Collaboration key to protect critical infrastructure from cyberthreats

25th January 2019

By: Schalk Burger

Creamer Media Senior Deputy Editor

     

Font size: - +

Electrical engineers and those involved in the power generation sector play a critical role in bolstering power operations against intruders. However, the collaboration and support of corporate management and information technology (IT) departments are essential to mitigate cyberthreats, says energy management multinational Schneider Electric Energy Southern Africa VP Taru Madangombe.

Many electricity plants believe that their networks are isolated and secure, but without ongoing audits and intrusion detection, that perception could be a delusion, he adds.

“Utilities must revise their attitudes towards cybersecurity by highlighting it as a pressing need rather than an afterthought. Hackers tend to focus on attacking critical infrastructure industrial processes, rather than physical assets.”

Investment in prevention will have a far greater payback than investment in detection and removal, and, although investment to ward off immediate threats remains crucial, focusing on activities that prevent attacks reduces the need for future detection and removal expenditure, he emphasises.

A utility’s management must guide the development of a security policy that will set organisational security priorities and goals, because few companies have the resources to bolster all processes against all possible threats, he explains.

Departments working together enable project engineers to understand the security risks and possible mitigation strategies, while the IT department, which brings much of the security expertise, must understand the need for realtime availability to keep units online.

Further, the growing demand for open information sharing between business and production networks increases the need to secure transactions and data. For power-generating companies, the consequences of an attack could have a widespread impact and the need for cybersecurity grows even more pressing, says Madangombe.

“The open and interoperable nature of current industrial automation systems – many of which use the same computing and networking technologies as general-purpose IT systems – requires engineers to pay close attention to network and cybersecurity issues.”

Additionally, threats can come from external or internal sources, including terrorists, disgruntled employees, environmental groups or cybercriminals.

Edited by Martin Zhuwakinyu
Creamer Media Senior Deputy Editor

Comments

The content you are trying to access is only available to subscribers.

If you are already a subscriber, you can Login Here.

If you are not a subscriber, you can subscribe now, by selecting one of the below options.

For more information or assistance, please contact us at subscriptions@creamermedia.co.za.

Option 1 (equivalent of R125 a month):

Receive a weekly copy of Creamer Media's Engineering News & Mining Weekly magazine
(print copy for those in South Africa and e-magazine for those outside of South Africa)
Receive daily email newsletters
Access to full search results
Access archive of magazine back copies
Access to Projects in Progress
Access to ONE Research Report of your choice in PDF format

Option 2 (equivalent of R375 a month):

All benefits from Option 1
PLUS
Access to Creamer Media's Research Channel Africa for ALL Research Reports, in PDF format, on various industrial and mining sectors including Electricity; Water; Energy Transition; Hydrogen; Roads, Rail and Ports; Coal; Gold; Platinum; Battery Metals; etc.

Already a subscriber?

Forgotten your password?

MAGAZINE & ONLINE

SUBSCRIBE

RESEARCH CHANNEL AFRICA

SUBSCRIBE

CORPORATE PACKAGES

CLICK FOR A QUOTATION