Loading…
Attending this event?
Welcome to the Interactive Agenda for SecurityWeek’s 2017 ICS Cyber Security Conference! (View the full conference website here)  

This agenda is currently a work in progress and not yet complete, please check back often as our team is making upates and adding sessions DAILY. (You can register for the conference here)
View analytic
Wednesday, October 25 • TBA
Performing ICS Cybersecurity Risk Assessments Across Multiple Plant Sites

Sign up or log in to save this to your schedule and see who's attending!

Industrial control systems (ICS) cybersecurity programs within manufacturing companies typically involve multiple plant sites spread out geographically. Most involve different processes and product variants. Vulnerability and gap assessments of plant sites (usually a sampling of the plants) are conducted to determine the overall risk profile of each plant, prioritize recommendations, and develop a risk mitigation roadmap. The program management team aggregates the results across multiple plants and develops an implementation plan. Some of the challenges they face are a) resolving differences in the risk profile of each plant (stemming from vulnerabilities and threats unique to the automation platform, production processes, network architecture and engineering, operation and maintenance requirements), b) consolidating best practices and recommendations that apply across multiple plants (considered as quick wins), and c) weighing the benefit of implementing recommendations that are relatively less complex versus the risks they mitigate. Therefore, assessments across multiple plant sites must focus on delivering a consistent view of the vulnerabilities, threats and recommendations based on a common risk analysis methodology and framework. This presentation highlights the requirements for consistency of the risk assessment process, methodology and reporting structure and offers guidelines for performing ICS cybersecurity assessments across multiple plant sites. A risk based framework to align vulnerabilities, threats and consequences will be presented. Learnings from recent risk assessment projects including field level best practices (e.g., alerting on access to remote I/O cabinets), dos and don’ts of DMZ architecture, network segmentation (configuring VLANs with ACLs), securing change management protocols (external key lock, multifactor) will be referenced throughout the presentation.   

Speakers
KS

Krish Sridhar

Krish is a subject matter expert on cybersecurity solutions applied to industrial control systems. He has over 20 years of industry experience with process automation, high availability architectures, industrial networks and application software. Krish has executed many cybersec... Read More →


Wednesday October 25, 2017 TBA
TBA