What's Ahead for ICS Cyber Security in 2017

Jan 23, 2017 | Dana Tamir
Dana Tamir
ICS CYBER SECURITY PREDICTIONS

The new year is only a couple of weeks old, and there have already been several ICS related security incidents in the news.

 

A new malware targeting ICS technologies will emerge in the near future and will target proprietary engineering protocols to alter the way PLCs and other industrial controllers work. If it is released uncontrolled in the wild it could impact a wide array of industries and critical infrastructures since they all use equipment from the same small set of vendors.

The new year is only a couple of weeks old and there have already been several ICS related security incidents in the news. The media often sensationalizes these incidents. This is creating hype and growing worldwide awareness and concern over the threat of cyber attacks against industrial and critical physical infrastructures. 2017 will likely be the year in which ICS security becomes a mainstream media topic.

Here’s a preview as to why this is happening:

A new malware targeting ICS technologies will emerge in the near future and will target proprietary engineering protocols to alter the way PLCs and other industrial controllers work. If it is released uncontrolled in the wild it could impact a wide array of industries and critical infrastructures since they all use equipment from the same small set of vendors. The knowledge and capabilities required to create this type of malware has existed for some time now. The only reason it hasn’t happened yet is due to concerns over the potential physical and political implications of creating such a devastating attack tool.

To find out what else is ahead for ICS cyber security in 2017, please see the full column by our CEO, Barak Perelman. 

You can read the full column here http://www.securityweek.com/whats-ahead-ics-cyber-security-2017

 

Relevant Pages

icon_benefits

Device Integrity

Learn More

icon_benefits

Industrial Cybersecurity Suite

Learn More

icon_benefits

IT Security Managers

Learn More

icon_benefits

OT Engineers

Learn More

icon_benefits

Checklist Guide

Learn More

Comments (0)

You can unsubscribe from these communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy