Businesses embrace digital technologies that modernize their operations and enable innovation. Yet these same technologies introduce new security vulnerabilities and new data that must be secured. The result is a costly cybersecurity arms race, in which businesses introduce new security products to counter new attack vectors. Individually-managed or standalone security products add complexity, reduce visibility, and strain under-resourced security teams.
The importance of protecting SCADA systems has never been greater than is the case today. With SCADA systems scattered
across its vast irrigation infrastructure, Murrumbidgee Irrigation lives this challenge every day. When security penetration testing pinpointed potential security deficiencies, Murrumbidgee Irrigation embarked on an initiative to transform its security network architecture.
After comparing different solutions and testing many of them, Murrumbidgee Irrigation chose Palo Alto Networks® Next-Generation Security Platform. In addition to providing
the company’s small ICT team with a single point of contact for multiple areas of its security environment, the platform enabled Murrumbidgee Irrigation to move from a largely reactive security posture to one that is predictive.
As an industry leader in retail fuel monitoring and diagnostics,
Warren Rogers Associates (Warren Rogers) manages thousands of
data collection devices installed at service stations across the U.S.
Because these devices reside alongside its customers’ business
systems that handle credit and debit card data, Warren Rogers
had to guarantee it would prevent cardholder data from being
collected to ensure PCI DSS compliance.
CAME Group (CAME) provides automation systems for residential and industrial entrances, parking lots, and access control points. With 50 branches in 40 countries all networked with its corporate headquarters in Italy, CAME was uniquely challenged to provide a network architecture that ensured both secure network access and secure endpoints. Targeted attacks by malware, such as CryptoLocker, were frequently infiltrating servers and PCs, disrupting productivity and creating unpredictable remediation costs. Traditional antivirus software was ineffective in stopping such attacks.
By deploying the Palo Alto Networks Next-Generation Security Platform with Next-Generation Firewalls, Threat Intelligence Cloud services, and Advanced Endpoint Protection, CAME successfully prevents cyberthreats from infiltrating endpoint devices and its network. Through consolidation, CAME is saving $2.5 million over three years, with an additional $250,000 in savings by eliminating remediation costs on endpoint devices. Moreover, the company now has uniform security policies enterprise-wide, with increased visibility and control over network traffic for improved bandwidth and application performance.
The Security Reference Blueprint for Industrial Control and SCADA Systems provides a framework in which Owner/Operators can protect these critical systems from compromise, rationalize the scope of compliance, and more, using the core capabilities of Palo Alto Networks next-generation security platform.
Compliance and security are both top-of-mind issues for electric utilities. The NERC CIP standards mandate controls that protect against malware, provide device monitoring, and enable the detection and response to cyber incidents. This webinar will explore the application of one advanced solution to meet both compliance requirements and security objectives.
In a recent article for Utility Week, Del Rodillas describes a common challenge in securing industrial control systems (ICS) — that they’re highly susceptible to cyberattacks because their software patching and anti-malware update cycles are too infrequent, if they’re happening at all.
While awareness over the need for improved cybersecurity in SCADA and Industrial Control Systems (ICS) has improved in recent years, several inaccurate and dangerous assumptions about ICS cybersecurity best practices and the nature of cyber threats still persist. If held by organizations as fact, these myths could result in inadequate cyber-defensive measures and a high level of exposure to a range of attacks or even simple accidental cyber incidents both of which could have equally concerning consequences to process availability and safety.
In this paper Mario Chiock, Cybersecurity & Disruptive Technology Executive Adviser and Del Rodillas Senior Manager, SCADA and Industrial Controls Cybersecurity go through the nine core capabilities that define this 21st century security platform for industrial control systems.
Join us on September 24th for the first of three webinars focused on Industrial Control Systems cybersecurity featuring our guest speaker and ICS cybersecurity expert and author, Joe Weiss, who is also Managing Director of ISA 99. Throughout the series, we will have the opportunity to hear both IT and OT perspectives on various topics from risks in ICS, to what’s required for success, as well as some of the best practices and technologies which help to address the unique needs of control systems cybersecurity.