LeoCybSec

Our Pricing

Billed Monthly

Billed Yearly (save
15%)

Request
Demo

$0

Description of the tier list will go here, copy should be concise and impactful.

    Smart

    $25

    / user / month

    All the security software you need

    Protection Level

    Advanced

    $50

    / user / month

    Everything in Smart Plus…

    Protection Level

    Protect Your IACS And Invest In ICS Cyber Security

    A Wake Up Call For OT, Protect Your IACS And Invest In ICS Cyber Security

    Leo CybSec Team

    What Are ICS Systems And OT?

    Industrial Control Systems (ICS) are crucial control systems used in various industrial operations, such as power generation, manufacturing, and transportation. These systems monitor and manage critical industrial processes, including temperature, pressure, chemical reactions, and flow. ICS systems rely on sensors, controllers, actuators, and networks that work together to ensure industrial processes’ safe and efficient operation.

    Operational technology (OT), encompasses the hardware and software used to monitor and manage physical processes across industries. OT systems include ICS systems, building automation systems, and industrial networks. OT systems are a critical infrastructure responsible for ensuring the safe and efficient operation of various industrial processes.

    The Urgent Need For ICS Cybersecurity In Today’s Threat Landscape

    Over the years, there has been a significant increase in the interconnection between industrial control systems (ICS) and operational technology (OT) with IT systems, leading to an increased risk of cyberattacks. These systems form the backbone of critical infrastructure, powering essential industries such as energy, water, transportation, and manufacturing. The impact of cyberattacks on ICS and OT can be devastating, causing physical damage, financial losses, and loss of life. Thus, safeguarding ICS and OT systems against cyberattacks is crucial. Discover how the adoption of the IEC 62443 standard can help mitigate these risks.

    ICS Cyber Attacks And Their Severe Consequences:

    • Stuxnet: A worm that specifically targeted Iran’s nuclear program, causing physical damage to uranium enrichment centrifuges.
    • Ukrainian power grid attack: In 2015 and 2016, hackers disrupted the Ukrainian power grid, causing widespread blackouts and leaving hundreds of thousands without power.
    • NotPetya: A ransomware attack that affected thousands of computers worldwide, including those in critical infrastructure sectors such as shipping and logistics.
    • Triton/Trisis: A malware attack that targeted a Saudi Arabian petrochemical plant, shutting down safety systems and almost causing a major disaster.
    • Dragonfly/Energetic Bear: A cyber espionage campaign targeting energy companies and power grids in the United States and Europe.
    • Maroochy Water Services: A disgruntled former employee of an Australian water treatment plant hacked into the system and released over a million liters of raw sewage into nearby parks and rivers.
    • Colonial Pipeline: In May 2021, a ransomware attack shut down the Colonial Pipeline, which supplies gasoline and other fuel products to the eastern United States, causing widespread shortages and price increases.

    These attacks demonstrate the severity of the consequences that can result from a cyber attack on ICS and OT systems. They highlight the urgent need for organisations to prioritise the defence of these critical infrastructure systems against cyber threats.

    How Can We Help You Mitigate These Impacts?

    The quickest way to respond to the ICS cyber risks is  by adopting the IEC standard across all your ICS systems and networks.

    At Leo CybSec, we provide consulting services to help organisations implement the IEC 62443 standard across all their ICS systems and networks. Our experts work with organisations to develop an inventory of ICS assets, group assets into zones and conduits based on the company’s security objectives, conduct high-level and detailed level risk assessments, and assign target security levels to zones. We also provide ongoing support to ensure that organisations maintain compliance with the IEC 62443 standard and remain protected against emerging cyber threats.

    The Urgent Need For ICS Cybersecurity In Today’s Threat Landscape Requires IEC62443

    The IEC 62443 series of standards was created by the ISA99 committee with the contribution of global security experts, to offer a comprehensive set of standards that can be applied to any industry. These standards introduce a common language for all stakeholders in the IACS field, including asset owners, service providers, and product developers. They provide guidelines on defining security objectives and implementing IACS systems effectively.

    The IEC 62443 Standard comprises several documents, each addressing specific aspects of IACS security. Check out the table below for a brief overview of these documents.

    Standard Document NameDescription
    Part 1-1: Terminology, concepts, and modelsIt defines the basic concepts and terminology for the whole IEC 62443 standard parts.
    Part 1-2: Master glossary of terms and definitionsList of terms and abbreviation
    Part 1-3: System security conformancemetricsIt defines a mechanism to build a quantitative security metrics
    Part 1-4: IACS security lifecycle and use casesIt describes the security lifecycle of a Controls system supported with use cases.
    Part 2-1: Establishing an IACS securityprogramIt helps asset owners build and implement an effective IACS security management system
    Part 2-2: IACS security program ratingsIt defines a mechanism to measure the level of security against the IEC 62443 requirements
    Part 2-3: Patch management in the IACS environmentIt provides guidelines on how to design and implement a Patch Management Process 
    Part 2-4: Security program requirementsfor IACS service providersIt sets the security requirements for providers that offer services such as support and integration.
    Part 2-5: Implementation guidance for IACS asset ownersIt guides asset owners on how to operate an IACS security program.
    Part 3-1: Security technologies for IACSIt describes several security technologies and their implementation in an IACS environment
    Part 3-2: Security risk assessment forsystem designIt helps asset owners and integrators on:  – Grouping assets into zones and conduits.  – Conduct Risk Assessment.  – Assign target security levels.  
    Part 3-3: System security requirementsand security levelsIt provides security requirements (SRs) that can be used to evaluate whether a product has security capability matching the target security level (SL-T) set by an asset owner.
    Part 4-1: Product security development life cycle requirementsIt sets security requirements for product development
    Part 4-2: Technical security requirement for IACS componentsIt sets security requirements for components providers. Components can include: sensors, network devices, and software among others. 

    What We’ve Done:

    In 2022, we worked with one of the largest energy companies in Europe to adopt the IEC 62443 standard in one of their largest projects. Our experts supported the company in developing an inventory of their ICS assets, grouping assets into zones and conduits, conducting risk assessments, and assigning target security levels to zones. As a result of our efforts, the company was able to significantly improve its cybersecurity posture and reduce the risk of cyber attacks on their critical infrastructure systems.

    Conclusion:

    In conclusion, cyber attacks on ICS and OT systems can have severe consequences, including physical damage, financial loss, and loss of life. The IEC 62443 standard provides a comprehensive framework for securing these critical infrastructure systems against cyber threats. At Leo CybSec, we provide consulting services to help organisations implement the IEC 62443 standard across all their ICS

    References:

    1- IBM X-Force Threat Intelligence Index 2022 (link)

    2- Alert (AA22-103A) APT Cyber Tools Targeting ICS/SCADA Devices (link)

    3- IEC 62443 Part 1-1 Terminology Concepts and Models.

    4- An Abbreviated History of Automation and Industrial Controls System and Cybersecurity by Ernie Hayden (link)

    5- Oil & Natural Gas Cyber Threat Perspective by Dargos (link

    6- CNN: Colonial Pipeline says ransomware attack also led to personal information being stolen (link)

    7- New York Times: A Cyberattack in Saudi Arabia Had a Deadly Goal. Experts Fear Another Try (link)

    8- Quick Start Guide: An Overview of the ISA/IEC 62443 Standards by  ISA Global Cybersecurity Alliance (link)

    Contact us

    Learn more about our cyber security solutions and address any questions you may have.

    Get in touch with us today, we are here for you.

    London Office

    167-169
    Great Portland Street,
    London, England,
    W1W 5PF.
    London: +44 7463239665

    Dubai Office

    Business Bay,
    Ontario Tower Building,
    SR-G-01-042, Dubai,
    United Arab Emirates
    Dubai: +971 501716764