Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • 8 Top Technical Resource Providers for ICS Security Professionals
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

8 Top Technical Resource Providers for ICS Security Professionals

5 years ago David Bisson
8 Top Technical Resource Providers for ICS Security Professionals

Attacks against industrial control systems (ICS) are on the rise. In its 2020 X-Force Threat Intelligence Report, for instance, IBM found that digital attacks targeting organizations’ ICS had increased by more than 2,000% between 2019 and 2018. Most of those attacks involved the exploitation of vulnerabilities affecting supervisory control and data acquisition (SCADA) and other ICS hardware components as well as brute-force login attacks. IBM X-Force also documented the release of 200 ICS-related vulnerabilities in 2019, leading the research team to forecast that digital threats confronting organizations’ ICS would continue to increase in 2020.

Acknowledging these threats, organizations are looking to protect their ICS using a nuanced approach. Many are specifically encouraging their ICS security professionals to hone their skills and training using respected technical resource providers in the field. These providers can also help IT cybersecurity personnel learn about industrial environments and how best to implement cyber controls relative to uptime and safety of their organizations’ industrial process.

Towards that end, here are eight providers that ICS professionals can use to train and continuously educate their teams to defend their organizations’ ICS.

1. Global Information Assurance Certification (GIAC)

Founded: 1999

Website: https://www.giac.org/

Among the State of Security’s 11 respected providers of IT security training, the Global Information Assurance Certification (GIAC) offers more than 30 certifications to aspiring security professionals. Personnel working in industrial security should consider achieving three certifications in particular. The first certification, Global Industrial Cyber Security Professional (GICSP), is a vendor-neutral program that teaches enrollees how to balance IT, engineering and digital security to protect industrial control systems. The second accreditation, Response and Industrial Defense (GRID), teaches participants how to take an Active Defense approach towards securing an ICS network. Finally, ICS professionals can aspire to achieve Critical Infrastructure Protection certification to bolster their understanding and implementation of NERC-defined terms and CIP standards.

2. Industrial Control Systems Cyber Emergency Response Team (ICS-CERT)

Founded: 2009

Website: https://ics-cert.us-cert.gov/

Industrial Control Systems Cyber Emergency Response Team ICS-CERT

Created by the U.S. Department of Defense (DoD), the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) partners with law enforcement, governments of all levels and industry actors to reduce digital risks facing all critical infrastructure sectors. It helps all these actors remain aware of the latest threats by publishing advisories, alerts, security awareness reports and other publications. For ongoing digital defense learning, ICS-CERT also provides hands-on and web-based training as well as works with ICS subject matter experts to make recommended security practices and standards and recommendations available.

3. Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

Founded: 2012

Website: http://ics-isac.org/

Industrial Control System Information Sharing and Analysis Center ICS-ISAC

The Industrial Control System Information Sharing and Analysis Center (ICS-ISAC) is a non-profit organization whose mission is to “provide members and associated sectors practical information regarding the cybersecurity of their facilities.” Members of the Center enjoy access to real-time intelligence feeds that they can use to stay on top of the latest ICS security threats, a secure membership portal from which they can coordinate their defensive measures and access to webinar events, a regular conference and regular briefings on evolving threats. They can also review additional information provided by dozens of separate knowledge centers.

4. International Society of Automation (ISA)

Founded: 1945

Website: https://www.isa.org/

International Society of Automation (ISA) ics

A part of the Automation Federation, the International Society of Automation (ISA) is a non-profit organization that caters to tens of thousands of industrial security professionals and to other automation personnel worldwide. In cooperation with the American National Standards Institute, ISA has developed various standards specifying fundamental ICS terms and concepts, ICS security system requirements and security levels (IEC 62443) and steps needed to create an ICS security program. It promotes security awareness of these standards via workforce development and training programs as well as professional certificate tracks. Additional industrial security system resources provided by ISA can be found here.

5. National Institute of Standards and Technology (NIST)

Founded: 1901

Website: https://www.nist.gov/

National Institute of Standards and Technology (NIST)

The National Institute of Standards and Technology (NIST) is a non-regulatory agency of the United States government that advances measurement science, standards and technology. The laboratory is responsible for developing the Guide to Industrial Control Systems (ICS) Security – NIST Special Publication 800-82 (PDF), a special publication which has gone through two revisions as of this writing. The document provides guidance on how professionals can secure ICS networks consisting of SCADA systems, distributed control systems (DCS) and other control system configurations like programmable logic controllers (PLC) while they continue to observe each system’s performance, reliability and safety requirements.

6. The SANS Institute

Founded: 1989

Website: https://www.sans.org/

The SANS Institute

Another one of the State of Security’s 11 respected IT security training providers, the SANS Institute offers training in the classroom from a SANS-certified instructor, in a self-paced program that is conducted online or in a mentored setting. Industrial security professionals can complete several courses with SANS to advance their careers, including two in partnership with GIAC to obtain GICSP and GRID certification. They can also deepen their knowledge on their own time via perusing SANS’ library of analyst surveys, whitepapers and use cases as well as by following the training provider’s industrial control systems security blog.

7. SCADAhacker.com

Founded: N/A

Website: https://scadahacker.com/library/

SCADAhacker.com

SCADAhacker.com provides professional services designed to help personnel in critical infrastructure sectors to secure their industrial control systems. Founded by Joel Langill, director of critical infrastructure and SCADA representative for the Cyber Security Forum Initiative (CSFI), the ICS security resource center offers training through its online university. Its “Understanding, Assessing and Securing Industrial Control Systems” course, for example, provides students with the knowledge to achieve GICSP certification through GIAC. SCADAhacker.com is comprehensive in its library of ICS security vulnerabilities, whitepapers, standards and events. Security professionals can also make use of the organization’s toolsets, receive its newsletter and read its blog.

8. Information Assurance Certification Review Board

Founded: N/A

Website: http://www.iacertification.org/

Information Assurance Certification Review Board

The Information Assurance Certification Review Board (IACRB) is a not-for-profit legal entity that says its sole purpose is to certify infosec professionals. For instance, industrial security personnel can work to become a Certified SCADA Security Architect. This program teaches individuals how to develop a SCADA security policy, how to implement SCADA security best practices as well as how to implement user authentication and authorization to their industrial control systems. Those who pass the exam, a two-hour test consisting of randomly selected questions, will also emerge with a firm understanding of how to conduct vulnerability assessments in industrial environments and protect SCADA systems against digital attacks.

Two More for the Road…

Once ICS professionals have referred to the trusted technical providers discussed above, they might want to consider investing in industrial cybersecurity solutions like those offered by Tripwire and its parent company Belden to gain visibility, implement protective control and perform continuous monitoring to protect against cyber events that negatively affect safety, productivity and quality.

The post ” 8 Top Technical Resource Providers for ICS Security Professionals” appeared first on TripWire

Source:TripWire – David Bisson

Tags: CERT, Critical Severity, Encryption, Goverment, TripWire

Continue Reading

Previous REvil, Ryuk and Tycoon Ransomware: How They Work and How to Defend Against Them
Next A New Linux Malware Targeting High-Performance Computing Clusters

More Stories

  • Cyber Attacks
  • Data Breach

Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

7 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files

7 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

11 hours ago [email protected] (The Hacker News)
  • Data Breach

Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

13 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

The First 90 Seconds: How Early Decisions Shape Incident Response Investigations

15 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers

17 hours ago [email protected] (The Hacker News)

Recent Posts

  • Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models
  • DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files
  • China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns
  • Orchid Security Introduces Continuous Identity Observability for Enterprise Applications
  • The First 90 Seconds: How Early Decisions Shape Incident Response Investigations

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT