Offshore wind supply chain opportunities to be showcased by RWE’s Sofia
Starting in July, the 1.4 gigawatt (GW) Sofia Offshore Wind Farm – one of the largest single offshor...
Industrial Control Systems (ICS) are prone to cyber-attacks, warn DEKRA experts. Cyber defence measures usually focus on computers, IT networks and data highway, ICS is often a little-noticed gateway for attacks. If these control systems are not secure, the process industry in particular could face huge losses. So DEKRA experts advise systematic security assessments of vulnerabilities and implementation of protective barriers.
Cyber-attacks on ICS can result in accidents the consequences of which extend far beyond financial losses. Aside from direct health hazards for staff and local residents, there is also the risk of long-term damage to the environment.
To prevent attacks via industrial control systems, the plant operator should systematically assess the situation, advises DEKRA: Have all the weak spots been identified? Are the biggest consequences of accidents common knowledge? Are there security features in place that can prevent external access? Are there security barriers in place that function independently? Is the EHS business area well-equipped?
The DEKRA Cyber SafePS solution has been designed to identify cyber security risk to a plant. Based on an analysis of the major accident hazards, the assessment evaluates the protective measures and barriers in place – the objective being to achieve cyber security via a series of systems and barriers that function independently of each other. DEKRA Cyber SafePS is implemented by industry experts from DEKRA UK.
Understanding how to prevent Major Accident Hazards with a robust cybersecurity will be discussed in the upcoming 3-hour webinar with our process safety expert Clive de Salis on the 8th December 2020 as part of our DEKRA Process Safety Academy – Global Fast Track to support an accelerated path to understanding process safety fundamental. To register please click here. We offer a complimentary 30-minute consultation call and a guidance on a cyber security policy for anyone who joins the webinar and is interested.