• NEWS
  • INDUSTRY SPOTLIGHT
  • SECURITY BLOGGERS NETWORK
    • ANALYTICS
    • APPSEC
    • CISO
    • CLOUD
    • DEVOPS
    • GRC
    • IDENTITY
    • IDENTITY RESPONSE
    • IOT / ICS
    • THREAT / BREACHES
    • MORE
      • BLOCKCHAIN / DIGITAL CURRENCIES
      • CAREERS
      • CYBERLAW
      • HUMOR
      • MOBILE SECURITY
      • SOCIAL ENGINEERING
  • CHATS
  • LIBRARY
  • WEBINARS
© 2020 · MediaOps Inc. All rights reserved.View Non-AMP Version
  • Homepage
  • Security Bloggers Network

Choosing the Right Industrial Cybersecurity Framework

It’s no surprise that industrial environments have become increasingly valuable targets to malicious behavior. The State of Security has featured many cybersecurity events in the recent past across a myriad of industrial verticals including but not limited to chemical manufacturing, transportation, power generation and petrochemical. Several of these industries mentioned have taken great strides in improving their defense posture, mostly thanks to governmental regulatory compliance requirements.

Most organizations with industrial control systems (ICS) fall into one of two categories: regulated and non-regulated. For those subject to governmentally imposed regulatory requirements, the selection of a cybersecurity framework is obviously compelling. Please continue reading through the remainder of the article. For those who aren’t subject to regulatory requirements, feel free to skip over the next section titled “Regulated Approach” and start back up at “General Approach.” If you’re not subject to any regulatory requirements, this following section “Regulatory Approach” could still be of interest, especially if 1) your industry is moving in this direction in the near future or 2) you’d like to better understand how your regulated counterparts have been measuring the state of their security posture.

Regulated Approach

I’m not one to praise the government in its efforts to impose requirements on businesses, but in this case, it’s had a rather impressive positive effect. I’m of course alluding to North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) and Nuclear Energy Institute (NEI) 08-09 requirements, which have undergone many changes over the past decade to become what they are now. These specialized requirements have been tailored to for the electric utility and nuclear power generation sectors, respectively. If you’re subject to these very requirements (or several of the other lesser known requirements out there), you know that they can be burdensome but are of (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Robert Landavazo. Read the original post at: https://www.tripwire.com/state-of-security/ics-security/choosing-industrial-cybersecurity-framework/

Tags: _NERCAWWAICS SecurityNIST
2 years ago
Robert Landavazo

Related Post

  • NIST Publishes Privacy Framework

    The National Institute of Standards and Technology, an arm of the U.S. Department of Commerce,…

  • Predictions 2020: IoT and Digital Transformation

    Here are DigiCert's predictions for cybersecurity in 2020, including those around digital transformation and IoT.…

  • Security Threats Are Swamping IT

    Spiraling costs and a lack of skilled cybersecurity professionals are putting pressure on IT teams—and…

Recent Posts

  • Press Releases

NewDay Scores with TigerGraph Cloud to Fight Financial Fraud

Leading UK Credit Card Consumer Finance Company Uses Advanced Graph Analytics to Intercept Fraudulent Credit Card Applications, Boost Anti-Fraud Efforts…

46 mins ago
  • Press Releases
  • Press Releases

VMRay Closes $25 Million Series B

Digital+ Partners Leads Continuation Funding Round in Growing Automated Threat Analysis & Detection Provider, Closing its Series B Round at…

3 hours ago
  • Security Bloggers Network

The Hacker Mind Podcast: Hacking OpenWRT

For three years OpenWRT had a severe validation problem with its download package manager, until a fuzz tester found and…

3 hours ago
  • Data Security
  • Security Bloggers Network

Goodbye to Flash – if you’re still running it, uninstall Flash Player now

It’s time to say a final “Goodbye” to Flash. (Or should that be “Good riddance”?) With earlier this week seeing…

3 hours ago
  • Network Security
  • Security Bloggers Network

Being a Defender

1. Be a student of (information security, network security, cyber security). Always strive to know what the latest tactics, trends,…

4 hours ago
  • Security Bloggers Network

Smart DNS: Delivering the Best Subscriber Experience

This is the second in a series of blog posts that discuss how smart DNS resolvers can enhance ongoing network…

4 hours ago
  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement
© 2020 · MediaOps Inc. All rights reserved.View Non-AMP Version
  • t