Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Partner Perspectives  Connecting marketers to our tech communities.
01:30 PM
Lorie Wigle
Lorie Wigle
Partner Perspectives

Securing Critical Infrastructure

Protecting the Industrial Internet of Things from cyberthreats is a national priority.

Industrial automation and control systems are increasingly online, sending out information and receiving commands from local and remote control centers and corporate data systems. Technologies in this Industrial Internet of Things (IIoT) have tremendous potential to improve operations, reduce costs, enhance safety, increase revenue, and transform industrial processes. We cannot let security concerns undermine this transformation; security should enable it.

The threat of cyberattacks on industrial and critical infrastructure targets is growing rapidly, according to a global survey on cybersecurity. Companies are demanding effective cybersecurity to assist them in protecting their assets and people. Industrial control systems and plant operations need to ensure increased availability, reliability, and safety. This requires tighter collaboration among manufacturers, security developers, and industrial process vendors to protect control systems from known and unknown malware and misuse.

Security for IIoT devices has some unique characteristics. Unlike general purpose PCs, the data IIoT devices transfer can be categorized and controlled to reduce the likelihood and impact of a security breach. The code and applications these devices are allowed to run can also be similarly controlled, so application whitelisting is a useful technique to restrict access to only authorized code.

However, these systems may be separated from the corporate network or connected only intermittently. This makes it challenging to install system patches or signature updates. Security systems must be able to operate in either connected, disconnected, or isolated environments, defending against known and unknown attacks without relying on frequent updates.

Policy Management And Enforcement Are Key

The volume of these devices means physically touching all of them within a short period of time is highly unrealistic. It also means that having to manage individual devices is similarly unrealistic. Policy management and enforcement tools are required to ensure that only authorized changes are made to devices, without having to operate or review them individually. Analytic tools and event correlation need to bring serious and severe events to the attention of security operations quickly, without drowning the operations center in an overwhelming flood of minor events.

Protecting our critical infrastructure and the emerging IIoT from cyberthreats is a national priority. Collaboration enables integrated and validated industrial process solutions that can be more rapidly deployed, without sacrificing safety or reliability. The productivity potential of industrial automation and control systems is important to the future viability of manufacturing industries. Adequately addressing security will ensure the manufacturing base of our economy is not put at risk.

Lorie Wigle is building a new business focused on securing critical infrastructure and IOT more broadly at Intel subsidiary McAfee. Lorie has been with Intel for nearly 30 years in a wide variety of marketing and technical roles. She has an MBA from Portland State University ... View Full Bio
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
6/30/2015 | 11:50:56 PM
No more minimizing
Even more disconcerting is the lackadaisical attitude government agencies have frequently taken in the face of successful IIoT attacks, or the downplaying of the seriousness of the attack.  I mean, I get that you don't want to overly alarm the public, but when a white-hat researcher can get into critical infrastructure ridiculously easily, that's kind of a big deal.
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-09-19
loop_rw_iter in fs/io_uring.c in the Linux kernel through 5.14.6 allows local users to gain privileges by using IORING_OP_PROVIDE_BUFFERS to trigger a free of a kernel buffer, as demonstrated by using /proc/<pid>/maps for exploitation.
PUBLISHED: 2021-09-19
All versions of package com.jsoniter:jsoniter are vulnerable to Deserialization of Untrusted Data via malicious JSON strings. This may lead to a Denial of Service, and in certain cases, code execution.
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows forgery of SSH host certificates in some situations.
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows alteration of build artifacts in some situations.
PUBLISHED: 2021-09-18
Teleport before 6.2.12 and 7.x before 7.1.1 allows attackers to control a database connection string, in some situations, via a crafted database name or username.