Cybersecurity for Industrial Control Systems Image

Cybersecurity for Industrial Control Systems

Purchase

The paradigm shift brought forth by the Industrial Internet of Things (IIoT) is significantly enhancing the capabilities of Industrial Control Systems (ICS) across multiple verticals from critical infrastructure, automotive and manufacturing to water and wastage, oil and gas, even nuclear power facilities. However, industrial verticals that traditionally have been sheltered from internet connectivity are now finding themselves exposed to IP-borne attacks. Additionally, a new generation of cyber-threats is aiming to not only cause disruption or severely impair processes but also to siphon intelligence and trade secrets, infect large scale or remote facilities, proliferate to partners systems, and destroy critical ICS components threating human lives and causing billions in damage.

This report delves into the elusive ICS cybersecurity market and offers technology-specific insights spanning multiple components such as Programmable Logic Controllers (PLC), Human Machine Interfaces (HMI), and SCADA (Supervisory Control and Data Acquisition). The report provides market data, segmentation, and insights about the ICS market (e.g., OT asset management, IT security integration, threat intelligence, cryptographic processes) and examines the IT versus OT challenge, and analyzes cyber-threats related to specific industrial aspects (e.g., communication protocols like DNP3 and Modbus, ICS equipment and system vulnerabilities). Additionally, this report offers an extended list of strategic recommendations categorized into six major clusters:

1) Infrastructure (e.g., demilitarized zones, legacy equipment, and encryption)

2) Visibility (e.g., network, lifecycle management, IT security)

3) Vigilance (e.g., traffic monitoring, data filtering)

4) Authorization (e.g., MFA and identity)

5) Intelligence (e.g., machine learning, automation, and artificial intelligence)

6) Expertise (e.g., training recommendations for implementers)

Table of Contents

Table of Contents

  • 1. EXECUTIVE SUMMARY
  • 2. TACKLING CYBERSECURITY IN ICS
    • 2.1. The Evolution of ICS Cyberthreats
    • 2.2. Causes, Market Shifts, and Challenges of ICS Cybersecurity
    • 2.3. Justaposing IT and OT
    • 2.4. Market Sizing for ICS Cybersecurity
  • 3. ASSESSING THE CYBERSECURITY THRESHOLD OF ICS COMPONENTS
    • 3.1. Dismantling ICS
    • 3.2. Supervisory Control and Data Acquisition
    • 3.3. Programmable Logic Controllers
    • 3.4. RTU, MODBUS, and DNP3 Vulnerabilities
    • 3.5. HMI, Process Control, and Visualization
  • 4. STRATEGIC RECOMMENDATIONS
    • 4.1. Infrastructure
    • 4.2. Visibility
    • 4.3. Vigilance
    • 4.4. Authorization
    • 4.5. Intelligence
    • 4.6. Expertise
  • 5. COMPANY PROFILES
    • 5.1. ABB
    • 5.2. Dragos
    • 5.3. CyberX
    • 5.4. Forescout
    • 5.5. Honeywell
    • 5.6. Phoenix Contact
    • 5.7. Veracity Industrial Networks
    • 5.8. SCADAfence
    • 5.9. Schneider Electric
    • 5.10. Sentryo
    • 5.11. Siemens
    • 5.12. Sierra Wireless
    • 5.13. Xage Security