Neurosoft
  • HOME
  • SOLUTIONS
    • CYBER SECURITY OPERATIONS
    • INFRASTRUCTURE & CLOUD OPERATIONS
    • FIELD SERVICES OPERATIONS
  • INVESTOR RELATIONS
  • CAREERS
  • NEWS
  • CONTACT
  • Menu Menu
  • LinkedIn
  • Twitter
Case studies

Industrial Control Systems-A new target?

pt-isim
Industrial Control Systems- A new target?

Industrial Control Systems (ICS) used for monitoring and controlling equipment and processes used in oil, gas and energy plants, are a critical component of the plant infrastructure. ICS solutions were purpose-built and isolated pieces of hardware and software. Their purpose-built design philosophy in tandem with the apparent lack of interaction with other systems and technologies led to their development without Information Security principles in mind. Unlike the past however, most ICS vendors nowadays use market-standard IT technologies in their solutions. Moreover ICS components like SCADA are today interconnected with corporate networks. While this convergence of technologies can improve productivity and profitability, it unavoidably exposes ICS components to cyber-attacks.

Facts:

  • 32% of Operators indicated their control system assets / networks had been infiltrated or infected
  • 34% of Operators believe their systems have been breached more than twice in the past 12 month
  • 15% of Operators reported needing more than a month to detect a breach
  • 44% were unable to identify the source of the infiltration

(Source: SANS Institute Survey – June 2015)

Stuxnet, Shaman and Havex are widely known examples of threats targeting Industrial Control Systems reaching to them over market standard IT tools and interconnections. Although securing industrial control systems is of paramount importance, it poses many unique challenges. Maintenance windows can take months or even years to plan and execute for applying patches and updates. Performing even minor changes outside maintenance windows could prove catastrophic by bringing a system down even for a few minutes. Industrial control systems are not isolated any longer. Undocumented or poorly updated documentation of interconnections with corporate networks can make complex and otherwise thorough Risk Assessments a fairytale to an attacker.

Our approach

Neurosoft together with our partner Positive Technologies can offer a new approach to critical systems security.  The approach includes all layers (defense in depth) such as Perimeter Infrastructure, Policies-Procedures-People and Cyber Security layers.

The solution that is proposed is related to four main areas:

  1. Research
  • To understand threat landscape
  • To discover security vulnerabilities and related risks
  • To offer extensive security expertise in the field
  1. Consulting
  • To apply our research in the real world – Intelligence
  • To adopt Information Security best practices for ICS
  • Develop guidelines, controls and procedures for secure implementation of ICS
  • Training and Security Awareness Programs
  1. Products
  • To build safe and secure ICS protection solutions
  • Block malicious activities by protecting the SCADA protocols
  • Monitor and detect attacks or malicious actions
  • To automate security processes and controls
  1. Verifications of ICS security level
  • Verification of organization effectiveness protecting business measures
  • See into all networked systems for audits/compliance – periodically

Our credentials
Technology brief in attached Gartner Report. Major references on ICS Security solutions include:

  • ENEL – Italy (Multinational Power Company)
  • Ferrovie Trenitalia – Italy (Italian Railways)
  • KOSPO – South Korea (Energy Generation, KEPCO Subsidiary)
  • SONELGAZ – Algeria (State Owned Electricity & Gas Distribution)
  • LUCOIL – Russia (Oil & Gas Producer)

About Neurosoft

Neurosoft S.A. is an ICT company (AIM Milan Listed) with in-house Software Development and System Integration capabilities. The company’s headquarters are in Athens with subsidiaries/rep offices in Cyprus and UAE. The main competences within the System Integration Directorate lie within three main focuses areas: Telecommunications Infrastructure projects, Information Technology infrastructure projects and Information Security projects. Neurosoft System Integration mixes product offerings from world-leading hardware and software vendors with in-house expertise and research to formulate turnkey customer-specific solutions. In all cases the company-wide mentality has been built around complex, large-scale implementations and strict Service Level Agreements. For more information please visit our website www.neurosoft.gr

About Positive Technologies

Positive Technologies is a leading provider of vulnerability assessment, compliance management and threat analysis solutions to more than 1,000 global enterprise clients. PT solutions work seamlessly across business networks, securing applications in development; assessing network and application vulnerabilities; assuring compliance with regulatory requirements; and blocking real-time attacks. Our commitment to clients and research has earned Positive Technologies a reputation as one of the foremost authorities on SCADA. For more information please visit our website www.ptsecurity.com

Athens, November 19th 2015

November 19, 2015
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on WhatsApp
  • Share on LinkedIn
  • Share by Mail
0 0 neurouser https://neurosoft.gr/wp-content/uploads/2021/12/2LogoNeurosoft2021.png neurouser2015-11-19 11:29:392015-11-19 11:29:39Industrial Control Systems-A new target?

Recent News

  • “Managed Resignation”: The role of the MSP in a time of CrisisNovember 14, 2023 - 2:41 pm
  • Is Cybersecurity a science?November 9, 2023 - 3:44 pm
  • Telecom Infrastructure: Neurosoft is leading the way and expandingNovember 9, 2023 - 2:38 pm
  • Cablenet project: A successful tripartite partnershipNovember 2, 2023 - 2:38 pm
  • Cybersecurity Awareness: A never-ending process towards business resilienceOctober 26, 2023 - 2:38 pm
  • Ransomware Readiness Assessment: The most essential security assessment for the modern businessOctober 16, 2023 - 2:13 pm
  • MDR-Backed Incident Response: Strengthen Your Security with Neurosoft’s serviceOctober 12, 2023 - 2:11 pm
  • Enterprise Link 2.0 : A high digital security solution for businessesOctober 4, 2023 - 4:00 pm
  • ΔΕΗ BITE Awards 2023 : Two Gold Awards for NeurosoftSeptember 22, 2023 - 2:10 pm
  • 7,000 LinkedIn followers and counting!September 11, 2023 - 1:43 pm

Corporate Responsibility.  Careers.   Certified Quality.  Privacy Policy. 

© Copyright 2023 - Neurosoft S.A.
  • LinkedIn
  • Twitter
New International Contract in Receivables FinanceA Hacker Wisdom Experience!
Scroll to top

This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

OKLearn more

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, you cannot refuse them without impacting how our site functions. You can block or delete them by changing your browser settings and force blocking all cookies on this website.

Google Analytics Cookies

These cookies collect information that is used either in aggregate form to help us understand how our website is being used or how effective our marketing campaigns are, or to help us customize our website and application for you in order to enhance your experience.

If you do not want that we track your visist to our site you can disable tracking in your browser here:

Other external services

We also use different external services like Google Webfonts, Google Maps and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our
Privacy Policy.

Accept settingsHide notification only