Tag Archives: SCADA

Stop Attacks and Disasters Across IT, OT and Physical Assets with Security Software


This entry was posted by on .

Attacks and Disasters Happen Across all Verticals, and They Often Cross IT, OT, and Physical Infrastructure. So How Does it Make Sense to Have a Security Strategy that Only Protects IT?

Below are a few examples of attacks and disasters that happened across IT, Operational Technology (OT), and Physical Assets across many different verticals. Most of these are recent, but one of them was 30-years ago and most people still remember it.

substation_attack_acrosss_Physical_Assets_AlertEnterprise_security_Software

Electrical Substation

The attack began just before 1 am on April 16 last year, when someone slipped into an underground vault not far from a busy freeway and cut telephone cables not far from San Jose, CA. Within 1/2 hour, snipers opened fire on an outlying electrical substation. Shooting for 19 minutes, they surgically knocked out 17 giant transformers that funnel power to a nearby metropolis. A minute before police arrived, the shooters disappeared into the night. Power disruption was avoided by rerouting power from other stations, but the station remained closed for 27 days for repairs. Other Utilities Substations that have experienced trouble are: Melbourne, Australia, Scarborough, Ontario and Warren, Minnesota to name a few. read more

Security Software That Stops Threats Across IT, OT and Physical Assets


This entry was posted by on .

“Attacks and disasters don’t happen in technology silos, they happen across IT, OT, and Physical Assets.”
—Jasvir Gill
Founder and CEO, Alert Enterprise!
Former Founder and CEO of Virsa Systems (Acquired by SAP)

security_software_that_stops_physical_threats

 AlertEnterprise is utilized by energy, oil and gas, airports, federal, chemical, enterprise  customers and more. We are recognized by top industry analysts as a technology innovator because our software uniquely detects, mitigates, and in many cases stops threats and disasters across IT, OT, and Physical Assets. read more

Integrating Physical and Logical Security, Why Is It So Hard?


This entry was posted by on .
Integrating_Physical_and_Logical Security_Across_IT_OT_and SCADA

One of the most common mistakes in the view of integrating physical and IT security is not recognizing how a company’s charter impacts security in the company.

For example, take the charter of a software company.

What is the charter of a Software Development Company?

In a software development company programmers develop software that the company sells. This is the core function of the organization, and aligns with the company charter. The software development group will have a variety of tools used in software development, such as development interfaces, test and development servers, and other tools to help build products for the company. read more

ICS Security Convergence: Don’t Miss the Big Picture, Onsite Conference


This entry was posted by on .

Reality…our critical infrastructure environments are becoming more interconnected while our security efforts continue to be disconnected and function within organizational / technology silos. Truth is that current and emerging threat actors don’t attack in silos. In this sharing and discussion session, we’ll talk about how the convergence of physical security, enterprise IT and SCADA event data can help your organization do more with less.

ICS_Joint_working_group_Don't_miss_the_big_picture

Main topics include:
 Example scenarios that outline how threat actors attack all three silos and where individual events may be authentic, but when correlated, are not reflective of authorized activity.
 How technology can be leveraged to actively enforce policies instead of just monitoring then reporting on violations
 Getting away from the 3 ring binder approach to incident management and how having automated and manual response mechanisms allow organizations to effectively respond and remediate.
 Discuss and give example of actionable and focused threat intelligence using existing data feeds and OSINT
 Show how a security foundation that includes physical, IT and SCADA allows for efficient compliance and enables real security
 Know who is accessing your critical devices: Contextual data around the behaviors, incidents and overall access footprint of your privileged users
Real world examples, stories and techniques demonstrated during the session make this presentation standout. Presenter’s experience from all sides of security in ICS (attacker, defender, policy maker, auditor) provides a unique point of view on implementing effective security while not impacting operations. read more

Identity Management Across IT and OT


This entry was posted by on .

Identity management is managing the identities or controlling the user access based on the identities created with access level. The Access level can be a Group in PACS, Roles IT Systems or any application. This application may be an Enterprise level application and cloud-based service Application. Identity life cycle management and data can be discussed at Several levels but in this article we focused on the identity in user management perspective across IT/OT systems.

identity_management_across_IT_and_OT

Managing Applications which grow in size (Numbers of people and applications) are tedious whether it’s in the cloud or enterprise/legacy applications in terms of Userid Management. In common terms identity management refers to managing of the life cycle of an account or Userid. read more