Importance of ICS Patch Management

ICS Patch Management: Case Studies on Schneider and GE Digital

The purpose of an ICS patch management program aims to ensure that ICS is secured and executed by testing, implementing, and deploying trusted patches. This approach helps in ensuring that the industrial control system is updated and is defended against cyber threat actors and malicious operators. It is applicable for all ICS software and hardware elements in both Operational Technology (OT) and Information Technology (IT).

Coffee Break Sessions: Join the ATS Webinar

Coffee Break Sessions: Join the ATS Webinar On Cisco’s Latest OT Cyber Security eBook

ATS is pleased to announce our upcoming webinar, the first in our ATS Coffee Break Sessions Series, in partnership with Cisco, where we will discuss the threat landscape in today’s industrial cyber security today.

ICS/IoT security is the central topic of Cisco’s new eBook, “Industrial Cybersecurity: Monitoring & Anomaly Detection”, which discusses:

Cyber security lessons from oldsmar water plant hack

CYBERSECURITY LESSONS: WHAT WE LEARNED FROM THE OLDSMAR WATER PLANT HACK

Cyber attacks on small municipal systems and infrastructures have been increasing in the past year, and this is a serious concern as it involves the lives of the people that these public systems serve. Earlier this year, cyber attackers accessed a water treatment plant in Oldsmar, Florida and warnings were out of sight.

CONNECTED IOT: HOW TO SECURE IOT DEVICES IN THE COMPANY?

IoT (INTERNET OF THINGS) devices were created in 1999. Since then, companies are continuously adding more and more IoT devices in their workspace as these devices make work a lot easier and faster. IoT devices are constantly upgrading with new features. The toaster is considered the first IoT device introduced in the market. And now there are thousands of IoT devices present in the market, for example, air quality sensors, Wi-fi typewriters, smart tennis rackets, etc.

ATS_art2_cover

INDUSTRIAL CYBER SECURITY: CASE HISTORY ON THE TRITON ATTACK – THE WORLD’S MOST DANGEROUS MALWARE

As the world’s largest industrial complexes undergo digitization efforts, and as the Industrial Internet of Things (IIoT) becomes integrated into processes of oversight, management, operation and production, the number of potential threats to this new way of business also rises. We wrote about some of the reasons to increase your cyber security in our previous article.