{"id":913,"date":"2017-12-11T10:43:55","date_gmt":"2017-12-11T03:43:55","guid":{"rendered":"https:\/\/simenteknindo.com\/news\/?p=913"},"modified":"2017-12-12T10:44:07","modified_gmt":"2017-12-12T03:44:07","slug":"industrial-cybersecurity-predictions","status":"publish","type":"post","link":"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/","title":{"rendered":"Industrial Cybersecurity Predictions"},"content":{"rendered":"<p>2017 was a year in which industry seemed to become more focused on cybersecurity. But with so much activity in this sector, making sense of it all is tough. Here are some insights into potential new developments for 2018.<\/p>\n<p>Outside of critical infrastructure and large global companies, most manufacturers have eyed the need for cybersecurity protection somewhat at arms length. They know they need it and they have increasingly been taking serious steps to better protect their systems. In response, the industrial cybersecurity market has generated a lot of helpful information and expanded with the addition of several new companies.<\/p>\n<p><em><strong>See the Automation World article on how manufacturers and processors are handling calls for greater cybersecurity while still looking to maintain air gaps between their control systems and the outside world.<\/strong><\/em><\/p>\n<p>Eddie Habibi, founder and CEO of PAS\u2014a cybersecurity and asset and operations management technology supplier\u2014recently shared his thoughts on what he called \u201cseven seismic trends\u201d he expects to take place in relation to industrial cybersecurity in 2018.<\/p>\n<p><strong>Disclosing a Critical Infrastructure Cyber Attack Will Be Mandatory<\/strong><br \/>\nHabibi notes that the lack of a mandate to disclose attacks on corporations \u201ccontinues to hinder accurate intelligence gathering and the development of targeted defensive strategies against an evolving threat landscape.\u201d He expects the U.S. will follow the European Union\u2019s lead, and that Congress will begin to hold hearings that include mandating disclosures of cyber attacks within certain critical infrastructure industries.<\/p>\n<section id=\"block-dfp-native\" class=\"block block-dfp clearfix\">\n<div id=\"dfp-ad-native-wrapper\" class=\"dfp-tag-wrapper\"><\/div>\n<\/section>\n<p><strong>Nation-State Cyber Alliances Will Become the New Norm<\/strong><br \/>\nAs an added step beyond new governmental requirements, such as the mandatory disclosure example listed above, Habibi thinks countries will begin discussing the creation of cybersecurity alliances. \u201cEstablishing these alliances will provide mutual defense for all countries involved and will allow for the sharing of intelligence in the face of attributed nation-state attacks, not to mention agreements to not attack each other,\u201d he said. Habibi added that the idea of cyber-physical non-proliferation treaties will begin gaining traction. He said that such treaties will \u201clikely forgo any promise of governmental investigation when non-critical infrastructure companies or individuals are the target of cyberattacks.\u201d<\/p>\n<p><strong>Cybersecurity and Process Safety Will No Longer Operate in Silos<\/strong><br \/>\nWe\u2019ve been covering the integration of IT and operations technology (OT) in industry quite a bit\u2014and for good reason\u2014as this is where the rubber will meet the road in terms of cybersecurity. \u201cThe process industries have long depended on technologies, such as Emergency Shutdown and Safe Operating Limit systems, to mitigate and minimize the consequences of a catastrophic incident,\u201d Habibi said. \u201cAs these systems take on the dual role of cyber defense, we predict that companies will require tight integration between cybersecurity applications and their operational risk and safety management strategies.\u201d<\/p>\n<p><strong>Companies Will Demand Supply Chain Security<\/strong><br \/>\nIf nothing else causes small to mid-sized manufacturers to take note of their need for greater cybersecurity protections, demands to do so from the companies they supply could be the turning point. Habbi said he expects companies to begin placing greater demands on their suppliers for security certifications and audit reporting. \u201cCyber supply chain certification requirements will have similarities to process improvement programs, such as Six Sigma, demanding suppliers implement and abide by cybersecurity best practices,\u201d he said.<\/p>\n<p><strong>ICS Will Jump into the Cyber Insurance Game<\/strong><br \/>\nHabibi noted that, because most operations technologies are \u201cinvisible to security personnel, insurance companies have long faced challenges understanding true risk within a facility and will continue to struggle with writing policies specific to these environments.\u201d However, industrial companies that can \u201cgain visibility into all their cyber assets, as well as monitor and mitigate risk, will have better options for insuring the heart of their operations,\u201d he said. To aid this, Habibi expects to see more comprehensive ICS cybersecurity policies offered by insurance companies.<\/p>\n<p><strong>The \u201cKaspersky Effect\u201d Will Spread<\/strong><br \/>\nRussia has been in the news so much this past year that you may have missed moves by the U.S. federal government to ban the use of Kaspersky anti-virus software on government systems. The U.S. military was the first to do so, well in advance of other federal agencies. However, Habibi cautioned that Russia should not be our only concern in this area. \u201cOther countries have shown similar nationalistic tendencies, such as China and its recently passed, far-reaching cybersecurity law that requires access to vendor source code,\u201d Habibi said. \u201cWe predict that the U.S. Executive Branch will show similar tendencies and direct government agencies to exercise procurement preference for vendors with development and manufacturing in the U.S. or allied countries. Software companies will form a loose coalition to lobby for global standards for protection of intellectual property considering the burgeoning cybersecurity risks.\u201d<\/p>\n<p><strong>Watch the OT Security Market Thin Out<\/strong><br \/>\nWith all the new entrants into this space over the past two years, the thinning of the ranks in this sector in not unexpected. Habibi expects some of these startups will \u201cstruggle to gain significant market adoption from industrial companies concerned with business continuity and safety,\u201d he said. \u201cExpect network anomaly detection companies with significant market share in enterprise IT to enter the OT market through acquisitions and alliances, ushering in a new phase of consolidation.\u201d<\/p>\n<p>Look for a feature article from <em>Automation World<\/em> in February 2018 that will help you make sense of the growing industrial cybersecurity market.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2017 was a year in which industry seemed to become [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":914,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Industrial Cybersecurity Predictions - SIMENTEK News<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industrial Cybersecurity Predictions - SIMENTEK News\" \/>\n<meta property=\"og:description\" content=\"2017 was a year in which industry seemed to become [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/\" \/>\n<meta property=\"og:site_name\" content=\"SIMENTEK News\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PtSimenteknindo\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-12-11T03:43:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-12-12T03:44:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2017\/12\/pediction.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Wimpy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@simenteknindo\" \/>\n<meta name=\"twitter:site\" content=\"@simenteknindo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wimpy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/\"},\"author\":{\"name\":\"Wimpy\",\"@id\":\"https:\/\/simenteknindo.com\/news\/#\/schema\/person\/524d37c7e448b5855c7499cd6356fa3e\"},\"headline\":\"Industrial Cybersecurity Predictions\",\"datePublished\":\"2017-12-11T03:43:55+00:00\",\"dateModified\":\"2017-12-12T03:44:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/\"},\"wordCount\":887,\"publisher\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/#organization\"},\"image\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2017\/12\/pediction.jpg\",\"articleSection\":[\"Industry News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/\",\"url\":\"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/\",\"name\":\"Industrial Cybersecurity Predictions - SIMENTEK News\",\"isPartOf\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2017\/12\/pediction.jpg\",\"datePublished\":\"2017-12-11T03:43:55+00:00\",\"dateModified\":\"2017-12-12T03:44:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/#primaryimage\",\"url\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2017\/12\/pediction.jpg\",\"contentUrl\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2017\/12\/pediction.jpg\",\"width\":640,\"height\":427},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/simenteknindo.com\/news\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industrial Cybersecurity Predictions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/simenteknindo.com\/news\/#website\",\"url\":\"https:\/\/simenteknindo.com\/news\/\",\"name\":\"SIMENTEK News\",\"description\":\"Distributor SIEMENS Indonesia\",\"publisher\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/simenteknindo.com\/news\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/simenteknindo.com\/news\/#organization\",\"name\":\"PT. SIMENTEKNINDO\",\"url\":\"https:\/\/simenteknindo.com\/news\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/simenteknindo.com\/news\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2016\/06\/simentek-logo.png\",\"contentUrl\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2016\/06\/simentek-logo.png\",\"width\":400,\"height\":400,\"caption\":\"PT. SIMENTEKNINDO\"},\"image\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PtSimenteknindo\/\",\"https:\/\/x.com\/simenteknindo\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/simenteknindo.com\/news\/#\/schema\/person\/524d37c7e448b5855c7499cd6356fa3e\",\"name\":\"Wimpy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/simenteknindo.com\/news\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2020\/07\/wimpy-96x96.jpg\",\"contentUrl\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2020\/07\/wimpy-96x96.jpg\",\"caption\":\"Wimpy\"},\"description\":\"www.linkedin.com\/in\/wimpynf\",\"sameAs\":[\"www.linkedin.com\/in\/wimpynf\"],\"url\":\"https:\/\/simenteknindo.com\/news\/author\/wnf\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Industrial Cybersecurity Predictions - SIMENTEK News","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/","og_locale":"en_US","og_type":"article","og_title":"Industrial Cybersecurity Predictions - SIMENTEK News","og_description":"2017 was a year in which industry seemed to become [&hellip;]","og_url":"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/","og_site_name":"SIMENTEK News","article_publisher":"https:\/\/www.facebook.com\/PtSimenteknindo\/","article_published_time":"2017-12-11T03:43:55+00:00","article_modified_time":"2017-12-12T03:44:07+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2017\/12\/pediction.jpg","type":"image\/jpeg"}],"author":"Wimpy","twitter_card":"summary_large_image","twitter_creator":"@simenteknindo","twitter_site":"@simenteknindo","twitter_misc":{"Written by":"Wimpy","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/#article","isPartOf":{"@id":"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/"},"author":{"name":"Wimpy","@id":"https:\/\/simenteknindo.com\/news\/#\/schema\/person\/524d37c7e448b5855c7499cd6356fa3e"},"headline":"Industrial Cybersecurity Predictions","datePublished":"2017-12-11T03:43:55+00:00","dateModified":"2017-12-12T03:44:07+00:00","mainEntityOfPage":{"@id":"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/"},"wordCount":887,"publisher":{"@id":"https:\/\/simenteknindo.com\/news\/#organization"},"image":{"@id":"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/#primaryimage"},"thumbnailUrl":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2017\/12\/pediction.jpg","articleSection":["Industry News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/","url":"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/","name":"Industrial Cybersecurity Predictions - SIMENTEK News","isPartOf":{"@id":"https:\/\/simenteknindo.com\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/#primaryimage"},"image":{"@id":"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/#primaryimage"},"thumbnailUrl":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2017\/12\/pediction.jpg","datePublished":"2017-12-11T03:43:55+00:00","dateModified":"2017-12-12T03:44:07+00:00","breadcrumb":{"@id":"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/#primaryimage","url":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2017\/12\/pediction.jpg","contentUrl":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2017\/12\/pediction.jpg","width":640,"height":427},{"@type":"BreadcrumbList","@id":"https:\/\/simenteknindo.com\/news\/industrial-cybersecurity-predictions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/simenteknindo.com\/news\/"},{"@type":"ListItem","position":2,"name":"Industrial Cybersecurity Predictions"}]},{"@type":"WebSite","@id":"https:\/\/simenteknindo.com\/news\/#website","url":"https:\/\/simenteknindo.com\/news\/","name":"SIMENTEK News","description":"Distributor SIEMENS Indonesia","publisher":{"@id":"https:\/\/simenteknindo.com\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/simenteknindo.com\/news\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/simenteknindo.com\/news\/#organization","name":"PT. SIMENTEKNINDO","url":"https:\/\/simenteknindo.com\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/simenteknindo.com\/news\/#\/schema\/logo\/image\/","url":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2016\/06\/simentek-logo.png","contentUrl":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2016\/06\/simentek-logo.png","width":400,"height":400,"caption":"PT. SIMENTEKNINDO"},"image":{"@id":"https:\/\/simenteknindo.com\/news\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PtSimenteknindo\/","https:\/\/x.com\/simenteknindo"]},{"@type":"Person","@id":"https:\/\/simenteknindo.com\/news\/#\/schema\/person\/524d37c7e448b5855c7499cd6356fa3e","name":"Wimpy","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/simenteknindo.com\/news\/#\/schema\/person\/image\/","url":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2020\/07\/wimpy-96x96.jpg","contentUrl":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2020\/07\/wimpy-96x96.jpg","caption":"Wimpy"},"description":"www.linkedin.com\/in\/wimpynf","sameAs":["www.linkedin.com\/in\/wimpynf"],"url":"https:\/\/simenteknindo.com\/news\/author\/wnf\/"}]}},"_links":{"self":[{"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/posts\/913"}],"collection":[{"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/comments?post=913"}],"version-history":[{"count":1,"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/posts\/913\/revisions"}],"predecessor-version":[{"id":915,"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/posts\/913\/revisions\/915"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/media\/914"}],"wp:attachment":[{"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/media?parent=913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/categories?post=913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/tags?post=913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}