Cybersecurity for Industrial Control Systems

Price: Starting at USD 3,000
Publish Date: 17 May 2019
Code: AN-2484
Research Type: Research Report
Pages: 44
Cybersecurity for Industrial Control Systems

The paradigm shift brought forth by the Industrial Internet of Things (IIoT) is significantly enhancing the capabilities of Industrial Control Systems (ICS) across multiple verticals from critical infrastructure, automotive and manufacturing to water and wastage, oil and gas, even nuclear power facilities. However, industrial verticals that traditionally have been sheltered from internet connectivity are now finding themselves exposed to IP-borne attacks. Additionally, a new generation of cyber-threats is aiming to not only cause disruption or severely impair processes but also to siphon intelligence and trade secrets, infect large scale or remote facilities, proliferate to partners systems, and destroy critical ICS components threating human lives and causing billions in damage.

This report delves into the elusive ICS cybersecurity market and offers technology-specific insights spanning multiple components such as Programmable Logic Controllers (PLC), Human Machine Interfaces (HMI), and SCADA (Supervisory Control and Data Acquisition). The report provides market data, segmentation, and insights about the ICS market (e.g., OT asset management, IT security integration, threat intelligence, cryptographic processes) and examines the IT versus OT challenge, and analyzes cyber-threats related to specific industrial aspects (e.g., communication protocols like DNP3 and Modbus, ICS equipment and system vulnerabilities). Additionally, this report offers an extended list of strategic recommendations categorized into six major clusters:

1) Infrastructure (e.g., demilitarized zones, legacy equipment, and encryption)

2) Visibility (e.g., network, lifecycle management, IT security)

3) Vigilance (e.g., traffic monitoring, data filtering)

4) Authorization (e.g., MFA and identity)

5) Intelligence (e.g., machine learning, automation, and artificial intelligence)

6) Expertise (e.g., training recommendations for implementers)