U.S. Markets close in 1 hr 20 mins

New ISA Book Introduces an Inexpensive, Easy-To-Understand Way to Protect Against Industrial Cyberattack

The book illustrates how a Security Process Hazards Analysis (PHA) Review identifies hackable scenarios, ranks them appropriately, and pinpoints non-hackable safeguards--such as relief valves and current overload relays--that are not vulnerable to cybersecurity threats.

RESEARCH TRIANGLE PARK, N.C., June 12, 2019 /PRNewswire-PRWeb/ -- With their advanced, microprocessor-based technologies, today's industrial automation and control systems (IACS) deliver much-improved performance and features compared to their analog counterparts.

Unfortunately, these newer, networked systems—with their ability to be configured remotely—are more vulnerable to cyberattack.

Security PHA Review for Consequence-Based Cybersecurity, a new book published by the International Society of Automation (ISA), introduces an easy-to-follow, cost-effective methodology for safeguarding critical infrastructure and process industry facilities from cyberwarfare and other forms of cyber-risks.

The book illustrates how a Security Process Hazards Analysis (PHA) Review identifies hackable scenarios, ranks them appropriately, and pinpoints non-hackable safeguards—such as relief valves and current overload relays—that are not vulnerable to cybersecurity threats.

Written by Edward Marszal, PE, and James McGlone—two globally recognized experts in process safety, industrial cybersecurity, and the ISA/IEC 62443 series of IACS security standards—the book is designed to deliver clarity, simplicity, and confidence to those responsible for industrial cybersecurity.

"We were prompted to write this book because the industry and the cybersecurity practitioners are still unsure of what to do and why," emphasizes McGlone. "In addition, the current approach in industrial cybersecurity focuses on network devices such as computers, Level 3 switches, and firewalls instead of on the process and machines that could be damaged or cause damage if control is lost.

"By analyzing the cause of and safeguards for cybersecurity weaknesses," McGlone explains, "it's possible to determine consequences that are potentially unaffected by the safeguards and those that could be caused by malicious intrusion, such as hacking. Any consequence that is not protected by existing safeguards or that can be caused by a cybersecurity attack is assigned an ISA/IEC 62443-based Security Level Target to be implemented or it is assigned an alternative safeguard or redesign to eliminate all or some of the cybersecurity risk."

McClone points out that the book is targeted to a wide range of automation and process industry professionals, including:

  • Instrumentation and control system engineers and technicians
  • Network engineers
  • Process safety, health and safety, cybersecurity, and maintenance personnel
  • Executives focused on risk reduction

------------------

To purchase a copy of Security PHA Review for Consequence-Based Cybersecurity, click here.

For more details, read the informative author interview
For greater perspective on the value and significance of the new book as well a more detailed overview of its content, read the Q&A feature with one of the book's authors.

About ISA
The International Society of Automation is a nonprofit professional association founded in 1945 to create a better world through automation. ISA advances technical competence by connecting the automation community to achieve operational excellence. The organization develops widely used global standards; certifies industry professionals; provides education and training; publishes books and technical articles; hosts conferences and exhibits; and provides networking and career development programs for its 40,000 members and 400,000 customers around the world.

ISA owns Automation.com, a leading online publisher of automation-related content, and is the founding sponsor of The Automation Federation, an association of non-profit organizations serving as "The Voice of Automation." Through a wholly owned subsidiary, ISA bridges the gap between standards and their implementation with the ISA Security Compliance Institute and the ISA Wireless Compliance Institute.