Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cyber Tactics ColumnCybersecurity NewsInfrastructure:Electric,Gas & Water

How to Stay in Control of Control Systems

By Steven Chabinsky
December 1, 2014

Traditional network security risk management techniques are often inadequate to meet the specialized needs of enterprises' control systems. The good news is that a host of free resources exists to cover this important field of security, risk management, compliance and operational continuity.

The umbrella term “control systems” includes a wide range of programmable devices. In short, these systems collect and process data for the purpose of controlling physical equipment. Control systems are essential to the proper functioning of most of our critical infrastructure and as well manufacturing and food processing facilities. The most common control systems are referred to as Supervisory Control and Data Acquisition systems (SCADA), Distributed Control Systems (DCS), Programmable Logic Controllers (PLC), Remote Telemetry/Terminal Units (RTUs), Smart Meters and intelligent field instruments.

Is Control System Security a Unique Challenge?Yes. Generally speaking, control systems are designed for accuracy, extreme environmental conditions, and real-time response in ways that are often incompatible with the latest cybersecurity technologies, inconsistent with consumer grade hardware and software, and in conflict with common network protocols. As a result of these performance factors and limitations, engineers traditionally have been responsible for the design, operation and maintenance of control systems, rather than IT managers. Yet, despite their uniqueness, control systems are increasingly reliant upon common network protocols, and connectivity often exists between control systems and enterprise networks, to include the Internet.

What’s at Risk? If you were to ask people to describe cybersecurity worst-case scenarios, the discussion invariably would turn to control systems. In this context, people aren’t worried about consumer privacy or the theft of intellectual property. Instead, the focus is on the integrity of physical operations, on our ability to defend our critical infrastructure from being hijacked or destroyed from afar, and on our confidence that monitoring equipment put in place to alert us to problems is accurate.

Consider as a possible harbinger of things to come the rolling blackouts in 2003 that left 55 million people without power. The extent of the failure resulted from a software glitch that, unknown to systems operators, left the control room without any audio or visual alarms for over an hour. The operators thought everything was okay because the computers told them everything was okay. In another example, as a proof of concept Idaho National Laboratory physically destroyed a hulking 2.25MW diesel generator by way of a cyber attack, causing the machine to shake violently, erupt with smoke, and shoot out shrapnel as far as 80 feet away.

What Resources are Available (for Free)?The Department of Homeland Security operates the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) as the national focal point for control systems security. A quick visit to
ics-cert.us-cert.gov will provide you with a wealth of reference materials, ranging from tactical alerts and advisories to the broadly applicable NIST Guide to Industrial Control Systems Security. Also available from ICS-CERT are Web-based training modules and in-person courses and workshops.

The single most impressive resource, the Cybersecurity Self Evaluation Tool (CSET), is available for download. In addition to its sizable resource library, CSET prepares tailored analysis and assessment reports by walking companies through an extensive series of questions that incorporates the general control systems standards, sector specific standards (including electric, nuclear and pipeline), and/or IT specific standards that the user selects.

Control systems owners, operators and vendors also should consider joining ICS-CERT’s Joint Working Group, a government/industry information sharing and collaboration initiative dedicated to the design, development and deployment of more secure industrial control systems. Finally, should you find yourself responding to a control systems cyber attack, ICS-CERT actually provides free onsite incident response, as well as offsite malware analysis, and assistance with risk mitigation strategies.

In short, if you’re responsible for control systems security, you’re not alone and, with the help of ICS-CERT and its partners, you’re not on your own.

KEYWORDS: control systems cyber security infrastructure security scada security controller smart meter security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Chabinsky 2016 200px

Steven Chabinsky is global chair of the Data, Privacy, and Cyber Security practice at White & Case LLP, an international law firm. He previously served as a member of the President’s Commission on Enhancing National Cybersecurity, the General Counsel and Chief Risk Officer of CrowdStrike, and Deputy Assistant Director of the FBI Cyber Division. He can be reached at chabinsky@whitecase.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • How to Reduce the Insider Cyber Threat

    See More
  • Game Time: The Role of Special Teams in Incident Response

    See More
  • How Continuous Is Continuous Monitoring?

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing