Cloud Computing

Defending industrial networks from cyber threats. The place do I begin?

Defending industrial operations from cyberthreats ought to at all times be prime of thoughts. Nonetheless, with operations networks being usually very advanced and cyber threats rising more and more extra refined, it may be tough to know the place to begin. Kam Chumley-Soltani just lately held a webinar outlining greatest practices to guard your industrial atmosphere from cyber threats. Kam is a Technical Options Architect in Cisco’s industrial IoT group, working with prospects on daily basis to assist them drive their OT safety tasks. Signal as much as watch the replay:  Defending industrial networks from cyber threats: The place do I begin?

Within the webinar, Kam recommends a stepped strategy in direction of a mature ICS/OT safety technique, implementing the next greatest practices:

1. See the whole lot in your industrial community

You’ll be able to’t safe what you don’t find out about. You want full visibility into your industrial community and OT safety posture, so you have got the data it’s essential to cut back the assault floor, section the commercial community, and implement cybersecurity insurance policies. Cisco Cyber Imaginative and prescient offers you real-time, detailed visibility into your industrial belongings, their communication patterns, and utility flows. It embeds visibility capabilities into industrial community tools, so there’s no want for devoted safety home equipment or to construct out-of-band SPAN assortment networks.

2. Phase the community into smaller belief zones

Community segmentation is essential to securing your community and defending vital industrial processes. It’s additionally a requirement of the ISA/IEC62443 safety requirements. Utilizing devoted safety home equipment for zone segmentation requires you to deploy further {hardware}, create and preserve firewall guidelines, and even change community wiring and IP addresses. You’ll be able to keep away from this additional value and complexity by extending software-based community segmentation insurance policies to industrial management networks. Cisco Id Providers Engine (ISE) works with community switches, routers, and wi-fi entry factors to limit communications as per the outlined zones. And it makes use of teams outlined in Cyber Imaginative and prescient to permit/deny communications for every asset and drives collaboration between IT and OT groups.

Be part of us for a webinar on October 31 for extra particulars on find out how to adjust to the ISA/IEC62443 safety requirements.

3. Safe distant entry to OT belongings

Distant entry is essential for operations groups, distributors, and contractors to configure, preserve, and troubleshoot OT belongings with out time-consuming and expensive visits. Nonetheless, many current distant entry options create safety backdoors or include many tradeoffs Cisco Safe Tools Entry (SEA) is fixing the challenges of deploying safe distant entry to operational belongings at scale and brings all the advantages of a zero belief community entry (ZTNA) resolution to industrial operations. There isn’t any devoted {hardware} to put in and handle and no advanced firewall guidelines to configure and preserve.

If you wish to be taught extra, be a part of us for a session on ZTNA on October 25 for IIoT World Cybersecurity Day

For extra particulars on find out how to get began together with your industrial safety journey, watch Kam’s webinar replay or come to the SecurityWeek ICS Cybersecurity Convention in Atlanta subsequent week, the place Anastasia Mills and Kam Chumley-Soltani will probably be presenting a breakout session on Wednesday, October 25 at 10:25 am PST.

ICS Cyber Security Conference - Registration

That is the most important and longest-running occasion sequence targeted on industrial cybersecurity. The convention attracts ICS stakeholders throughout a number of industries and a wide range of OT, IT, authorities, distributors, and extra. Ensure you cease by the Cisco Sales space #18 to debate additional and meet the staff.



Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button