The calm before the storm of Dillon’s Black Hat presentation next week. The presentation will not greatly change the risk environment for critical infrastructure ICS, but it will make a big publicity splash outside of the Automation Press. Best case is it helps push over the wall of denial and inaction that has PLC’s still vulnerable by design — even in the high-end, most modern PLC’s.
ICS-CERT published a confusing announcement on Wednesday. The title on the site is “Cross Vendor Working Group”. The title of the document is “Cross-Vendor Position Paper on ICS Security Posture“. The announcement states the paper will come out in Fall of 2011, but they are just calling for participation now? “The product of this focused effort will be a cross-vendor position paper that discusses the current security challenges and a path forward for a more effective industrywide approach to ICS security.” Is this an effort to blunt criticism / respond in advance to the likely spate of reporter questions next week?
Pike Research covers a GE / GM announcement regarding EV power usage information sharing. “The smart grid pilot program, which will start with one unannounced utility, will provide access to charging history – including location, time, and amount of energy consumed by the vehicle – and will be made available to understand how PEVs will impact the grid.” Not sure why, but this feels significant.
Jakeman Business Solutions in Australia issued a lessons learned report from Cyber Storm III that was posted on the Australian CERT site. It is hard to be too negative about an exercise like Cyber Storm since it does open some eyes and communication channels. Results for money spent would be the question. A large part of Cyber Storms is the PR. It is pre-ordained to be a success and result in a lot of positive articles.
The translation is not great, but here is an article talking about a worm/virus possibly affecting the lightning protection system in the Beijing to Shanghai high speed train. Can’t tell from the translation why they believe it is caused by a worm.
The US Government Accountability Office (GAO) put out a report/testimony titled “Cybersecurity: Continued Attention Needed To Protect Our Nation’s Critical Infrastructure“. These macro, big picture reports are probably necessary to move things forward, albeit slowly, in the USG, but they provide little or no new information or help for the ICS or ICS security community.
Tweet of the Week