Addressing Cybersecurity in Process Control (sidebar)
June 1, 2004
Companies should do the following:
• Ensure one person takes ownership of cybersecurity and is accountable.
• Conduct an audit of current cybersecurity measures. Implement obvious fixes.
• Follow up with a cyber-security vulnerability analysis (risk analysis) for a more complete identification of vulnerabilities and recommendations for corrective action.
• Implement a cybersecurity management program by integrating it into existing management systems for safety, quality and the like.
Inductive Automation offers multiple editions of Ignition created for specific use cases. See what differentiates Ignition, Ignition Edge, Ignition Cloud Edition, and Ignition...
Castle & Key brought new life to a historic Kentucky distillery by blending 140 years of heritage with cutting-edge automation. With help from Gray AES, they replaced outdated...
Learn how Inductive University can help you overcome today’s biggest roadblocks in SCADA training, such as prohibitive costs, gated software access, and more.
Forget complex programmingget smarter, faster automation with MOVI?C. With scalable performance, multibus flexibility, and safety built in, its control tech that adapts to ...