October 8, 2015 By Dave McMillen 2 min read

Endangered Services

Those of us living in developed, industrialized nations may take many modern-day services for granted. Envision this typical end-of-workday scenario: You disembark from a train that arrived on schedule at your final destination. You flip a light switch to illuminate your home. You turn on the tap and clean water flows freely.

These types of ordinary events are expected to be delivered without any hiccups. Now, imagine a world where the delivery of sustained services is suddenly interrupted, increasing the industrial risk and putting your personal safety immediately at risk due to the lack of clean water, the disappearance of electrical power, the interruption of mass transit or even a nuclear meltdown. Suddenly, safety is much harder to achieve, and industrial risk becomes more of a concern.

Vulnerability of Critical Systems

In the last 25 years, big industry has slowly attached itself to the digital age, with the intent of making their production environments much more stable and efficient. Programmable logic controllers that allow authority of industrial equipment are now largely implemented across the globe and are used extensively in almost all industrial processes.

Computerizing these industrial control systems (ICS) has ultimately led to their being highly prized targets for many threat actors, largely because of the amount of damage that can be perpetrated and the resulting chaos that may follow. Stories of such sabotage are legion and frequently make the headlines.

Download the full report: Security Attacks on Industrial Control Systems

Mitigating Industrial Risk

That’s why mitigating the industrial risk to an ICS is increasingly the focus of government and private institutions around the world. Our post-industrial societies are reinventing themselves every single day. Advances in the delivery of power and water systems often go unnoticed by the consumer until a sudden blackout occurs or the tap stops running.

Companies that deliver life-sustaining utilities need to take full responsibility for protecting their own assets and their own consumers. There should be no exceptions, especially because the solution to keeping adversaries out of an ICS is implementation of simple safeguards and risk managers.

IBM’s latest research report, “Security Attacks on Industrial Control Systems,” takes a look at the history of ICS, the susceptibility of these systems to certain attacks and how the systems can be defended.

More from Risk Management

The current state of ransomware: Weaponizing disclosure rules and more

4 min read - As we near the end of 2024, ransomware remains a dominant and evolving threat against any organization. Cyber criminals are more sophisticated and creative than ever. They integrate new technologies, leverage geopolitical tensions and even use legal regulations to their advantage.What once seemed like a disruptive but relatively straightforward crime has evolved into a multi-layered, global challenge that continues to threaten businesses and governments alike.Let’s take a look at the state of ransomware today. We’ll focus on how cyber criminals…

Why do software vendors have such deep access into customer systems?

4 min read - To the naked eye, organizations are independent entities trying to make their individual mark on the world. But that was never the reality. Companies rely on other businesses to stay up and running. A grocery store needs its food suppliers; a tech company relies on the business making semiconductors and hardware. No one can go it alone.Today, the software supply chain interconnects companies across a wide range of industries. Software applications and operating systems depend on segments of the software…

How CTEM is providing better cybersecurity resilience for organizations

4 min read - Organizations today continuously face a number of fast-moving cyber threats that regularly challenge the effectiveness of their cybersecurity defenses. However, to keep pace, businesses need a proactive and adaptive approach to their security planning and execution.Cyber threat exposure management (CTEM) is an effective way to achieve this goal. It provides organizations with a reliable framework for identifying, assessing and mitigating new cyber risks as they materialize.The importance of developing cybersecurity resilienceRegardless of the industry, all organizations are subject to certain…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today