SCADA

2012 SCADA and Industrial Control Systems Security Workshop

 

Toronto, ON

November 19-20, 2012

 

SCADAhacker Speaker:

Joel Langill

Monday November 19, 2012

13:00 - 13:45

 

 

 

Process Automation Systems: How Secure Is Secure Enough?

Article from: Control Global, October 2012

In this article, Walt Boyes discusses where to draw the line when applying security to your industrial control system. He begins by looking at the evolution of security in ICS and how to move forward in a practical and realistic manner.

SCADA Security Issues – A Virtual Panel Discussion

Article from: EngineerIT, September 2012

EngineerIT invited a group of experts representing a number of companies to contribute to a virtual panel discussion on security issues in supervisory control and data acquisition (SCADA) systems, including a debate around the Air Gap principle.

Cyber Espionage comes to Automation and SCADA

Article from: A&D Magazine, www.AuD24.net (originally published in German)

In this article Eric Byres discusses how SCADA and industrial control systems are vulnerable to cyber attacks, such as Stuxnet and Stuxnet's children.

This vulnerability is unavoidable due to the fact that modern industry depends on electronic information from the outside world to operate. Find out about Eric's suggestions for mitigating this risk.

Information Security Solutions Europe (ISSE) 2010

Berlin, Germany

October 5-7, 2010

 

Tofino Security speaker:

Scott Howard, Technical Sales Manager

 

Topic: SCADA and Control System Security: New Standards Protecting Old Technology

 

Date: Wednesday, October 6, 2010

Time: 16:30 - 18:00

Session: Track 1

 

Media Coverage following the release of the Tofino OPC Enforcer firewall

New Tofino® OPC Enforcer technology secures any system using classic OPC, the world’s most widely used industrial integration protocol.

Security breakthrough for OPC-based industrial automation

New Tofino® OPC Enforcer technology secures any system using classic OPC, the world’s most widely used industrial integration protocol....

Security breakthrough for OPC-based industrial automation

News coverage following the release of the Tofino OPC Enforcer.

Canvassing the cyber security landscape: Why energy companies need to pay attention

Recent news of a “highly sophisticated and targeted” cyber attack on Google, Yahoo, and perhaps on as many as a dozen other companies has once again brought the issue of cyber security to the top of the news.   The Journey of Energy Security dives into some of the energy industries historical background and outlines some of the key vulnerabilities, threats and risks that energy industry faces.

ABB Automation & Power World 2010

Houston, Texas
May 18 - 20, 2010

Tofino Security speaker:
Eric Byres, CTO

Topic: WCS-186-1 Tricks for making remote access to SCADA systems both easy and secure
Date: May 19, 2010

TOP 5 IN 2010: Automation technologies to watch for

Automationmag.com asked five industry experts to name the top five technologies and trends that will impact Canadian and worldwide manufacturers in 2010 and beyond.

New Tofino® Event Logger module reliably records SCADA security events and alarms

Tofino Security is announcing the introduction of the new Tofino® Event Logger Loadable Security Module as part of the Tofino Industrial Security Solution....

Byres Security teams with Juniper Networks to secure SCADA with Tofino® solution

The Tofino Industrial Security group at Byres Security Inc. has teamed with Juniper Networks, Inc. to demonstrate how the emerging IF-MAP* standard from the Trusted Computing Group (TCG) can secure vulnerable SCADA systems....

 

FULL RELEASE

Cyber security for pipeline control systems

Article in: Pipeline & Gas Journal, February 2009

Eric Byres, CTO of Tofino Security, has published an article about cyber security and pipeline control systems in Pipeline and Gas Journal.....

CYBER SECURITY AND THE PIPELINE CONTROL SYSTEM

Estimating a System's Mean Time-to-Compromise

Article in: IEEE Security & Privacy, January/February 2008

The ability to efficiently compare differing security solutions for effectiveness is often considered lacking from a management perspective. To address this we propose a framework for estimating the mean time-to-compromise (MTTC) of a target system for use as a comparative security metric. This MTTC is calculated through a three step process.

First a topological map of the target system is divided into attack zones, allowing each zone to be described with its own state-space model (SSM).

Forget the Silos, Build the Bridge

Article in: InTech Magazine, December 2007

Over the past 10 years, the industrial controls (IC) world has borrowed substantially from the world of information technologies (IT)...

Eric Byres, Jim Bauhs, and Brian Mason; "Forget the Silos, Build the Bridge", InTech Magazine, December 2007

Wolves at the Door(s) of the House of Straw

Article in: CONTROL Magazine, December 2007

We will probably never know how the Slammer worm made it into this facility, but the fact is that once the worm was on the inside, it found a very soft target and really could begin to do its worst...

Eric Byres; "Wolves at the Door(s) of the House of Straw", CONTROL Magazine, December 2007

Making Cyber Security Work in the Refinery

Article in: InTech Magazine, October 2007

Anyone reading InTech over the last five years will have seen many articles on the need to secure control systems from cyber attack. Nearly all include descriptions of actual security incidents that will concern even the most hardened control specialist...

Eric Byres; "Making Cyber Security Work in the Refinery", InTech Magazine, October 2007

The Special Needs of SCADA/PCN Firewalls: Architectures and Test Results

E.J. Byres, B. Chauvin, D. Hoffman, J. Karsch and N. Kube; “The Special Needs of SCADA/PCN Firewalls: Architectures and Test Results”, The 11th IEEE International Conference on Emerging Technologies and Factory Automation, Institute of Electrical and Electronics Engineers, Catania Italy, September 2005

Industrial Cybersecurity For Power System And SCADA Networks

E.J. Byres and A. Creery; “Industrial Cybersecurity For Power System And SCADA Networks”, Proceedings of the IEEE Petroleum and Chemical Industries Conference, Institute of Electrical and Electronics Engineers, Denver, September 200

Pages

Subscribe to RSS - SCADA