IT security vulnerabilities can be found in almost any kind of automation system. Protect your industrial plant with the latest strategies for aligning safety and security risks. How to handle risk management as well as how to cope with the different lifecycles will be presented.
A Cybersecurity requirement should be derived from cyber risk assessment.
There are numerous definitions and equations for risk, and they change depending on the industry and the discipline. A common risk equation can be defined as: Risk = threat × vulnerability × target attractiveness × consequence.
Few strategies we will discuss as per standards are as below:
- Definition: Cybersecurity Risk Management System
- Defining the scope of the IACS assets
- Risk identification & assessment– assessing the risk profile of the IACS considering potential consequences (accident and/or loss of essential services as appropriate)
- Analysis of the threat scenarios with their impact and likelihood.