Cyber Risk Leaders Magazine - Issue 3, 2020

Page 48

Cyber Security

Maintaining a resilient utility grid in the face of cyber attacks By Kevin Nesdale, General manager of Power Distribution, Eaton ANZ

T

he recent spate of malicious state-backed cyber activity directed at Australia has been a sobering reminder that without a resilient cyber security framework in place, all critical infrastructure is vulnerable. About 31% of industrial control systems have experienced a cybersecurity incident or an attempt in the past 12 months, a significant number of attempts are targeting commercial, industrial, utility and government networks, making virtually every system vulnerable. The recent attacks come as a reminder that cyber-attacks are here to stay and that certain measures must be implemented from the outset to ensure utilities are resilient in the event of a breach.

Cyber secure by design A resilient utility grid with a trustworthy cyber-network is required to mitigate the impacts induced by cyber-attacks. To eliminate the impacts of cyber-incidents, a three-phase Cyber Resiliency framework, including attack detection, response, and recovery is needed to couple cyber and physical layers along with advanced algorithms developed and implemented in each phase. As a critical element in the cyber-incident defense framework, post-contingency recovery, which belongs to the phase of attack mitigation,

48 | Australian Cyber Risk Leaders Cyber Security Magazine Magazine

acts as a last step in cyber-defense framework and plays a significant role of maintaining healthy and uninterrupted operation of modern distribution systems. Utilities should ensure that equipment purchased has cybersecurity principles included from the initial design phase. It is crucial to understand the difference in nature between IT systems and Industrial Controls for physical systems when it comes to security measures and data traffic. Cyber Resiliency Framework considers “Cybersecurity by Design� as a principle to operational technology (OT) defence mechanisms. An example of the difference is the nature of what we are protecting - for IT systems, customer data and organisational information is the main concern for cybersecurity. On the other hand, system operations and protection against equipment damage are the sole concern when cyber resiliency plays a significant role, to ensure system availability and fallback planning when a cyber incident occurs. Connected devices and the vast amounts of data they generate create opportunities and risks for organisations; from manufacturing and testing to installation and service, which dictates a secure development lifecycle applying a defence-in-depth approach to their field devices. Utilities need to work with equipment suppliers to ensure


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Book Review

11min
pages 50-54

NetFoundry and Fortress partnership and solutions

4min
pages 40-41

The outlook for SD-WAN in a post-COVID landscape

6min
pages 42-45

Maintaining a resilient utility grid in the face of cyber attacks

4min
pages 48-49

Don't risk losing control of your network

4min
pages 46-47

Cloud-native networking – the future of connectivity

10min
pages 32-37

Defining the role of SASE in a connected future

5min
pages 38-39

A multi-hybrid cloud game plan to strengthen business continuity with proper data management

6min
pages 30-31

Reverse engineering surveillance capitalism

5min
pages 22-23

Securing the next generation digital infrastructure highlights from BlackHat Asia 2020

5min
pages 24-25

Plugging the gaps: Australian organisations are leaving their defence barriers wide open for attackers

4min
pages 28-29

Collective Defence: Adopting a collaborative approach to cybersecurity

5min
pages 20-21

Cyber) Security Culture Eats (Cyber) Security Strategy for Breakfast

7min
pages 16-17

Australia’s Cyber Strategy: Navigating unchartered territories needs both caution & diplomacy

5min
pages 26-27

Neurodiversity in Cybersecurity skillsets

5min
pages 18-19

The key trends shaping successful business strategies for a post-COVID-19 world

3min
pages 14-15
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.