Power – Waterfall Security Solutions https://waterfall-security.com Unbreachable OT security, unlimited OT connectivity Thu, 28 Aug 2025 12:59:14 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.2 https://waterfall-security.com/wp-content/uploads/2023/09/cropped-favicon2-2-32x32.png Power – Waterfall Security Solutions https://waterfall-security.com 32 32 Remoting Into Renewables – the latest guidelines for secure remote access applied to renewables generation https://waterfall-security.com/ot-insights-center/power/remoting-into-renewables-the-latest-guidelines-for-secure-remote-access-applied-to-renewables-generation/ Thu, 28 Aug 2025 12:03:00 +0000 https://waterfall-security.com/?p=35923 Learn how secure access can enhance both safety and performance in renewable energy operations.

The post Remoting Into Renewables – the latest guidelines for secure remote access applied to renewables generation appeared first on Waterfall Security Solutions.

]]>

Remoting Into Renewables – the latest guidelines for secure remote access applied to renewables generation

Join our webinar on Sep 30th, 12PM EST, to learn how secure access can enhance both safety and performance in renewable energy operations.

Join us on September 30th, 12 PM Eastern Time

Remoting into Renewables

As renewable energy continues to dominate new power generation projects across North America and the EU, organizations must find ways to support remote operations without compromising cybersecurity. Wind and solar sites, often remote and digitally connected, demand secure access solutions that meet both operational and regulatory needs.

This webinar explores how energy leaders are balancing efficiency with cyber resilience. We’ll cover the latest guidance from CISA, CCCS, and others, with a spotlight on hardware-enforced, unidirectional remote access, now widely recommended for high-consequence OT environments.

Whether you're planning a new facility or optimizing an existing one, you'll gain insights into:

arrow red right The business impact of secure remote access

arrow red right Safe, scalable deployment strategies

arrow red right Aligning cybersecurity with operational goals

arrow red right Real-world adoption: how renewables operators are deploying these technologies today.

About the Speakers

Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Picture of Lior Frenkel

Lior Frenkel

With more than 20 years of hardware and software research and development experience, Mr. Frenkel leads Waterfall Security with extensive business and management expertise. As part of his thought leadership and contribution for the industry, Lior serves as member of management at Israeli High-Tech Association (HTA), of the Manufacturers’ Association of Israel and Chairman of the Cyber Forum of HTA.

Register Now

Share

The post Remoting Into Renewables – the latest guidelines for secure remote access applied to renewables generation appeared first on Waterfall Security Solutions.

]]>
Why I Wrote Power Generation OT Security: Applying and Interpreting ISA/IEC 62443 Standards https://waterfall-security.com/ot-insights-center/power/why-i-wrote-power-generation-ot-security-applying-and-interpreting-isa-iec-62443-standards/ Tue, 19 Nov 2024 13:06:03 +0000 https://waterfall-security.com/?p=28368 Power generation is a critical sector facing unique cybersecurity challenges. However, as I researched, it became clear that no document existed to bridge the gap between the general, industry-agnostic ISA/IEC 62443 standards and the specific needs of power generation facilities. In response, I decided to write this ebook.

The post Why I Wrote Power Generation OT Security: Applying and Interpreting ISA/IEC 62443 Standards appeared first on Waterfall Security Solutions.

]]>

Why I Wrote Power Generation OT Security: Applying and Interpreting ISA/IEC 62443 Standards

Power generation OT security is critical for ensuring operational resilience in the face of growing cyber threats.However, as I researched, it became clear that no document existed to bridge the gap between the general, industry-agnostic ISA/IEC 62443 standards and the specific needs of power generation facilities. In response, I decided to write this ebook.
Picture of Dr. Jesus Molina

Dr. Jesus Molina

Why I Wrote Power Generation OT Security: Applying and Interpreting ISA/IEC 62443 Standards

As a teacher in the Master’s program on Rail Cybersecurity, I’ve had the opportunity to guide rail professionals through the complexities of securing critical infrastructure. In my course, I frequently rely on the European Technical Specification TS-50701, which provides tailored cybersecurity guidance specifically for the rail industry. TS-50701 serves as an essential resource, helping rail professionals interpret and apply broader standards like ISA/IEC 62443 to the unique challenges of rail systems. Of course, the goal of TS-50701 (currently in the process of becoming a standard under PT 63452) goes beyond teaching; it aims to improve cybersecurity in rail networks by building directly from the foundation of the 62443 standards.

But this reliance on TS-50701 led me to ask a simple question: Where is the equivalent guide for power generation?

“…I decided to write this ebook as a resource for power generation professionals. It aims to simplify and clarify the application of ISA/IEC 62443 for this sector.”

The Gap

Power generation, like rail, is a critical sector facing unique cybersecurity challenges. However, as I researched, it became clear that no similar document existed to bridge the gap between the general, industry-agnostic ISA/IEC 62443 standards and the specific needs of power generation facilities.

In response, I decided to write this ebook as a resource for power generation professionals. It aims to simplify and clarify the application of ISA/IEC 62443 for this sector. While the standards are essential for Operational Technology (OT) security across industries, applying them effectively in power generation presents unique challenges that require tailored guidance.

Here’s what you’ll find inside the ebook:

  • A Consequence-Driven Approach: Learn how focusing on unacceptable outcomes and using a consequence-driven approach can enhance your risk assessments.
  • Zoning and Conduits for Power Generation: Practical guidance on structuring zones and conduits to address power generation’s specific needs.
  • Engineering-Grade Controls: Explore engineering-based controls that reduce reliance on vulnerable software solutions, helping to simplify security while maintaining robustness.
  • Introducing New Technologies: A practical approach to managing cloud computing and remote access within the standard.

Powergen OT Security eBook - Graphic

Looking Ahead: The Need for Power Generation-Specific Guidance

This ebook is a starting point. My hope is that it will spark further work towards creating a comprehensive guide, similar to TS-50701, but specifically for power generation. Such a document would bridge the gap between the broad 62443 standards and the specialized needs of this critical sector, providing engineers with a clear path for implementing cybersecurity measures.

I’ll be presenting my position on the importance of tailored training materials at the upcoming Sx25 conference. My focus will be on my experience teaching rail professionals, and the urgent need for OT cybersecurity training that prepares engineers to understand and apply cybersecurity principles in their unique operational environments. Right now, power generation lacks both a specialized approach to training and the specific guidance to make ISA/IEC 62443 actionable for its unique needs.

Download the eBook and Join the Effort

If you’re involved in power generation or OT cybersecurity, I invite you to Click here to  download the ebook and join me in pushing for the development of industry-specific resources for power generation.

About the author
Picture of Dr. Jesus Molina

Dr. Jesus Molina

Jesus Molina is Waterfall’s Director of Industrial Security. He is a security expert in both OT and IT security. A former hacker, his research on offensive security in industrial systems has been echoed by many publications and media, including Wired and NPR. Mr. Molina has acted as chair of several security organizations, including the Trusted Computing Group and the IoT Internet Consortium. He is the co-writer of the Industrial Internet Security Framework and the author of several security-related patents and academic research papers. Mr. Molina holds a M.S. and a Ph.D from the University of Maryland.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Why I Wrote Power Generation OT Security: Applying and Interpreting ISA/IEC 62443 Standards appeared first on Waterfall Security Solutions.

]]>
eBook: Cybersecurity in Power Generation – Applying and Interpreting ISA/IEC 62443 Standards https://waterfall-security.com/ot-insights-center/power/ebook-cybersecurity-in-power-generation-applying-and-interpreting-isa-iec-62443-standards/ Tue, 01 Oct 2024 08:22:57 +0000 https://waterfall-security.com/?p=27670 The post eBook: Cybersecurity in Power Generation – Applying and Interpreting ISA/IEC 62443 Standards appeared first on Waterfall Security Solutions.

]]>

eBook: Cybersecurity in Power Generation – Applying and Interpreting ISA/IEC 62443 Standards

The ISA/IEC 62443 family of standards is essential for protecting Operational Technology (OT) networks, but applying these standards in the power generation sector presents unique challenges. This eBook breaks down the complexities of ISA/IEC 62443 and provides practical guidance tailored specifically to the power generation industry.

Inside the eBook, you'll learn:

arrow red right Why applying 62443 standards to power generation benefits from a consequence-driven approach, and how to build it into your risk assessments.

arrow red right How to interpret zoning and conduits for power generation systems, and why your current zoning strategy may not be enough to address today’s threats.

arrow red right What new engineering-grade cybersecurity controls and network upgrades you should consider to simplify achieving a desired security level.

arrow red right How to mitigate the risk of high-impact, low-probability cyberattacks and build a resilient defense strategy against nation-state threats.

Share
About the author
Picture of Dr. Jesus Molina

Dr. Jesus Molina

Jesus Molina is Waterfall’s Director of Industrial Security. He is a security expert in both OT and IT security. A former hacker, his research on offensive security in industrial systems has been echoed by many publications and media, including Wired and NPR. Mr. Molina has acted as chair of several security organizations, including the Trusted Computing Group and the IoT Internet Consortium. He is the co-writer of the Industrial Internet Security Framework and the author of several security-related patents and academic research papers. Mr. Molina holds a M.S. and a Ph.D from the University of Maryland.

Fill out the form and get it by email

The post eBook: Cybersecurity in Power Generation – Applying and Interpreting ISA/IEC 62443 Standards appeared first on Waterfall Security Solutions.

]]>
Webinar: Industry-Specific 62443 Insights for Power Generation https://waterfall-security.com/ot-insights-center/power/webinar-industry-specific-62443-insights-for-power-generation/ Thu, 29 Aug 2024 08:04:22 +0000 https://waterfall-security.com/?p=26656 An in-depth webinar that goes beyond the buzzwords and provides practical, industry-specific guidance on applying the ISA/IEC 62443 standards to safeguard critical power infrastructure

The post Webinar: Industry-Specific 62443 Insights for Power Generation appeared first on Waterfall Security Solutions.

]]>

Webinar: Industry-Specific 62443 Insights for Power Generation

Watch the webinar for an in-depth session that goes beyond the buzzwords and provides practical, industry-specific guidance on applying the ISA/IEC 62443 standards to safeguard critical power infrastructure

The ISA/IEC 62443 standards provide a robust framework for enhancing cybersecurity across various industries, yet interpreting the standards in power generation presents unique challenges and opportunities.

Whether you’re a cybersecurity professional, OT engineer, or industry leader, watch the webinar recording for an in-depth webinar that goes beyond the buzzwords and provides practical, industry-specific guidance on applying the ISA/IEC 62443 standards to safeguard critical power infrastructure.

In this webinar, Dr. Jesus Molina takes us through:

arrow red right Decoding the complexities of 62443: Gain a clear understanding of the standards, their structure, and how they apply to power generation

arrow red right Navigating the implementation challenges: Learn how to address the unique needs of safety-critical and equipment protection sub-networks.

arrow red right Adopting a consequence-driven approach: Discover how to conduct effective risk assessments that account for high-impact, low-probability scenarios.

arrow red right Architect secure networks: Implement zoning and interconnected structures that enhance OT resilience.

arrow red right Strengthen defenses beyond SL4: Explore engineering-grade controls to complement cybersecurity measures and reduce reliance on expensive SL4 classifications.

About the Speaker

Picture of Dr. Jesus Molina

Dr. Jesus Molina

Jesus Molina is Waterfall’s Director of Industrial Security. He is a security expert in both OT and IT security. A former hacker, his research on offensive security in industrial systems has been echoed by many publications and media, including Wired and NPR. Mr. Molina has acted as chair of several security organizations, including the Trusted Computing Group and the IoT Internet Consortium. He is the co-writer of the Industrial Internet Security Framework and the author of several security-related patents and academic research papers. Mr. Molina holds a M.S. and a Ph.D from the University of Maryland.

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Webinar: Industry-Specific 62443 Insights for Power Generation appeared first on Waterfall Security Solutions.

]]>
AI and Industrial Security in the Energy Transition | Episode 125 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/ai-and-industrial-security-in-the-energy-transition-episode-125/ Sun, 21 Apr 2024 08:56:53 +0000 https://waterfall-security.com/?p=22318 Leo Simonovich, VP & Global Head of Industrial Cyber and Digital Security at Siemens Energy, joins us to discuss AI and the industrial cyber risks and threats it poses to the digital transformation of the energy industry.​

The post AI and Industrial Security in the Energy Transition | Episode 125 appeared first on Waterfall Security Solutions.

]]>

AI and Industrial Security in the Energy Transition | Episode 125

Leo Simonovich, VP & Global Head of Industrial Cyber and Digital Security at Siemens Energy, joins us to discuss AI and the industrial cyber risks and threats it poses to the digital transformation of the energy industry.

Picture of Waterfall team

Waterfall team

AI and Industrial Security in the Energy Transition

“…we have to apply a mix of different technologies including Cyber technologies. to begin shaving off our carbon foot print. So we work with customers to help them rationalize what they do with their existing fleets and how they can maximize efficiency.”

Available on

About Leo Simonovich and Siemens Energy

Leo Simonovich VP Siemens EnergyLeo Simonovich is VP and Global Head of Industrial Cyber and Digital Security at Siemens Energy. He is responsible for setting the strategic direction for Siemens’ industrial cyber security business worldwide. He identifies emerging market trends, works with customers and Siemens businesses to provide best-in-class cyber offers, and contributes to the company’s thought leadership on the topic. He is particularly focused on solving the cyber security challenge in the oil and gas and power sectors by bringing unique solutions to customers looking to address a growing and costly operational security risk. He frequently speaks on such topics as cyber governance, risk management, and organizational transformation in operational environments. Prior to joining Siemens, Leo led the cyber risk analytics practice area at the management consulting firm, Booz Allen Hamilton. He refined his expertise through his work with large government and commercial customers to improve their cyber risk posture. While at Booz Allen, Leo created an industry recognized methodology to evaluate the financial benefits of investment in cyber security. Leo holds both a Masters in Global Finance and a Masters of Business Administration from the University of Denver.

Siemens Energy is located in 90 countries and operates across the whole energy landscape including conventional and renewable power, grid technology, energy storage, and electrifying complex industrial processes. Their stated mission is to “support companies and countries with what they need to reduce greenhouse gas emissions and make energy reliable, affordable, and more sustainable.”

Share

Transcript of this podcast episode #125: 
AI and Industrial Security in the Energy Transition | Episode 125

Please note: This transcript was auto-generated and then edited by a person. In the case of any inconsistencies, please refer to the recording as the source.

Nathaniel Nelson
Welcome. Everyone to the industrial security podcast. My name’s Nate Nelson I’m here with Andrew Ginter the vice president of industrial security at waterfall security solutions who’s going to introduce the subjects and guest of our show today Andrew how are you.

Andrew Ginter
I’m very well. Thank you Nate our guest today is Leo Simanovic he is the vice president and global head of industrial cyber and digital security at Siemens Energy and our topic is AI in the energy transition.

Nathaniel Nelson
Then without further ado here’s your interview with Leo.

Andrew Ginter
Hello Leo and welcome to the podcast. Before we get going can I ask you to say a few words about yourself and about the good work that you’re doing at Siemens Energy?

Leo Simonovich
Andrew it’s great to be with you. Thanks so much for the opportunity. At Siemens Energy I lead the industrial cyber practice. and I’ve spent building I spent about 10 years building this business It’s been a wild ride. A lot has changed in the space. and we’ve innovated broad. Awesome products to market. and and before that I was with a large consulting firm who was Alan Hamilton where I did cyber risk analytics for large utilities.

siemensSiemens Energy is has been on the journey we became a standalone energy technology company covering the energy value chain. As a spinout of larger Siemens and we’re hyper focused on the energy transition and at the core of that transition is the need to decarbonize digitize and decentralize and the. That is all enabled by digital technologies and of course getting cybersecurity right? So we as a company have built a practice focused on operational technologies and industrial cyber and it is a practice that helps our customers. Get a better handle on on their industrial cyber programs and helps them get a better understanding of their risk. and helps them ultimately reduce that risk because it is just too important. if we don’t get it right. The the consequences for the environment but also for operations and abilities deliver energy are just too great.

Andrew Ginter
Sweet, um, and our topic today is artificial intelligence and of course industrial security in the energy transition. Can you start us at the beginning? I mean everybody vaguely understands the the need to decarbonize. What does What does the energy transition mean to you and and to you folks?

Leo Simonovich
Yeah for for us as a company and for me personally um, it is an existential challenge. We talk about the need to decarbonize and the abstract. We know that we need to reduce carbon footprint. But what does it really mean? Well we have a world out there. That’s pretty Complex. You got a bunch of old stuff that is aging and that’s built on Fossil Generation. You have renewables and then of course you you have the push to electrify everything and what that means is that we have to apply a mix of different technologies including Cyber technologies. to begin shaving off our carbon foot print. So we work with customers to help them rationalize what they do with their existing fleets and how they can maximize efficiency how they can install additional capacity that is cleaner.

And ultimately Innovative Technologies like hydrogen that are going to be groundbreaking. It’s an above kind of it’s an all of the above approach that that we need to take to go off to this problem and it really requires a partnership between us and and our customers.

Andrew Ginter
So that makes sense sort of, in the abstract. Can you give me some examples of  what kind of physical technology systems are are you folks working with?

Leo Simonovich
Yeah, the way to think about it is by looking at different parts of the energy Valley chain. So There’s oil and gas. There’s power generation and then there’s the transport and of course distribution of energy. We play in in all the parts of the of the energy value chain in Upstream where oil gets taken out of the ground we need to do a better job of not. Releasing carbon into the atmosphere. and there one of the big challenges of course is is the flaring of gas. The other is what happens with onsite power Generation. So our technologies help capture the carbon also produce. Onsite generation. So We’re not, burning diesel fuel For example, we can install small wind micro-grids that can produce energy right? there on site. We can combine an offshore platform with wind together and we do that in the North sea in in Midstream Of course it’s It’s about a more efficient way of transporting right and delivering electricity and oil and gas.

Leo Simonovich
And there we got to we are delivering next generation compression equipment. and ultimately energy’s got to get to homes. and we we have to have a grid that doesn’t lose power. Ah, as as that electricity gets gets transported. So We deliver software we deliver transformers. and we deliver metering equipment to help our customers utilize their electricity in in a more efficient Way. So when the sun shines. It’s great. and we we can deliver electricity straight to homes and the wind blows. but sometimes the the weather doesn’t just doesn’t cooperate so we are. we have capture electricity through storage by applying the latest and greatest battery battery applications to help capture electricity and use it when it’s needed most.

Andrew Ginter
I had assumed that Siemens Energy was all about the power grid and windmills and solar panels and and it is all that but the examples that that he gave here were also in oil and gas. Oil isn’t found in convenient locations. It’s found generally far away and and off the grid and so you need power out there. So they’re talking about about windmills and solar panels and whatnot out in the boonies to support these remote installations. In addition to all of sort of the the expected so it was broader than I expected.

Andrew Ginter
industrial systemsSo that all makes sense. and our topic is AI and eventually industrial security in the energy transition. Can you talk about? AI I mean there’s chatGpt has been all the buzz I have a ChatGpt account myself I’ve been playing with it. Is that what we’re talking about when we’re talking about AI or is is AI a bigger picture?

Leo Simonovich
Yeah, you’re right? There’s so much hype around AI for for a very short word. There’s so much that so much confusion comes with it. I think for your listeners, they probably know AI as the latest and greatest innovation which is ChatGpt. we all use it to ask a question. We all use it to plan our dinner menus. The reality is that in industrial context artificial intelligence has been used for some time to do things like help us find the the biggest reservoir of oil out there or to help us deal with the problem that I talked about around kind of weather patterns and anticipating what those look like and optimizing the energy system to store electricity. Those applications of artificial intelligence which is which is all about control and dispatch of energy have been around for some time they’ve been narrow and very specialized. What’s different?

Leo Simonovich
Well, with with scalability of compute which is getting cheaper and cheaper with advances in large language Models. We can now drive optimization in that energy system which is getting more complex. We talked about it being old. We talked about it being new. We talked about it being more complex. We talked about the need for energy increasing especially in the developing world right? So that’s it that complexity now needs to be optimized.

So that you as a consumer get the best price for your kilowatt hour and commercial and industrial companies are able to utilize energy when they need it. At the best rates artificial intelligence can do that now from a security perspective AI has a ton of problems tell you end I’ve seen the explosion of companies capabilities.

Andrew Ginter
All right, and we are the industrial security podcast can you can you connect the dots for us. What what are we worried about security wise if we’re using AI to manage demand, to manage to manage power.

Leo Simonovich
From a security perspective. there are 2 lenses through which we need to look at AI the first is AI from a business perspective. An operational perspective. What is it doing to deliver electricity. But the other is how can that AI be manipulated and what can the bad guys do to cause damage in the old world much of energy production was air gapped. But increasingly with the need to digitize and drive better efficiency Better asset management right? what we have seen is an explosion of connectivity.

And some that connectivity of course can can be managed smartly with data diodes companies such as waterfall which have an excellent product but some of it needs to be managed in a very different way.

And this is where artificial intelligence comes in the bad guys are using it to craft malware that is smarter and can cause more damage they’re using it Also to. Get into energy systems and this is a product of nation states. it makes subtle changes here’s what fundamentally and this is very important for listeners to hear here’s what fundamentally is different. How the game is changed. Malware used to be all about digital manipulation of Networks or endpoints now physical world commands are combined with digital commands and guess what happens. You can create a piece of malware that tells a turbine to spin faster or tells electricity to flow in a different direction and if you could do that at scale across multiple points in the system.

That leads to those safety in catastrophic events that we all have feared. We’ve seen some of this come out in news lately with with hackers getting into the us grid using the latest latest and greatest malware. which we have not seen previously before and I bet a lot of it was crafted using AI.

Nathaniel Nelson
Andrew in theory I can imagine AI playing an important part in cyber attacks. But the point that Leo’s making there. It doesn’t necessarily seem contingent on AI that one would make say a highly spreadable malware that causes physical consequences.

Andrew Ginter
Yeah I mean back in the day, this was thirteen or fourteen years ago, stuxnet hit. It was the big news back then far as I know that kind of code would have been written by hand. And common wisdom back then and even today is that writing that kind of code is very difficult. It takes it takes an expert. in in sort of stepping back for a moment in terms of of attacking industrial sites.  The sort of the common terminology is there’s stage one attacks and stage 2 attacks. Stage one is where you get into the IT network with a phishing attack or with a fake website or something. AIs like chatGpt have been described by researchers as a useful tool for generating phishing emails, for generating credible written content to deceive victims. That’s stage 1. Stage 2 is producing the code that’s going to connect to the PLC and create a new firmware for the PLC that bricks the PLC. That’s being seen as as much harder and there’s research going on in the space.

Andrew Ginter
I cannot name names at this point but I have been talking to people in in private. who are looking at using AI for stage, 2 attacks and the question they’re asking is bluntly can a script kitty someone who knows almost nothing but knows how to use AI can a script kitty produce. Let’s say Stuxnet is the question and thus far the answer seems to be no, you actually have to know what you’re doing but the bad so that’s the good news. The bad news is that the research thus far suggests that. If what you’re doing AI can speed up the process of creating a credible stage to attack enormously. We’re talking huge advantages for the for the adversary here.

Nathaniel Nelson
It’s a tricky thing because on one hand it just seems so obvious that in the near future attackers will be able to write that stage two malware using AI but on the other hand at least from what I’m hearing and I’m not out in the field every day. Practicing this stuff so I can’t say but AI has been a thousand percent more useful for cyber defenders thus far I mean whether it be antivirus detection response. What have you? we’ve been using ai in a way that attackers just haven’t for a while. So the notion that. This is some big problem that’s awaiting us sort of it’s it’s the reality versus the the theory for me am I wrong.

Andrew Ginter
Um, no, there’s there’s all sorts of stuff going on. fundamentally in the stage 2 world. The the question is one of writing code and there’s a huge industry out there in the world for writing good code. Writing word processors writing operating systems writing web servers. so there’s a huge industry focused on producing and optimizing AI that will produce code more efficiently for all of the world’s software vendors. Um. And again I haven’t been tracking this but just to give you sort of 1 example, a taste of what’s possible. I’m aware of chat gp has its limitations like I said I’ve been using chat gpt it it makes stuff up. It’s it. It has limitations but here’s the thing. Um. There’s a lot of different Ais in the world and what we’re seeing increasingly is these Ais in a sense daisy chain together now again I I haven’t done this so to a degree I’m making this up but imagine an ai that’s focused on understanding. written documents about you know. Plc communication protocols and turning them into code and it produces crappy code and then you pump that code into an ai who’s that’s focused on detecting common programming errors and then you pump the output of that.

Andrew Ginter
You know into an an AI that’s focused on using that knowledge to correct the programming errors given the original specifications and you pump that into an AI that’s focused on it’s optimized for packaging code into modules into downloadable components. And you pump those modules into an AI that’s focused on integrating the components into a comprehensive. this is happening. this kind of thing is happening and these Ais are not static. Chat Gpt is not the end. It’s the beginning and so in my estimation. The job of creating stage 2 attacks is getting much easier over time.

Andrew Ginter
So so that’s scary stuff. I know there’s a lot of researchers out there playing with the stuff and if the good guys are playing with it. You can be sure the bad guys are playing with it. can you go a little deeper What what’s possible.

Leo Simonovich
Yeah, well your imagination can can run wild but what we have seen in working with our customers is the use of Ai. Um. To develop malware that it is frankly smarter more attuned but that combines different elements of the attack leading to consequences faster and what I mean by that is if you can begin to um. Ah, manipulate a particular process or a particular piece of equipment a valve a Plc right? and you can use do that using digital commands ran and you can combine to your point about. Kind of using multiple dimensions of attack combine multiple processes together. The damage can be can can occur at greater scale and can occur much faster believe it or not It’s easy to trip a power plant. It is and have determined shutdown There are a lot of safety mechanisms to to manage human error. For example, it’s a lot harder to manipulate a turbine or or an oil refinery.

Leo Simonovich
To cause a boom event or a safety event right? I’m tricking those safety mechanisms is what AI is really good at because it it now is able to play the chess game.

On not just on kind of a one dimensional level or two dimensional level you can play it on on a 3 dimensional level moving multiple pieces all at the same time.

Andrew Ginter
So very very nasty stuff I mean like I said I’ve been tracking some of this stuff. It’s it’s worrying. how are we doing on the defensive side. What are we doing about this? What should we be doing about this?

Leo Simonovich
Yeah, the the the consequences are real and unfortunately we will not only see more and more attacks but we will see those attacks futureuring it an AI element and this worriesries. Well. Both customers and regulators that I talk to they recognize that the playing field is changing that this technology in the industrial context again. We’re not talking about Chad Gbt is accelerating. Um. And because of that we need to get a better handle on it. So the White House. with its latest AI guidance and its cyber security strategy had specifically called out.

Leo Simonovich
the dangers of AI when applied to industrial control systems more broadly. There’s recognition for for.

Leo Simonovich
Better visibility in better tooling on the defensive side. So The Regulators now are saying what used to be that cloud in operational context was was a dirty work. How can you take operational data out. But. If we’re gonna compete with the bad guys then we need to have the same levels of compute and so the regulators are now issuing guidance around Cloud and emerging technologies and specifically the thing that they’re calling out and this is we where we Siemens Energy have been hyper Focuseds. They’re calling out the need for visibility. This is very important because if you don’t have basic visibility and understanding of your environment then it’s very very hard to know a whether you’re being attacked. B going after those attacks at speed and then C being able to recover from them and what we know for a fact is that AI is going to crease the the speed of the attacks. And we on the defensive side need to increase the speed of our response. We just need to play faster.

Andrew Ginter
So it I mean it sounds like if the if the threat is increasing because of AI basically we should expect most cyber attacks to become more capable or expect the high end to become more capable and sort of everything trickle down.

Andrew Ginter
it sounds I interpret what you said correct me if I’m wrong as we need our defenses to become more capable pretty much across the board and I have heard recently I think SANS put out in 22 a top 5 security controls for for industrial control systems sort of the not here’s everything you have to do but here are the biggest gaps on average and one of them was incident. Response. It does no good to detect incidents if you can’t respond. Ah, it has some value preventing the incidentds but you can’t always prevent everything and so you need a detection capability. You need a response capability and it’s important that we get all this right. We got to fill in the gaps to make our systems more capable. I’m putting words in your mouth but is is that what. Is that what we’re hearing here.

Leo Simonovich
For sure. we have chased the capability of detection for some time. Our approach at Siemens energy has been different. We recognize a long time ago. That you need to look both at the physical and the digital world together as a unified threat stream that there needs to be context and smarter and more proportionate response. so our our approach has been.

Leo Simonovich
To get out the context you need to get it operational data. The challenge of course has been that when you have operational data what to do with it. IT teams are not well prepared to interpret that data to to know.

Leo Simonovich
What’s a threat and what’s not a threat to understand when to take action or recommend action to the plan operators so being able to translate between the it world and the operational technology world. In a way that helps explain consequences is key because shutting down a plant is very very expensive. and yet the cost of an average industrial cyber attack in the energy sector can. Can be from when you were from a million to six million a day. It’s a lot of money and so we have to somehow play this balancing act between taking proportionate response and taking smarter response that’s informed by operational context. Right? and getting more speed I had been able to detect and recover so what else all we’re talking about it AI Andrew and but what does this all all this mean for AI right? and and what it means is that actually AI is. Really good at finding the needle in haystack in our world. we built a platform that does monitoring detection is really good when we and we have large scale models that help detect that that that subtle change.

Leo Simonovich
In the process and correlated against your NetFlow data to say some. We see something is weird. but what to do about it right? How consequential is it. We have to understand how that potential particular thread could cascade through the environment and at a system level what the impacts could be. So this is where AI can have a really important role to play because we can look at. multiple misfirings as you may call them or multiple alerts at different parts of the system or how quickly something is propagating so AI can be really powerful in all in all this contexts but taking the right approach that combines the physical and the digital world together right. Using AI smartly is key and yet let me just let me pause in just a second. and yet we have energy companies right? They’re just getting basic visibility. They’re just getting their asset inventories. They’re just beginning to pipe data into into their SOCs whereas the bad guys right? have have built a full stack of of of malware factories that are AI driven. We have to get faster.

Leo Simonovich
At becoming more mature around this topic of detection.

Andrew Ginter
So Leo’s been talking sort of at ah, a very abstract level here. he’s talked about he’s talked about finding a needle in a haystack and I like I like that analogy. we have had. Other guests on talking about anomaly based intrusion detection and correlation of alarms and using Ais in all of that. So we’ve actually had people on talking about Ais but using different words if you have. I don’t know a gigabit per second of network packets in an industrial network that you’re watching. There’s a haystack this is a gazillion package coming by every second and the AI is asking. The question are any of these messages are any of these patterns of messages. Indicative of an attack and you can do it signature-based you can say I recognize that message that message is always an attack and raise an alarm or you can do it anomaly based which is looking at sort of patterns of messages and saying this is an unusual pattern. No idea what it is raise an alarm. It might be an attack because it’s different because it’s unusual so this kind of AI has been used forever. The same thing’s been used in in sems in security information and event management systems in your your security operation centers. They get millions of alerts of you know.

Andrew Ginter
Syslog messages millions of messages per day. from 150 of your plants and again they’re looking at this haystack and saying do any of these messages add up to an attack I mean some of them are obvious you are under attack exclamation Mark. out of 1 of your intrusion detection systems but others are Fred here just logged in from India he lives in North America and he logged in 10 minutes ago from North America as well and you can put together. weirdness like this. So um. we’ve been talking about this for for some time now. We’ve never gone into detail I would I would welcome a guest coming on talking about how the AI under the hood of correlation engines and anomaly detection engines actually work I mean I’ve heard words like Bayesian and I have no idea what they mean um. So I’d I’d love to have people on someday explaining how those ais work but the whole the whole concept of Ais on the defensive side finding needles in the haystack. Yeah, this is this has been done for a while and and it’s it’s going to get bigger. There’s going to be more of this.

Andrew Ginter
So that’s a great introduction. we we see the the application we see the problem. we see some some hints towards solutions. let me let’s get specific I mean Siemens energy is active in this space. Can you say a few words. What do you guys have? What do you guys? do? what? what can people call on you for in this in this problem area.

Leo Simonovich
Well, we’ve we’ve been on a journey in our thinking around operational technology AI has really evolved a a bit of self-reflection.

We siemens it was our plcs that were impacted by Stuxnet. We saw the subtle manipulation of process. and that event was a wakeup call for us to get serious about.

Industrial cyber and operational technology. This was a while back of course a lot of water under the bridge. yes, we had to get serious about product security and we we we hired almost 2000 people around the world to to support us product security managers folks in incident response. Folks that deal with vulnerabilities and guess what the world around us at the same time was changing and it’s changed a lot. it’s become more digital as we’ve talked about it’s become more interconnected we become more dependent on our customers.

And we recognized that it wasn’t just about securing the box What we needed to do was secure the operating environment the whole operating environment whether it was our stuff or somebody else’s stuff. the customer just needed help and. They were figuring things out at the same time as we were. We just had a little bit of a head start so we developed a practice in industrial cyber security focused on this problem of visibility that I’ve talked to you about we recognize that that. Going after the visibility problem from a technology perspective doesn’t necessarily make us safer because everybody talks about their latest and greatest Silver bullet or or their best detection box What we saw is that there was also a human capital challenge. In this space that there were not enough folks cross-trained in control systems and networking Insec security and now increasingly data science Those folks. Are still very rare. So What we’ve done is we built a business and a practice in this space. what we offer to customers is fundamentally. Um.

We are the trusted advisor. We don’t know when I have all the answers. but we’ll figure it out together and we’ll be there with you along for the ride because as digital technologies get introduced as there’s a lot of hype around AI as the threat landscape changes and the number of attacks increases exponentially we will be there as we have for one hundred and twenty years and so we’ve built a consulting practice a managed service practice. we built some proprietary technology around around detection but ultimately what we do is we build bridges between it teams and o team teams to work with one another because it it is going to take that into disciplinary approach and we hope to be in the center of it with our customers.

Andrew Ginter
Thanks for that. can I ask you? sort of a basic question. We’ve talked about the problem we’ve talked about some solutions if we’re starting at zero – I mean we’ve we’ve got an energy customer. Do these customers. Know how much AI they’re using. Do they know how much AI is coming after them. do they know how much trouble they’re in from from both ends of it and whether they don’t or not sort of what are the first steps. How do they get started dealing with this this new threat?

Leo Simonovich
Well AI, there’s a lot of hype around it and I think there’s general awareness now within security teams both on the I t side and the ot side that AI holds a lot of promise. but could also be used for very very bad things. on the ot side in particular I said there’s a lot of skepticism. And the reason is is because the plan operators need to. Ah. Ah, be able to unlock the black box that AI think to understand it. Maybe it’s an engineering approach and engineers. You need to kind of understand what’s happening you need to be able to understand the methods you need to be built to kind of. Trace the logic and so when I talk to security folks within implants they’re they’re skeptical of the latest and greatest tools. and they want to know how do you detect something? What is his Bayesian belief sounds very fancy. But if I can’t even do the basics. Why should I go after this problem so there’s both skepticism and desire and there’s one more thing which is the chief digital officers chief innovation officers the boards.

Are telling security teams. You gotta you gotta give me use cases around AI both on my business side and the security side and I know some customers that need to deliver a use case a week to the board. That’s how closely to be monitor if you think about that. Um. so sleepy giants are that have been doing things the same old way extracting pumping oil the gown the last fifty years the same old way are now being called to innovate in this space and then there’s kind of the middle of the pack folks that are, that fear they’re gonna be left behind and and then there’s the small, the small guys and by the way those represent if you look at the United States right 3500 utilities once you get outside the 2 top 200. Everybody’s small kind of mom and pop.

Community distribution facilities power plants those folks don’t even know how to get started and to get to your question of how you get started I think. The basic question that one should be asking is first and foremost what is important to me. What are the assets that are key that I need to get a handle on be able to understand the risk understand the vulnerability understand the exposure. Monitor it and then build an AI layer around it by the way those 2 things are very closely correlated. The the assets that are really important to be monitored assets that could benefit from applications of AI assets that attract. The bad guys and assets were a security AI use case is really valuable. So the first step is asking. What’s important the second step is figuring out what data needs to travel to be able to get a basic context and then the third step is the step that I call kind of advanced detection where AI needs to play a role in understanding.

Not just basic characteristics of a particular process or particular asset but kind of 3 dimensional behavior of of production right? And the manipulation of that to cause that boom event that you and I Andrew talked about.

Andrew Ginter
So Leo this has been enlightening a little distressing but but enlightening thank you for joining us up before we let you go can I ask you to sum up for our listeners. What what should we be taking away from all this complicated space.

Leo Simonovich
Yeah, well first of all, it’s not. It’s not all doom and gloom. There’s a lot of anxiety around this topic. but it’s definitely a journey there trust the partners that can help you don’t get wrapped up in the hype and the chase for the use cases just because the board is asking take a more measured approach to get a basic handle of your environment. AI will come. Wait. There’s steps that you can take both around the business side the operational side and the security side to to measure whether AI can benefit you. It’s not a that the it’s not a down the line thing. However.

Most folks will say I’m not mature enough and therefore I should not dabble that the reality is this technology is getting too good and the gap between the defenders and the attackers is really widening and so time is short. So don’t wait till you get. other aspects of your Ot Cyber Security program I begin to dip your toes into this space start by building some of these detection models start by picking assets that are important to you and. Getting a better understanding of of their behavior. And then ultimately look out for the regulation that’s coming down the pipe and work with your suppliers. To make sure that you can demonstrate that you are taking smart steps to better prepare yourself for what’s going to be an exciting future. in one where I think ultimately the good guys will win.

Nathaniel Nelson
Andrew that was your interview with Leo Sooneovic AI is a big topic in cyber security everywhere today. do you have any final thoughts about the subjects to close out our episode.

Andrew Ginter
Yeah I mean thinking about this a couple of things 1 is that that historically five years ago AI was sort of the anomaly. There was a little AI in the detection algorithm there was a little bit of AI sprinkled here and there increasingly you know. AI is everywhere. and in the industrial space I think we all need to get used to the thought that AI is our future. what is what’s the number 1 investment that people make routinely in industrial processes. But that engineering teams make routinely they make investments to make the process more efficient. One of the ways you make processes more efficient is that you make decision making about the process more efficient, more accurate more effective faster I think AI is essential. In that process AI is going to be essential to all of us to be making our processes more efficient and this is just on the the in a sense the mechanical side just doing things on the cybersecurity side. the bad guys I’m sorry they’re investing in making their attacks more efficient. As well and so on the defensive side. Yeah, we’ve been doing stuff in sort of intrusion detection for a long time I think we need to get used to. We need to invent ways to use AI to make our defenses more efficient. everyone.

You know, bad guys and good are using AI to make everything more efficient I don’t think we can ignore this anymore I think this is this is this has to become sort of the the common language the common wisdom of the space going forward. So I’m I’m grateful to Leo and I look forward. Fortunately, or unfortunately to thinking about AI a lot more in the years ahead

Nathaniel Nelson
Yeah, it feels like a topic that we might have more episodes about in the next few years than we have in the past few even though we have covered it at times anyway, thank you to Leo for bringing that up with us and Andrew is always thank you for speaking with me.

Andrew Ginter
It’s always a pleasure. Thank you Nate.

Nathaniel Nelson
This has been the industrial security podcast from waterfall. Thanks to everybody out there listening.

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post AI and Industrial Security in the Energy Transition | Episode 125 appeared first on Waterfall Security Solutions.

]]>
Recorded Webinar: Engineering-Grade IEC 62443 – A Guide For Power Generation https://waterfall-security.com/ot-insights-center/power/recorded-webinar-engineering-grade-iec-62443-a-guide-for-power-generation/ Tue, 02 Apr 2024 12:59:11 +0000 https://waterfall-security.com/?p=21689 The Cyber-Informed Engineering (CIE) initiative, funded by the US Department of Energy, is a new way to look at IEC 62443 – a perspective that clears up a lot of confusion.

The post Recorded Webinar: Engineering-Grade IEC 62443 – A Guide For Power Generation appeared first on Waterfall Security Solutions.

]]>

Recorded Webinar: Engineering-Grade IEC 62443 – A Guide For Power Generation

Webinar Recording: An in-depth look at the IEC 62443 standard, IEC 62443-3-2 risk assessments, and why would we need 62443-4-2 certified components for power generation operations.

Picture of Waterfall team

Waterfall team

Recorded webinar about IEC 62443 for Power Generation

IEC 62443 is used widely in power generation, but some aspects of the standard are ambiguous, and others are easily confused.

The Cyber-Informed Engineering (CIE) initiative, funded by the US Department of Energy, is a new way to look at IEC 62443 – a perspective that clears up a lot of confusion.

In this webinar recording, Andrew Ginter guides us through the intricacies of IEC 62443 for power generation, seen through the lens of CIE

In this recorded webinar, Andrew took us through:

arrow red right What are the IEC 62443 standards and which ones apply to power generation?

arrow red right How can CIE help IEC 62443-3-2 risk assessments determine Security Level targets?

arrow red right How can engineering-grade mitigations eliminate cyber threats, in addition to IEC 62443-3-3 mitigations?

arrow red right What kind of extra protection do we get from 62443-4-2 certified components?


Watch Now:

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Recorded Webinar: Engineering-Grade IEC 62443 – A Guide For Power Generation appeared first on Waterfall Security Solutions.

]]>
Engineering-Grade IEC 62443 – A Guide For Power Generation https://waterfall-security.com/ot-insights-center/power/engineering-grade-iec-62443-a-guide-for-power-generation/ Tue, 05 Mar 2024 08:01:11 +0000 https://waterfall-security.com/?p=19161 Join our upcoming webinar and learn about the IEC 62243 standard for powergen, how CIE can help with IEC 62443-3-2 risk assessments, and what kind of extra protection do 62443-4-2 certified components provide.

The post Engineering-Grade IEC 62443 – A Guide For Power Generation appeared first on Waterfall Security Solutions.

]]>

Engineering-Grade IEC 62443 – A Guide For Power Generation

Join our webinar for an in-depth look the IEC 62443 standard, IEC 62443-3-2 risk assessments, and why would we need 62443-4-2 certified components for power generation operations.

We will host 2 live streams of the webinar:
March 27 – 11:00 AM New York
March 28 – 9:00 AM Singapore

Engineering-Grade IEC 62443 - A guide for power generation Webinar

IEC 62443 is used widely in power generation, but some aspects of the standard are ambiguous, and others are easily confused. The Cyber-Informed Engineering (CIE) initiative, funded by the US Department of Energy, is a new way to look at IEC 62443 – a perspective that clears up a lot of confusion. Join Andrew Ginter and Jesus Molina in this webinar for a preview of a new Waterfall guide to IEC 62443 for power generation, seen through the lens of CIE

All participants will receive a copy of the new guide when it is released, shortly after the webinar.

In this webinar, you will learn:

arrow red right What are the IEC 62443 standards and which ones apply to power generation?

arrow red right How can CIE help IEC 62443-3-2 risk assessments determine Security Level targets?

arrow red right How can engineering-grade mitigations eliminate cyber threats, in addition to IEC 62443-3-3 mitigations?

arrow red right What kind of extra protection do we get from 62443-4-2 certified components?

 

About the Speaker

Picture of Andrew Ginter, Waterfall VP Industrial Security

Andrew Ginter, Waterfall VP Industrial Security

Andrew Ginter is the most widely-read author in the industrial security space, with over 20,000 copies of his first two books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.

Picture of Dr. Jesus Molina, Director of Industrial Security

Dr. Jesus Molina, Director of Industrial Security

Jesus Molina is Waterfall’s Director of Industrial Security. He is a security expert in both OT and IT security. A former hacker, his research on offensive security in industrial systems has been echoed by many publications and media, including Wired and NPR.
Mr. Molina has acted as chair of several security organizations, including the Trusted Computing Group and the IoT Internet Consortium. He is the co-writer of the Industrial Internet Security Framework and the author of several security-related patents and academic research papers.

Share

Register Now

The post Engineering-Grade IEC 62443 – A Guide For Power Generation appeared first on Waterfall Security Solutions.

]]>
Securing a European TSO https://waterfall-security.com/ot-insights-center/power/cybersecurity-for-a-european-tso/ Mon, 04 Dec 2023 07:28:37 +0000 https://waterfall-security.com/?p=14308 Protecting a regional Transmission System Operator (TSO) in Europe from outside cyber threats.

The post Securing a European TSO appeared first on Waterfall Security Solutions.

]]>

Securing a European TSO

Defending a regional TSO in Europe from cyber threats
European TSO Case Study
Customer:

A leading European TSO

Customer Requirement:

Cybersecurity protection of critical industrial equipment and controls systems within a highly sensitive operating environment involving the regional transmission of electricity. The solution must also secure the collection, storage, and transfer of data from OT to IT and the cloud, as well as secure connectivity to 3rd party solutions such as those providing real-time holistic monitoring and asset management.

Waterfall’s Unidirectional Solution:

Waterfall’s Unidirectional solutions secure a grid’s industrial cyber perimeter from external threats while providing real-time enterprise visibility. Waterfall’s Unidirectional Security Gateways protect all industrial control systems (IED, Protective Relays, RTUs in Substations, SCADA DMS/EMS) with an impassable physical barrier to external network threats, while enabling enterprise access to real-time production data.

Transmitting Electricity While Containing Remote Cyber Threats

The energy industry has become increasingly prone to cyber attacks. Remote cyber attacks on electric transmission infrastructure can result in severe disruptions to society, as well as create life threatening scenarios to hospitals and urgent care facilities. Repeat disruptions can severely damage economic confidence and hurt a region’s world image.

The Challenge icon
The challenge

Protecting industrial control systems from external cyber threats without hindering access to real-time operational data, with the end-goal of securing the safe, reliable, and continuous operation of regional electrical transmission.

Waterfall solution - icon
Waterfall’s solution

A Waterfall Unidirectional Security Gateway was installed between the PI Production Server and the PI Server on the Commercial IT network.

European TSO Case Study - Replicated Pi Server
Click to enlarge

The Unidirectional Security Gateway provides a continuously updated replica of the PI Production server, so that the PI Server on the commercial IT network is only accessing the replica copy of the PI Production server. The actual PI Production server itself has no direct contact with the commercial IT network and data only flows out of the PI Production Server.

Results and benefits - icon
Results & benefits
  • 100% Security: With Unidirectional Security Gateways, the PI Production Server is now physically protected from any threats emanating from the regular IT network or the cloud.

  • 100% Real-time Data Visibility: The commercial IT network continues to operate as if nothing has changed. Instead of accessing servers on the critical operational network, users on the commercial IT network now access real-time data from replicated servers, with all the informational and analytical requirements.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Securing a European TSO appeared first on Waterfall Security Solutions.

]]>
Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/webinar-recording-aveva-enabling-the-digital-transformation-of-electric-utilities-with-engineering-grade-security/ Thu, 14 Sep 2023 09:50:10 +0000 https://waterfall-security.com/?p=11244 Cyber attacks are becoming more sophisticated, cloud-based innovation is increasing attack opportunities, and governments are issuing stronger cyber regulations, such as the new European NIS2 and the new German KRITIS directives.

The post Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities appeared first on Waterfall Security Solutions.

]]>

Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities

We had a great webinar with a nice turnout. The topic was how the digital transformation of the Electric Utilities industry is unleashed once engineering-grade cybersecurity is able to protect in the industrial systems.
Picture of Waterfall team

Waterfall team

AVEVA | Webinar | Engineering Grade Security for Water Utilities

Our Webinar with Andrew Ginter of Waterfall Security Solutions and Bill McEvoy of AVEVA covered many facets of the growing inter-connectivity within the electric utilities industry, and how securing that connectivity is vital for enabling it. 

Some of the main topics discussed throughout the webinar included:

  • New tools and approaches for digitization, innovation and cost savings.
  • New cyber threats and regulations.
  • New engineering-grade solutions for cyber threats to OT systems.

Listen in >>

Once a connectivity product can be installed safely, there is little reason not to use it.

The main takeaways from the webinar focused around the increased relevance between increased connectivity, and how secure that connectivity is. The only obstacles to increase connectivity are the security implications. Once a connectivity product can be installed safely, there is little reason not to use it.

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities appeared first on Waterfall Security Solutions.

]]>
How to Prepare for A Cyber Attack on the Grid? https://waterfall-security.com/ot-insights-center/power/how-to-prepare-for-a-cyber-attack-on-the-grid/ Wed, 01 Feb 2023 00:00:00 +0000 https://waterfall-security.com/ot-insights-center/uncategorized/how-to-prepare-for-a-cyber-attack-on-the-grid/ The post How to Prepare for A Cyber Attack on the Grid? appeared first on Waterfall Security Solutions.

]]>
Remember the Y2K bug? That special party you attended with your friends, on December 31st 1999, where the whole world was supposed to come to a screeching, crashing halt? Where control systems would mistakenly revert to 1900 instead of 2000 because they’d only been designed to hold two year digits? It’s been a while, and after all that champagne, it seems now like a foggy memory. But I remember we partied, expecting the worst and … nothing much happened. The world continued as normal, traffic lights kept their patterns, and the alarm clock blared the next day on cue, along with the hangover. That’s because of the tremendous effort made by countless engineers, programmers, technicians, and planners to ensure computer clocks everywhere properly rolled over into the next millennium. The Y2K bug is similar to the situation we face today when it comes to our power grid. The threat this time isn’t a design flaw in real-time clocks, but one where cyber attacks could put our lights out. Do you wonder about how to prepare for a cyber attack on the power grid?

I don’t think I have to mention how important electricity is in the 21st century, but will say I’m firmly in that camp that believes it’s fundamental to Maslow’s basic level in the hierarchy of needs. And the best way to prepare for a cyber attack on the grid is for the grid’s owners and operators to deploy sophisticated, engineering-grade protections that control the flow of attack information into our grid.

How A Cyber Attack On The Grid Can Ruin Everything

There are probably many ways a cyber attack on the grid can cause major damage, but four immediately spring to mind. First, attackers could interrupt or damage generating plants, by blinding operators to the generating plants conditions, by faking readings on meters or monitoring systems, or by deliberately disabling safety systems. Or attackers could shut down a turbine and open a breaker at the local generating substation, thereby preventing the plant from starting back up again, because power is required for a restart.

Second, attackers could cause physical damage to expensive, long lead-time equipment, like transformers. Every substation has transformers. Bringing about physical damage is a two-step attack: first, the attack disables electrical protection, and then second causes a fault. For example, disabling transformer protection relays and then opening an upstream circuit breaker during peak load demand could overload a transformer beyond it’s rated capacity and cause permanent damage. An attack could also disable protection and activate bypass switches, bypassing a transformer to overload and explode a second unit in the same substation yard where the two units normally share the load. Most utilities have a very small number of high voltage transformers stored as spares, but at millions of dollars each and over one year lead times made worse by the recent COVID-19 pandemic, the loss of more than a handful of transformers or similar equipment in a region could lead to long term blackouts, economic damage, and larger unforeseen societal impacts.


how to prepare for cyber attack on grid Photo from a fire and MODF transformer oil release at a Boston Edison substation on Dewar Street in Dorchester (Boston), Massachusetts.
Aftermath of an transformer fire in Boston, MA. [Original, CC BY 2.0, Massachusetts Dept. of Environmental Protection]

Third, attackers could open circuit breakers in a local distribution yard and cut off power to thousands of residents. With a combo attack that could also leave power company customer support and control systems and relays wiped or disabled, recovery can be slowed or hampered for hours or days. This is not theoretical but has occurred twice, with physical consequences: Sandworm’s BlackEnergy attack on Kiev, Ukraine in 2015 and another, separate attack, dubbed CrashOverride (or Industroyer) in 2016. A third attack on a transmission station north of Kiev in 2022, dubbed Industroyer2, attempted to cause similar consequences but ultimately failed to cause significant physical consequences.

The Worst Nightmare Is A Cascading Power Failure

The fourth and most troubling attack would be threat actors causing cascading power failures in the transmission network, by accidentally or strategically opening the right breaker or two. Because the grid normally operates in a stable state, with power flowing through all elements, it can only tolerate a handful of breakers tripping and switches switching here and there. Other portions of the system will pickup the excess load demand. But trip just enough of the right breakers, on purpose or by accident, switch or disconnect power in other places, and all the other protection elements will activate causing blackouts that could blanket entire nations. It’s happened many times before from typical non-cyber causes, like in 2003. And even though regulations were strengthened, and systems were upgraded, cascading failures are still possible. Note the focus of studies and upgrades were on the assumption traditional failures would occur: a branch on the line, or a lightning strike on a tower, but not a hacker!

How to prepare for such a cyber attack on the grid intent on causing cascading failures? All the control systems must be protected from malicious information entering them. If the hacker can’t get in or can’t manipulate any of the control information, then you can sleep easy. The consequences of not engineering strong cyber security here are severe.


how to prepare for a cyber attack on grid
A typical above-ground electrical substation and transformer. CC BY 2.0, Tonyglen14

Grids Everywhere Need More Engineering-Grade Solutions

What is really needed is to control the information flow into substation automation SCADA systems and control centre networks, and if possible, to implement engineering-grade solutions that remove or mitigate information flows. A lot of material is available to help understand how to do just that:

There is much work left to do before our power grid is so thoroughly protected that a serious cyber attack is simply not a credible threat any more. The good news is that the work is on-going, and the path to success is clear.

Your feedback is always welcome. Feel free to reach out on LinkedIn.

The post How to Prepare for A Cyber Attack on the Grid? appeared first on Waterfall Security Solutions.

]]>