Are vendors on the wrong path where smart plant security is concerned?

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.

Cyber criminals can't wait for enterprises to mainly apply access controls and encryption as their toughest solution for securing smart plants

As the number of smart plants that use M2M, sensors, and other ICT continue to rise, so too does the lure for attackers.

Manufacturing, energy, and utilities sectors are reportedly spending a combined 206.51 billion Euros globally on ICT in 2019, says Shuba Ramkumar, senior research analyst, Frost & Sullivan.

Organizations are connecting systems to the Internet that they once kept purposely siloed for safety. "Smart plants face new challenges due to the ever-expanding connectivity of their control systems as they link into and rely on business operations and remote monitoring and management," says Graham Speake, lead trainer at the SANS Institute and a 30-year cyber security industry veteran.

You would think that most vendors are planning tighter, more effective security measures for smart plants now and into the future. One expert says it just isn't so.

To continue reading this article register now

Join the discussion
Be the first to comment on this article. Our Commenting Policies