6th Cyber and SCADA Security for Oil & Gas Industry

SteelCloud and aXite Security Tools have entered into a cooperation agreement. Together with SteelCloud, aXite Security Tools can now provide a wider range of Security Tools.

A 360° view on asset inter-network-dependencies and the role of ICS / SCADA Security

The 6th Annual Cyber and SCADA Security for the Oil & Gas Industry 2019 conference, brought together ICS, SCADA, IT Security experts from Global Leading Oil and Gas companies to exchange their knowledge, challenges and best practices. aXite Security Tools was guest speaker, talking about their 360° view on asset inter-network-dependencies and the role of ICS / SCADA Security.

The protection of data and intellectual property from organized attacks or individual hackers is a critical component of risk management. Threats to Operational Technology (OT) systems can cause production stoppages, a decrease in product quality or even destruction of infrastructure. Today, there are sophisticated networks of highly skilled “hacktivists” who aim to create highly visible incidents that jeopardize, or harm companies in the oil and gas industry.

Risk management and inter-network-dependencies:

Administrators might have a clear picture of their own grids, but their notion on infrastructures managed by other operators and how these affect each other is still not optimal. We have to understand, how critical infrastructures, networks and the environment interact. Can we control change of controls and secure program integrity, put data in context and become NIST 800-82r2 and or IEC 62443 compliant? How can we combine risk management with the impact on financials or safety for each event before we decide to override?

aXite Security Tools talked about the 360° view on critical infrastructures, taking into account network and asset interdependencies and the ability to run various near-real time simulation scenarios. This approach of cyber risk management and business continuity, should enable you to assess impact and mitigate damage and gives you the ability to prepare for remediation and recovery scenarios, while staying operational. Could a Digital Twin be a possible solution?

SCADA Security conference guest speaker on asset inter network dependencies
Download PDF
Other news
One magazine and one conference
This article is about how to protect legacy assets in operational critical infrastructure from cyber attacks.
Webinar OT Security – NAG / HI / IQ
Bert Willemsen (EVP Cybersecurity) & Menno Cadee (EVP Technical Cybersecurity) gave a webinar about “Industrial Cybersecurity: compliance and reality”.
Careers at aXite security tools

Do you want to help us secure technical installations? Come and join us!