Industrial control systems (ICS) security is an important concern for businesses in today’s world. Kaspersky Lab is well aware of this fact. It observed as much in its “The State of Industrial Cybersecurity 2018” report when three-quarters of respondents affirmed ICS security to be a top concern for their organization.
But the Russian security firm found that many organizations weren’t taking appropriate action to address this anxiety. For instance, it noted how less than a quarter (23 percent) of survey participants were compliant with minimal mandatory industry or government guidance and regulations pertaining to ICS cybersecurity. It also discovered that 10 percent of organizations still do not measure the number of incidents and breaches they experience.
These findings highlight how organizations need to do more to strengthen their ICS security. One of the best ways to do this is by no longer implementing piecemeal security measures to protect their industrial control systems. With the ongoing IT-OT convergence, industrial environments are now too complex for such an ad hoc approach. Instead, organizations should structure all of their efforts to secure their industrial control systems within the context of a formal ICS security program.
What Is an ICS Security Program?
An ICS security program is a plan that helps organizations protect their ICS technologies. Such a program should reflect the complexity of modern industrial environments if it is to be effective. As such, organizations should follow FireEye’s guidance and make sure their program takes both IT and OT assets into consideration.
Of course, an ICS cybersecurity program is not a static plan. Just as the threats themselves are constantly changing, organizations need to review and update their plans to reflect their security needs in light of new operations, regulations and changing business requirements. Only then can they hope to (Read more...)
*** This is a Security Bloggers Network syndicated blog from The State of Security authored by David Bisson. Read the original post at: https://www.tripwire.com/state-of-security/ics-security/build-effective-ics-security-program/

