Skip to main content
The Dragos Blog

12.05.23 | 1 min read

Lundin Mining's Cybersecurity Success: Key Takeaways

Dragos, Inc.

In today’s ever-evolving industrial landscape, cybersecurity is a top priority for businesses, especially those in critical infrastructure sectors like mining. Lundin Mining, a prominent global mining company, has set an exemplary standard in bolstering its cyber resilience. In this blog, we’ll summarize the key takeaways from Lundin Mining’s success story with the Dragos OT Cybersecurity Platform and OT Watch.

Like most mining companies, Lundin Mining faces significant challenges in their cybersecurity journey, including:

  • Diverse OT Environments
  • Remote Locations
  • Supply Chain Risks
  • Limited IT-OT Integration
  • Complex Vulnerability Management
  • Staff Training and Awareness
  • Scalability
  • Emerging Threat Landscape Limited Budget and Resources

Discover what Lundin Mining did to bolster its cyber resilience.

Download the case study to learn more.

Download Now

Addressing these challenges requires a comprehensive and tailored cybersecurity strategy that considers the unique aspects of each mining site while providing centralized monitoring and response capabilities. The Dragos OT Cybersecurity Platform is the centerpiece of this program, and the team uses the Platform in the following ways:

  • Finding the root cause analysis of operational issues
  • Conducting automated asset inventory
  • Verifying and prioritizing vulnerabilities or supply chain compromise risks
  • Responding to regulatory audits
  • Detecting changes in configuration or communications to/from critical equipment [crown jewels]
  • Hunting for threats based on threat intelligence

In addition to the Dragos Platform, the Lundin Mining team also leverages OT Watch, an elite group of ICS intrusion detection analysts and investigators dedicated to proactively hunting for adversary activity. Here’s how the team uses OT Watch:

  • Managed threat hunting using the latest intelligence-based IOCs and adversary TTPs
  • Notification triage and response support, escalating high severity alerts
  • Alert and asset configuration tuning, enriching asset characteristics and alert severities
  • Mapping and zone configuration with ongoing improvement of asset, zone, and network communication visualizations
  • System health and status monitoring
  • Dragos Platform optimization with regular updates to detections, characterizations, and playbooks
  • Executive reporting on overall status of the ICS environment, findings, and recommendations for continuous improvement

Download our case study to explore more details about the challenges of securing mining operations. The case study offers advice for industrial companies looking to protect their critical infrastructure, ensure safety, and maintain operational continuity in an increasingly challenging cybersecurity landscape.

Ready to put your insights into action?

Take the next steps and contact our team today.