Industroyer/CrashOverride malware and the WannaCrypt/WannaCry ransomware are having their immediate effects across industry right now. 'Both help us recognize that sophisticated attackers are constantly building new capabilities to work around security controls to disrupt and damage industrial systems and hold critical operations hostage. 'Don't miss your opportunity to learn what you can do to prepare and better-protect your ICS from these and other cybersecurity threats.
Another key target for cyberattackers is corporate intellectual property. In fact, according to the Verizon DBIR, cyber-espionage is by far the most predominant attack vector in the manufacturing sector -- and trade secrets are the #1 data type breached in manufacturing companies.'sensitive details about proprietary manufacturing processes, product formulas, and engineering designs can often be inferred from HMIs, data historians, and PLC ladder logic. 'In this case, the cyber-adversaries include nation-states and competitors intent on improving their competitive edge, as well as cybercriminal organizations seeking to sell corporate secrets to the highest bidder.
While regular patching is undisputably good advice for IT networks -- as in the WannaCry example -- it's not always that easy for critical infrastructure environments that run 24x7 and rely on legacy systems that have been running without interruption for years.'these systems are also more likely to be vulnerable to non-targeted "nuisance" threats that disrupt day-to-day operations, such as the the 2016 malware infestation at the Gundremmingen nuclear plant. 'Additional threat vectors include single issue activists that target energy, pharmaceutical, chemical, and food production companies (such as eco-hacktivists and GMO activists).
In this educational webcast, we'll explore how to: