The Truth About Cybersecurity - 4

S P ON S ORE D BY

CYBERSECURITY

phishing (email) attacks, watering holes
and other social engineering, which cyber
criminals commonly use to prey upon an
unsuspecting workforce and gain access
to your networks. Malicious actors attempt
to entice employees into providing sensitive
personal or corporate information, such as
account passwords or details about your
infrastructure. To prevent these situations,
provide initial and recurring cybersecurity
training to your employees to help maintain
the security of the operation.
Once cyber-educated, your company must
have procedures in place for security across
your operations. Be aware of and adhere to
industry standards and best practices. Follow
respective vendors' documentation for systems
setup and configuration to ensure they are
as secure as possible. For example, ISA99/
IEC 62443 is a rigorous standard for industrial
automation technology. It works to safeguard
operations across multiple layers. Schneider
Electric has adopted a "defense in depth"
strategy to prevent or minimize cyberattacks.
This multipronged defense system adheres to
ISA99/IEC 62443 standards and involves the
creation of a multilayered and multi-technology
strategy to safeguard critical systems. The
defense-in-depth strategy is a holistic security
approach.
Next, take a close look at your technology.
Understand what assets are most vulnerable or
create the greatest risk in your business. Make
sure your assets build in the strongest cybersecurity features and meet stringent requirements for safety, cybersecurity, risk reduction
and continuous operation in your industry.
Safety Instrumented Systems should be compliant with the IEC 62443 standard and certified
by TÜV Rheinland for use in safety applications
up to Safety Integrity Level 3. They should also
be ISASecure® EDSA Level-1 certified, the
industry's leading cybersecurity certification
for control systems, safety systems and system
components. Assess and review your systems

SCHNEIDER ELECTRIC
www.schneider-electric.us/

to detect gaps and uncover any security
malpractices. Assess your staff's security
competencies with the equipment. Personnel
need to have a good understanding of the level
of protection within those assets, understand
where they may have potential gaps and have
a plan in place to address issues.
Conduct a thorough assessment of your
industrial control system, including the corporate enterprise segments. Many companies
have a range of technology from different
vendors and different eras. You need to be
aware of the integration of different systems
and the security implications. After completing
an inventory of your systems, machines and
software, you can eliminate any elements that
are not serving a purpose. Reducing your footprint will reduce your attack surface, making it
harder for malicious actors to find a vulnerability to exploit. It is important to manage the
risks when connecting any machine on an
industrial control system (ICS) to a machine
on a business network or to the internet. Even
though your ICS may not directly face the
internet, pathways may still exist. A persistent
cyber-threat actor can find these pathways
and use them to access and exploit systems
to cause a cyber incident. To reduce network
vulnerabilities, eliminate superfluous channels
between devices on the control system and
equipment on other networks. In short, plug
every hole by following best practices that
secure communication throughout your
organization.
Finally, understand that security is a
journey not a destination. Securing your digital
enterprise is a constant cycle. The strategic
planning, training, adherence to standards,
testing, and reviewing and refining procedures must be ongoing to continually defend
your business. Cybersecurity risk, as with all
risks, cannot be eliminated. Instead, it must be
continually managed. A proactive and robust
cybersecurity strategy will have more than just
a positive effect on your bottom line.

3

28%
"Only 28% of industrial
organizations use a
lifecycle approach to risk
management."

Peter Bussey,
Research Analyst
LNS Research

AUGUST 2018


https://www.schneider-electric.com/en/download/document/998-2095-05-05-14AR0_EN/ https://www.schneider-electric.com/en/download/document/998-2095-05-05-14AR0_EN/ https://www.schneider-electric.com/en/work/services/field-services/industrial-automation/industrial-cybersecurity/design-implementation.jsp http://www.schneider-electric.us/

Table of Contents for the Digital Edition of The Truth About Cybersecurity

The Truth About Cybersecurity - 1
The Truth About Cybersecurity - 2
The Truth About Cybersecurity - 3
The Truth About Cybersecurity - 4
The Truth About Cybersecurity - 5
The Truth About Cybersecurity - 6
https://www.nxtbook.com/atp/MaintenanceTechnology/efficient-plant-jan-feb-2024
https://www.nxtbook.com/atp/MaintenanceTechnology/efficient-plant-april-2022
https://www.nxtbook.com/atp/MaintenanceTechnology/efficient-plant-october-2021
https://www.nxtbook.com/atp/MaintenanceTechnology/efficient-plant-june-2021
https://www.nxtbook.com/atp/MaintenanceTechnology/epapril2021
https://www.nxtbook.com/atp/MaintenanceTechnology/epmarch2021
https://www.nxtbook.com/atp/MaintenanceTechnology/epjanfeb2021
https://www.nxtbook.com/atp/MaintenanceTechnology/epjulyaug2020
https://www.nxtbook.com/atp/MaintenanceTechnology/epjune2020
https://www.nxtbook.com/atp/MaintenanceTechnology/epmay2020
https://www.nxtbook.com/atp/MaintenanceTechnology/epapril2020
https://www.nxtbook.com/atp/MaintenanceTechnology/epmarch2020
https://www.nxtbook.com/atp/MaintenanceTechnology/epfeb2020
https://www.nxtbook.com/atp/MaintenanceTechnology/epjan2019
https://www.nxtbook.com/atp/MaintenanceTechnology/epnovdec2019
https://www.nxtbook.com/atp/MaintenanceTechnology/epseptoct2019
https://www.nxtbook.com/atp/MaintenanceTechnology/epmay2019
https://www.nxtbook.com/atp/MaintenanceTechnology/epapril2019
https://www.nxtbook.com/atp/MaintenanceTechnology/epmarch2019
https://www.nxtbook.com/atp/MaintenanceTechnology/epfebruary2019
https://www.nxtbook.com/atp/MaintenanceTechnology/epjanuary2019
https://www.nxtbook.com/atp/MaintenanceTechnology/epdecember2018
https://www.nxtbook.com/atp/MaintenanceTechnology/epnovember2018
https://www.nxtbook.com/atp/MaintenanceTechnology/epoctober2018
https://www.nxtbook.com/atp/MaintenanceTechnology/epseptember2019
https://www.nxtbook.com/atp/MaintenanceTechnology/epaugust2018
https://www.nxtbook.com/atp/MaintenanceTechnology/0818schneider
https://www.nxtbook.com/atp/MaintenanceTechnology/epjuly2018
https://www.nxtbook.com/atp/MaintenanceTechnology/epjune2018
https://www.nxtbook.com/atp/MaintenanceTechnology/epmay2018
https://www.nxtbook.com/atp/MaintenanceTechnology/epapril2018
https://www.nxtbook.com/atp/MaintenanceTechnology/epmarch2018
https://www.nxtbook.com/atp/MaintenanceTechnology/epfebruary2018
https://www.nxtbook.com/atp/MaintenanceTechnology/epjanuary2018
https://www.nxtbook.com/atp/MaintenanceTechnology/epdecember2017
https://www.nxtbook.com/atp/MaintenanceTechnology/epnovember2017
https://www.nxtbook.com/atp/MaintenanceTechnology/epoctober2017
https://www.nxtbook.com/atp/MaintenanceTechnology/mtsept2017
https://www.nxtbook.com/atp/MaintenanceTechnology/mtaugust2017
https://www.nxtbook.com/atp/MaintenanceTechnology/mtjuly2017
https://www.nxtbook.com/atp/MaintenanceTechnology/mtjune2017
https://www.nxtbook.com/atp/MaintenanceTechnology/mtmay2017
https://www.nxtbook.com/atp/MaintenanceTechnology/mtapril2017
https://www.nxtbook.com/atp/MaintenanceTechnology/mtmarch2017
https://www.nxtbook.com/atp/MaintenanceTechnology/mtfebruary2017
https://www.nxtbook.com/atp/MaintenanceTechnology/mtjanuary2017
https://www.nxtbook.com/atp/MaintenanceTechnology/mtdecember2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtnovember2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtoctober2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtseptember2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtaugust2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtjuly2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtjune2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtmay2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtapril2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtmarch2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtfebruary2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtjanuary2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtdecember2015
https://www.nxtbook.com/atp/MaintenanceTechnology/mtnovember2015
https://www.nxtbook.com/atp/MaintenanceTechnology/mtoctober2015
https://www.nxtbook.com/atp/MaintenanceTechnology/mtseptember2015
https://www.nxtbook.com/atp/MaintenanceTechnology/MTAugust2015
https://www.nxtbook.com/atp/MaintenanceTechnology/MTJuly2015
https://www.nxtbook.com/atp/MaintenanceTechnology/MTJune2015
https://www.nxtbook.com/atp/MaintenanceTechnology/M
https://www.nxtbook.com/atp/MaintenanceTechnology/0415endress
https://www.nxtbook.com/atp/MaintenanceTechnology/MTApril2015
https://www.nxtbook.com/atp/MaintenanceTechnology/MTMarch2015
https://www.nxtbook.com/atp/MaintenanceTechnology/MTFebruary2015
https://www.nxtbook.com/atp/MaintenanceTechnology/MTJanuary2015
https://www.nxtbook.com/atp/MaintenanceTechnology/MTDecember2014
https://www.nxtbook.com/atp/MaintenanceTechnology/MTNovember2014
https://www.nxtbook.com/atp/MaintenanceTechnology/MTOctober2014
https://www.nxtbook.com/atp/MaintenanceTechnology/MTSeptember2014
https://www.nxtbook.com/atp/MaintenanceTechnology/MTAugust2014
https://www.nxtbook.com/atp/MaintenanceTechnology/MTJuly2014
https://www.nxtbookmedia.com