The cyber security assessment methodology ControlGlobal.com
Although there is no silver bullet tool or technique for securing all
your control systems, pursuing a comprehensive security program that
is constantly monitored, updated and reviewed by third parties will
keep you as secure as possible. Check out the methodology behind cyber
security and assess your network's intrusion protection/detection plan.
Security White Papers
Distributed firewall for SCADA and industrial networks ControlGlobal.com The sensitive nature of PLC and DCS devices requires a higher level
of network segmentation and advanced defense solutions. This "special
to the web" White Paper defines the problem and introduces a new
approach to distributing a firewall throughout your SCADA and industrial
OPC consideration for network security Automation.com When IT becomes involved in real-time control system security, misunderstanding about operation needs can leave the system either unsecured or non-functional.
Find out how to keep your plant assets protected.
Insidious threats to control systems ISA.org The move to open standards is letting hackers take advantage of the
control industry's ignorance. This article, by secure systems specialists
Eric Byres and Justin Lowe, provides information about the kinds of
threats and vulnerabilities you may experience, and steps you can
take to secure your industrial SCADA and process systems.
Embedded virus protection for Windows-based control systems ControlGlobal.com While effective virus protection is just one element in an overall
automation system security strategy, users can be confident that
their Windows-based workstations will be well-protected against both
incoming and outgoing viruses.
VoIP security workshop for industry PFIDC.com This technology and policy workshop, sponsored by the Cyber Security
Industry Alliance, will address Voice Over Internet Protocol for
industries using broadband cable, wireless and wireline systems.
June 1-2, Washington, D.C.
Webinar: Windows security (DCOM) configuration for OPC MatrikonOPC.com
This online workshop will explain the limitations of DCOM when working
with OPC applications and will show you how to get around the DCOM
security problem altogether by using alternate technologies. To be
broadcast May 26.
SCADA Security Blog DigitalBond.com News and opinion on best practices, future trends, security standards, vendor offerings, and all other issues related to SCADA security.
Process Control Security Requirements Forum ISD.MEL.NIST.gov This site is a resource for users, vendors, and third parties in the
process control industry who are concerned about information security
in an increasingly networked world.
SCADA security training courses InfoSecInstitute.com This web site offers training courses to SCADA system managers,
administrators and analysts in a position to manage their company's
SCADA cyber security programs.