Wednesday, December 11, 2019
  • The Old Authorized Third-Party Payment Processor Gambit, Eh?
  • Top 5 Cybersecurity Trends to Prepare for in 2020
  • DEF CON 27, Social Engineering Village, Micah Zenko’s ‘Red Teaming Insights And Examples From Beyond’
  • Five Identity and Access Management Predictions for 2020 and Beyond
  • Product Update: Sucuri Firewall in Sophia

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming
    • On-Demand
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network 

Home » Security Bloggers Network » ICS Security: The European Perspective

ICS Security: The European Perspective

by Tripwire Guest Authors on August 12, 2018

ICS security is concerned with securing and safeguarding industrial control systems, keeping processes and machinery running smoothly, and ensuring that the information and data shown on the control room dashboards and screens are accurate. Like every system that is networked to the Internet, ICS must be properly secured.

The problem is that ICS security is often overlooked because it is tied to mission-critical systems and infrastructure. As such, disruptions are often avoided, which includes taking these systems down for security updates. This gives rise to the problem of having an ICS that is out-of-date, unpatched, and vulnerable to attacks, which in turn raises a growing number and a wider variety of threats and vulnerabilities for ICS security.

Existing capabilities have proven insufficient to ensure a high level of ICS security. Different states have very different levels of preparedness, which has led to fragmented approaches against ever-increasing threats. Additionally, the lack of common security requirements makes it impossible to set up a global and effective mechanism for transnational and international cooperation.

The criticality and importance of these infrastructures to the stability and economy of states make them centers of gravity, as Clausewitz defined in his book On War. You can only imagine the impact of a disrupted electrical grid in major cities or the health issues that could arise from a contaminated water grid in Paris or Los Angeles. One word can describe it in full: chaos. It is therefore imperative that ICS security is not only an inter-organizational issue but rather a state and international priority.

A European Perspective on ICS Security

As such, many states and international organizations have developed national strategies and policies, like the United States’ NIST 800-82 and OECD’s Digital Security Risk Management for Economic and Social Prosperity.

On 10 May 2018, the enacted the Network (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tripwire Guest Authors. Read the original post at: https://www.tripwire.com/state-of-security/ics-security/ics-security-the-european-perspective/

August 12, 2018August 12, 2018 Tripwire Guest Authors Europe, ICS, ICS Security, Secuirty
  • ← Book Review: "How Great Science Fiction Works,” by Gary K. Wolfe, Course Review by Rick Howard
  • Multi-Cloud Security Best Practices Guide →
Featured Blog

Enzoic

Automate Password Policy & NIST Password Guidelines

Enzoic

Enzoic Customer Profile: IDShield

Enzoic

Old vs. New Methods for Employee Password Hardening

Enzoic

Shop Safely This Cyber Monday

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

Most Read on the Boulevard

The Role of Technology in the Modern SOC
Lack of Mobile Strategy Creates Security Holes
Predictions 2020: Data Security Next Year and Beyond
AWS Previews Cloud Security Advances
Trend Micro Looks to the Cloud for Security
Amazon Battles Leaky S3 Buckets with a New Security Tool
Going After the Good Guys: The Government’s Ransomware Identity Crisis
Ransomware at Colorado IT Provider Affects 100+ Dental Offices
Social Engineers are No Match for Artificial Intelligence
United States Of American National Pearl Harbor Remembrance Day

Upcoming Webinars

There are no upcoming webinars at this time.

Download Free eBook

The Next Generation of Application Security

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

Predictions 2020: Data Security Next Year and Beyond
Cybersecurity Data Security Industry Spotlight Security Boulevard (Original) 

Predictions 2020: Data Security Next Year and Beyond

December 10, 2019 Ameesh Divatia | Yesterday 0
The Role of Technology in the Modern SOC
Cybersecurity Incident Response Industry Spotlight Security Boulevard (Original) 

The Role of Technology in the Modern SOC

December 9, 2019 Jason Mical | 2 days ago 0
Learning From Health Care’s IoT Security Strategy
Cybersecurity Industry Spotlight IoT & ICS Security Security Boulevard (Original) 

Learning From Health Care’s IoT Security Strategy

December 6, 2019 Mike Nelson | Dec 06 0

Top Stories

Apple Passive-Aggressive PR Sparks Privacy Fear (Yet Again)
Cybersecurity Endpoint Featured Mobile Security News Security Boulevard (Original) Spotlight Threats & Breaches 

Apple Passive-Aggressive PR Sparks Privacy Fear (Yet Again)

December 6, 2019 Richi Jennings | Dec 06 0
StrandHogg Pwns 80% of Android Phones; Google Fiddles While Platform Burns
Cybersecurity Data Security Featured Malware Mobile Security News Security Awareness Security Boulevard (Original) Spotlight 

StrandHogg Pwns 80% of Android Phones; Google Fiddles While Platform Burns

December 3, 2019 Richi Jennings | Dec 03 0
TrueDialog Leaks 600GB of Personal Data, Affecting Millions
Cloud Security Cybersecurity Data Security Featured Governance, Risk & Compliance News Security Boulevard (Original) Spotlight 

TrueDialog Leaks 600GB of Personal Data, Affecting Millions

December 2, 2019 Richi Jennings | Dec 02 0

Security Humor

via    the comic delivery system monikered  Randall Munroe  at   XKCD  !

XKCD, Flu Shot

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2019 MediaOps Inc. All rights reserved.
Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.