This recurring blog covers news about ISA Automation Week: Technology and Solutions Event from the unique viewpoint of the event’s project manager, Carol Schafer. With a technical background to draw on, a penchant for humor and the inside track on conference updates, Carol informs and entertains with messages that are always illuminating and often downright funny.
If you’re threatening the security, safety or long-term viability of my workplace, you’re threatening me. And I don’t like it. I take it personally. And so should every person working in critical infrastructure facilities, because there are literally thousands of people in this world who do nothing all day, every day, but sit in a room figuring out ways to get through firewalls (easy – they do it all the time) and once they’re in, imagination is the only limit to the damage they can do.
We’re all aware of the so-called “cybersecurity threat,” and we hear a lot of casual conversation about it with comments like “Oh, a cyber-attack, yes, that sure would be terrible if it ever happened to some poor besieged company.” None of us doubt that hackers and cyber terrorists are out there working hard. After all, everyone’s heard about Stuxnet, so we all know, at least, that SCADA systems are potential targets. We just don’t believe it will happen to us. We just don’t take it personally.
But the fact is, your company’s firewall (if your facility even has one) is likely being compromised while you’re reading this. At the very least, cyber attackers are banging on that firewall repeatedly like a battering ram on a castle door. With most SCADA and controls systems accessible to the Internet, sensitive information and critical processes are essentially vulnerable to having their back doors pried open to anything – or anybody – on the worldwide web.
This isn’t particularly “breaking news.” I still remember my shock –and considerable anger – when I discovered that hackers had infiltrated the extremely modern 486 computer on which we ran our manufacturer’s rep business years ago in California’s Silicon Valley. The CPU usage indicated 92 percent when the computer was idle and the hard drive light was always on – an “old school” alarm that told us something was wrong. Invading subroutines had barged in over the Internet, installed themselves inside our nice warm PC and were happily grinding away, doing massive numbers of computations for their hacker masters. Take it personally? You bet I did.
Back then, safeguarding infrastructure and critical facilities like oil platforms, nuke plants or wastewater facilities wasn’t top of mind. But today, we must face the staggering odds in favor of a major facility being taken off-line, having sensitive information stolen, or losing valuable intellectual property through cybersecurity breaches. The possibilities for extortion, weakening of defense capabilities, the loss of intellectual property, and the crippling of communities – or even countries – so that an invading tyrant can make demands are simply overwhelming.
So if we know all this, why does it seem so difficult to take it personally – that is, to realize that individually we have a measure of the overall responsibility and take whatever actions we can? It’s certainly not for lack of caring or good intention. Here are my four favorite answers to that question:
What can we do, now that we are all standing together and taking the cyber threat thing personally? (We are, aren’t we? Yes, I thought we were.) The answer is, we can do one thing more than we did yesterday, and every step forward reduces the chance that we’ll wake up the next day, boot up our computer, and see a message from a cyber-hack demanding that we open our windows and shout “I'm as mad as hell, and I'm not going to take this anymore” or else they’ll make us all watch endless reruns of The Gong Show. <shiver> No, thanks.
Here are a couple of suggestions for “getting personal” with cybersecurity, outside of what you can find in the (overwhelming) amount of research and data available:
Okay, autopros*, I’m outta here. Actually, I have to go home and install a new anti-virus program on my laptop. It’s been a while. And you know how I feel – I take it personally.
*autopros = automation professionals … remember?
Carol M. Schafer has more than 35 years of experience in the industrial automation and control field as a technical sales and marketing professional. She spent 14 years in the field as principal of a manufacturer’s representative company, selling flow and humidity products, air and gas analyzers, CEM equipment, and sampling systems. She also worked for several years as the East Coast sales manager for a leading weather instrument/systems manufacturer. Carol joined ISA in 1996, and is currently project manager for the Society’s annual conference, ISA Automation Week. She also serves as a senior consultant with the ISA Corporate Partnerships Program. She obtained a bachelor's degree in business administration from the California State University at Sacramento, and a master’s degree in business administration from San Jose State University.