector-specific standard under IEC 61508. ...
  NSK is a global manufacturer of ball and roller bearings, precision linear motion and ...
  World leaders from government and industry will meet in the southern Denmark city of ...

DCS Festo Didactic at the Forefront of Developing Canadas Future Workforce 1 400x275

With Canadian manufacturing suffering from a growing labour shortage, the participation of industry in skills development is emerging as a vital component in hiring and retention.

The needs are stark: The Canadian Exporters and Manufacturers Association says almost 40% of its members have jobs they can’t fill. Five years from now, 60% expect to be short-staffed, especially when it comes to skilled trades. Statistics Canada forecasts the country’s labour force growth rate will remain below 0.2% for the rest of the decade, below replacement levels.

This growing shortage is affecting companies of all sizes. Already, some manufacturers acknowledge losing out on contracts because they can’t find the manpower to fulfill them.

In reality, the challenge is two-fold: to replenish and expand the workforce to help close the gap between the number of job seekers and vacancies through 2030 when the last baby boomers reach age 65, and ensure workers get opportunities throughout their careers to upgrade or add to their skillset as current technologies evolve and new ones emerge. Festo, through Festo Didactic, one of the world leading provider of equipment and solutions for technical education, intends to help Canada meet this challenge on both fronts. In essence, the approach Festo has always taken is that the learning never stops.

 

Read more here


 

Product News

  • Prev
  When working with industrial pumping, such as crop irrigation or wastewater ...
  Littelfuse, Inc. has announced the new C&K Switches NanoT product line, a series ...
  VFD cables are a critical component to extend a motor’s life cycle within a VFD ...
  AutomationDirect has added new models of Dold safety relays to their line of safety ...
  AutomationDirect has added more low-cost ProSense float level switches. The new ...
  AutomationDirect has added new cable entry system options to their Murrplastik ...
   Emerson recently introduced the ASCO™ Series 209 proportional flow control ...
  Omron Automation Americas will introduce two new AOI systems at IPC Apex 2023 in San ...
  Teledyne FLIR Integrated Imaging Solutions is pleased to announce the all new ...
  ABB’s Sensi+ analyzer offers a reliable new solution which simplifies and reduces the ...

New Product

DCS New Emerson Valves Deliver Proportional Flow Control Performance 1 400x275

Emerson recently introduced the ASCO™ Series 209 proportional flow control valves, which offer the highest standards of precision, pressure ratings, flow characteristics and energy efficiency available in a purpose-built, compact architecture. With this combination of size and performance, Series 209 valves allow users to precisely regulate the flow of fluid in a wide range of devices that require exacting performance, like those found in the medical equipment, food and beverage, and heating, ventilation and air conditioning (HVAC) industries. 

Accuracy, response time and repeatability are critical in high-precision flow control applications, such as controlling tool speed in dental chairs, the flow of steam in coffee makers, water flow in cooling systems and hydrogen flow in fuel cells. Series 209 valves have low hysteresis (less than or equal to 5%), excellent repeatability (less than or equal to 1%) and high sensitivity (less than or equal to 0.2%) that contribute to their precision. 


To find out more, click here


 


Featured Product

DCS Teledyne Announces New Ladybug6 Cameras for High Accuracy 1 400x275 

Teledyne FLIR Integrated Imaging Solutions is pleased to announce the all new Ladybug6— the latest addition to its field proven Ladybug series. Ladybug6 is the leading high-resolution camera designed to capture 360-degree spherical images from moving platforms in all-weather conditions. Its industrial grade design and out-of-the-box factory calibration produces 72 Megapixel (MP) images with pixel values that are spatially accurate within +/- 2 mm at 10-meter distance.

“The new Teledyne Ladybug6 is designed for mobile mapping and all-weather inspection projects requiring excellent image quality and high resolution,” said Mike Lee, Senior Product Manager at Teledyne FLIR. “With the addition of Ladybug6, we are now pleased to offer a wider variety of spherical cameras with higher resolutions ranging from 30 MP to 72 MP.”

 

To learn more, click here


 


538 Elizabeth Street, Midland,Ontario, Canada L4R2A3 +1 705 527 7666
©2025 All rights reserved

Use of this Site constitutes acceptance of our Privacy Policy (effective 1.1.2016)
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Kerrwil