Cyber-physical Vulnerabilities: New Threats and Impacts

October is National Cybersecurity Awareness Month (NCSAM). The annual collaborative effort between government and industry aims to raise awareness about the importance of cybersecurity and ensure all have the resource to be safe and secure.

Led by the United States’ Cybersecurity and Infrastructure Security Agency (CISA) and the National Cyber Security Alliance (NCSA), this year’s theme—Do your part. #BeCyberSmart— encourages individuals and organizations to own their role in protecting their part of cyberspace, stressing personal accountability, and the importance of taking proactive steps to enhance cybersecurity. At Mission Secure, cybersecurity is what we do. In support of NCSAM 2020, we’ve put together short “Interview Bytes” to discuss cybersecurity from an operational technology (OT) and industrial control system (ICS) perspective.


Interview Bytes | Week 3: Securing Internet-connected Devices.



“It’s not just malicious; it’s financial. If these places can take your plant down, all of a sudden, the price of oil goes up.”

The downside of our internet-connected world is massive disruption from cyber-attacks. Case in point, criminal charges were recently brought against six Russian military intelligence officers for their role in the NotPetya malware attack. With an estimated $10 billion in total damages, NotPetya impacted shipping, trade, and commerce around the world and is considered one of the most destructive cyber-attacks to date.

As operations across industries digitally transform, they leave critical operational technology (OT) networks exposed. In this segment, Ed Suhler, VP of Defense Services, and Mark Baggett, VP of Industrial Control Systems, share their insights into the new cyber threats facing today’s interconnected, cyber-physical systems and their potential impacts.

Question: What are the impacts of cyber threats today?

From a Defense Perspective | Ed Suhler, VP of Defense Services: The change that we’re seeing today is that we have to move beyond the implications (Read more...)

*** This is a Security Bloggers Network syndicated blog from The Mission Secure Blog authored by Mission Secure. Read the original post at: