Wednesday September 25, 2019
Abstract:
While these questions seem to have been taken from a computer network domain, they are in fact questions that have been researched for several decades for the sole purpose of eliminating biological viruses.
In this whitepaper, we investigate these types of models and reveal how ideas derived from biological epidemic models can be replicated in a SCADA/ICS cybersecurity environment. We present an epidemic-based mathematical definition for SCADA/ICS network vulnerability and we show how this epidemic model can be used to prioritize security mitigations within a SCADA/ICS network.
Black & Veatch endorses Radiflow’s iSID
Security Brief: Analysis of the Ukraine Cyber-Attack
Securicon endorses the 3180 Security Gateway as a NERC CIP enabler
New (EU) 2016/1148 Cybersecurity Directive
Whitepaper: “Meet Your Attacker – Taxonomy & Analysis of a SCADA Attacker”
Whitepaper: “Optimizing OT Security through Automatic Attacker Evaluation”
Security Brief: The Norsk Hydro Cyberattack – Using AD in IT/OT Networks
Security Brief: Fine-Tuning ICS Threat Models
Radiflow joins SANS in producing the “2019 State of OT/ICS Cybersecurity” survey
Report: KuppingerCole Executive View of SCADA Security by Radiflow
Frost & Sullivan “Customer Value Leadership” Award & Analysis Report
Report: Detecting Threats in a Simulated Water Facility at CISS 2019
White Paper: Using Epidemic Models for Evaluating SCADA/ICS Risks
Radiflow Insights: Attacks on Manufacturing: a Clear and Present Danger
451 Research Reviews and Approves of Radiflow’s OT-MSSP Offering
Security Brief: “A 2020 View of Industrial Cyber Security”
Security Brief: Fear of Cyber-Retaliation by Iranian Attack Groups
Conducting IEC-62443 Assessments Using Radiflow Products
Security Brief “COVID19-Themed Malware and Cyber-Attacks – Overview & Protection Measures”
Security Brief: “The Five Best Practices that will Protect Your OT/ICS Network in 2021″
Breach & Attack Simulations (BAS) in OT environments
White Paper: Risk Assessment & Management for Industrial Organizations
Securing Railway Operations from OT Cyberattacks
Data-driven approach to industrial cyber risk management – Cyber Risk Manangement eBook
White Paper: InController – New State-Sponsored Cyber Attack Tools
White Paper: Securing Pharmaceuticals from OT Cyber Attacks
White Paper: OT Operating Model
Safeguarding the Maritime Industry Through Advanced Cybersecurity
NIS2 is Coming to OT Are you Ready?
Securing OT Supply Chains