WisePlant – A WiseGroup Company
Season 1 Episode 2

Episode 2 – Mastering Industrial Cybersecurity Risk Assessments

Summary

In “Episode 2 Full Interview,” Angel and Max delve into the complexities of industrial cybersecurity and the critical role of risk assessments. They provide valuable insights on how to identify and address vulnerabilities in control systems to prevent potential cyber threats from escalating into serious consequences. The discussion covers the differences between IT cybersecurity and industrial cybersecurity, emphasizing the importance of a consequence-based approach. The speakers highlight best practices for performing risk assessments at various stages of a system’s lifecycle, adhering to the ISA/IEC-62443-3-2 standards, and the necessity of integrating risk disciplines within organizations. They also explore common pitfalls companies encounter, such as neglecting proper risk assessments and misapplying IT methods in industrial settings. This videocast is an essential resource for professionals looking to enhance their understanding of industrial cybersecurity and implement effective strategies to safeguard their operations.

  • 0:00 Introduction to Risk Assessment
  • 1:28 Welcome and Introduction of Max
  • 1:42 Importance and Basics of Risk Assessment
  • 2:54 Risk Assessment Methodologies
  • 3:35 ISA 99 Recommendations and Stages
  • 4:50 Benefits of Managing Cybersecurity Risk
  • 6:28 Difference Between Cyber Incidents and Consequences
  • 8:23 Culture and Training in Industrial Cybersecurity
  • 9:43 Calculating Return on Investment and Total Cost
  • 10:38 Generic Risk Formula for Cybersecurity
  • 12:14 Controversy Over Risk Calculation Methodologies
  • 14:36 Preventing Consequences Through Design
  • 17:16 Best Methodology for Risk Assessment
  • 18:09 Key Requirements for Effective Risk Methodology
  • 22:04 Integration of Risk Disciplines
  • 23:30 Importance of Preventing Consequences
  • 24:26 Industrial Cybersecurity as a Business
  • 26:32 CrowdStrike Incident Analysis
  • 27:18 Internal Decision-Making in Plants
  • 27:47 Common Mistakes in Risk Assessment
  • 30:24 Importance of Consequence-Based Approach
  • 31:03 Key Lessons from Risk Assessment
  • 34:03 Differences in Methodologies and Definitions
  • 35:27 Benefits of ISA 62443 Standard
  • 37:02 Importance of Robust Design
  • 38:45 Conclusion and Further Resources

The video cast “Episode 2 Full Interview” focuses on the importance of performing thorough risk assessments in industrial cybersecurity. It emphasizes the need for identifying vulnerabilities in control systems and mitigating associated risks. The speakers, Angel and Max, discuss the common misconceptions about industrial cybersecurity, differentiating between preventing cyber incidents and preventing their potentially disastrous consequences.

They highlight steps for performing risk assessments, integrating risk disciplines, and adopting a consequence-based approach, following the ISA/IEC-62443-3-2 standards. They also address common mistakes companies make, such as skipping risk assessments and incorrectly applying IT practices to industrial environments. The interview concludes with a discussion on the economic benefits of effective risk management and the critical role of proper design and knowledge in protecting industrial plants.

Episode 2 Clips

Individual clips have been produced covering specific topics within the interview.

Episode 2 Clip 2

Episode 2 Clip 2 – The true goals of industrial cybersecurity.

This clip discusses the importance of industrial cybersecurity in preventing consequences rather than just incidents. It emphasizes the need for ...
Episode 2 Clip 1 - The importance of Risk Assessment.

Episode 2 Clip 1 – The importance of Risk Assessment.

This video cast focuses on the importance of risk assessment in industrial cybersecurity. The speakers discuss the significance of identifying ...

About the author: Maximillian G. Kon ISA Qualified Instructor Qualified Instructor ISA Groups Member

Get Involved & Participate!

Welcome to WisePlant
Industrial Cybersecurity and Safety Solutions

Comments

No comments yet