April 18 Webinar:

Join us as Vulnerability Analysts provide actionable guidance on which OT vulnerabilities need your attention now, and why.

Skip to main content
Whitepaper

Blending Resilience and Protection to Achieve Greatest Security for Business-Viable Industrial Systems (Paper 3 of 3)

By Kenneth G. Crowther (General Electric), Robert M. Lee (Dragos), K. Reid Wightman (Dragos)

Part 3 of an ongoing collaboration between General Electric and Dragos.

This paper is intended to improve engineers’ awareness of emerging security capabilities to help improve conversation with cybersecurity professionals for securely implementing business and engineering requirements that add value. It explores details of how engineers can guide the implementation of good industrial control system (ICS) security into the future as next generation control systems and connectivity requirements emerge (e.g., Industrial Internet of Things (IIOT) or Industry 4.0). It assumes some knowledge of the basics, and focuses on what engineers should learn to design next-generation security around the business and engineering requirements of ICS.

A framework of sliding scales useful for building intuition of the level of protection generally desired based on your degree of connectivity and remote control in combination with the level of threat that you assume based on the similarity between your operations (e.g., industry) and those of victims being targeted. The paper describes each level of the scale in greater detail, and provides examples of emerging capabilities that could serve as a foundation for creative designs of security systems and reinforce the idea that ICS should be treated as systems in which security is part of the design and evolution, rather than a patch after the system is in operation.

Enter your information to download the whitepaper.
SKIP
Discover More Resources Using Keyword Tags
General Electric Reid Wightman Robert M. Lee

Discover more resources.

Explore more resources to support you on your ICS cybersecurity journey.

Read our next whitepaper

whitepapers

Key Considerations For Selecting An Industrial Cybersecurity Solution for Asset Identification, Threat Detection, and Response

Dragos, Inc.
View Whitepaper
Right Arrow

View more whitepapers

Right Arrow

Ready to put your insights into action?

Take the next steps and contact our team today.