Attain and Maintain Operational Technology Cyber Security

What would happen, if there was a tiny "logic mistake" at a refinery during a cyber attack?

Imagine the following: There is overpressure in the tank. One small mistake accounts for an emergency shutdown system to not to close the valve. The mistake being one inverted logic gate while bypassing the DCS control system by opening a mechanical valve and not letting the operator know.

The most likely scenario? No one will notice until it is too late.

Bohemia Market CZ's cyber security handbook is a set of guidelines on how to operate operation technology (OT) systems in a cyber secure manner. CEO Petr Roupec explains this risk-based approach to evaluating assets in his white paper 'Never Touch a Running System: Attaining and Maintaining Operational Technology Cyber Security.' In the white paper he will also explain:

  1. Why IT department's rules do not apply to cyber security as they are
  2. How OT subsystems' roles contribute to process safety and availability
  3. The standards that apply to OT cyber security
  4. How to keep the existing OT systems safe against cyber threats
  5. Who or what is the largest cyber security risk

Download