Addressing Cybersecurity in Process Control (sidebar)

June 1, 2004
Companies should do the following:

• Ensure one person takes ownership of cybersecurity and is accountable.

• Conduct an audit of current cybersecurity measures. Implement obvious fixes.

• Follow up with a cyber-security vulnerability analysis (risk analysis) for a more complete identification of vulnerabilities and recommendations for corrective action.

• Implement a cybersecurity management program by integrating it into existing management systems for safety, quality and the like.

See the story that goes with this sidebar: Addressing Cybersecurity in Process Control

Sponsored Recommendations

Measurement instrumentation for improving hydrogen storage and transport

Hydrogen provides a decarbonization opportunity. Learn more about maximizing the potential of hydrogen.

Learn About: Micro Motion™ 4700 Config I/O Coriolis Transmitter

An Advanced Transmitter that Expands Connectivity

Learn about: Micro Motion G-Series Coriolis Flow and Density Meters

The Micro Motion G-Series is designed to help you access the benefits of Coriolis technology even when available space is limited.

Micro Motion 4700 Coriolis Configurable Inputs and Outputs Transmitter

The Micro Motion 4700 Coriolis Transmitter offers a compact C1D1 (Zone 1) housing. Bluetooth and Smart Meter Verification are available.