June 25, 2020: NEW HONEYWELL FORGE FEATURES HELP PROTECT FACILITIES FROM CYBER THREATS
Honeywell today announced the latest release of Honeywell Forge Cybersecurity Suite that includes several enhancements to help ensure business continuity in the face of mounting cyberthreats, uncertain global business conditions and continued supply chain disruption associated with remote operations.
The new Honeywell Forge Cybersecurity Suite release (R200) incorporates new features such as enhanced industrial-grade remote access, increased asset discovery capabilities with active and passive functionality and improved cybersecurity risk monitoring.
Sept. 25, 2019: Honeywell Unveils New Software Platform To Simplify, Strengthen And Scale Industrial Cybersecurity
Honeywell Forge Cybersecurity Software resolves common security pain points for operational technology (OT) and Industrial Internet of Things (IIoT) to better protect customer sites from cyberthreats and rising security costs across the enterprise. Honeywell Forge improves cybersecurity performance—at a single site or across multiple sites—by increasing visibility into vulnerabilities and threats, enabling proactive action to mitigate risks and improving cybersecurity management efficiency.
Feb. 4, 2019: Honeywell Introduces First Industrial Cybersecurity Solution to Guard Against Malicious USB Device Attacks
New Secure Media Exchange (SMX) release goes beyond malware detection to identify next wave of USB attack types, keeping human authentication part of security. SMX now includes patent pending capabilities to protect against a broad range of malicious USB device attacks, which disrupt operations through misuse of legitimate USB functions or unauthorized device actions.
Nov. 1, 2018: New Honeywell Cybersecurity Research Reveals That Usb Devices Pose a Significant Threat to Industrial Facilities
New, first-of-its-kind research released today by Honeywell (NYSE: HON) shows that removable USB media devices such as flash drives pose a significant – and intentional – cybersecurity threat to a wide array of industrial process control networks. Data derived from Honeywell technology used to scan and control USB devices at 50 customer locations showed that nearly half (44 percent) detected and blocked at least one file with a security issue. It also revealed that 26 percent of the detected threats were capable of significant disruption by causing operators to lose visibility or control of their operations.
Oct. 02, 2018: Honeywell Launches New Industrial Cybersecurity Services to Address Customer Skills Gap
Honeywell has added new cybersecurity consulting services designed to help industrial and critical infrastructure customers identify and eliminate dangerous security weaknesses. The Honeywell CyberVantage™ Security Consulting Services portfolio now includes Penetration Testing, providing active “white-hat” hackers who exploit customer defenses in order to fix them. It also now offers System Hardening to reduce software vulnerabilities and assist customers in safely complying with global Center for Internet Security (CIS) industry benchmarks.
June 18, 2018: Honeywell Expands Managed Security Services to Help Customers Keep Pace with Industrial Cyber Security Threats
Honeywell (NYSE: HON) today introduced CyberVantage Managed Security Services to help its customers enhance their industrial control system (ICS) capabilities and increase protection against the growing threat of cyber security attacks. The new services build on Honeywell’s legacy portfolio of cyber security managed security services offerings and add new security analytics, device management and regionalized support services.
June 5, 2018: Honeywell Announces Multi-Site Industrial Cyber Security Solution to Meet Needs of Connected Operations
Honeywell (NYSE: HON) today announced a software solution to provide cyber security to industrial customers who manage diverse process control networks, sites and vendors. As customers continue their digital transformation and their industrial sites become more connected, integrating cyber security has become even more critical. The multi-site solution for cyber security management is based on Honeywell’s ICS Shield™, which provides a top-down operational technology (OT) security management solution for securing connected industrial control system (ICS) environments.
April 25, 2018: Honeywell Inaugurates Its First Asian Industrial Cyber Security Center in Singapore
Honeywell (NYSE: HON) today opened its first industrial cyber security center of excellence (CoE) in Asia. The center was developed with the support of the Singapore Economic Development Board (EBD) and designed to help defend the region’s industrial manufacturers against evolving cyber security threats.
February 13, 2018 : Honeywell Launches First Industrial Cyber Security Center Of Excellence In The Middle East
Honeywell (NYSE: HON) today announced the launch of its first industrial cyber security center of excellence (COE) at its Middle East headquarters in Dubai. The new COE is a pioneering technology center with a safe off-process environment to test and demonstrate process control network vulnerabilities and threats, train customers with real-time attack simulations and provide advanced customer consultations.
December 6, 2017 : Honeywell survey shows low adoption of industrial cyber security measures
Honeywell (NYSE: HON) today released a new study showing industrial companies are not moving quickly to adopt cyber security measures to protect their data and operations, even as attacks have increased around the globe. Almost two thirds of surveyed companies don’t monitor for suspicious behavior.
August 1, 2017 : Addition of Nextnine further strengthens Honeywell’s leadership in industrial
Honeywell (NYSE: HON) announced today that it has completed its acquisition of Nextnine Ltd., which was announced on June 13, 2017. Nextnine is a privately held, leading provider of industrial cyber security solutions. The business will be integrated into Honeywell’s Industrial Cyber Security group and will significantly strengthen Honeywell’s capability to offer multi-vendor, multi-site secure remote access, monitoring and support to protect industrial control systems and critical infrastructure against a growing threat of cyber attacks.
June 12, 2017 : Honeywell to Acquire Industrial Cyber Security Software Leader Nextnine
Honeywell (NYSE: HON) announced today that it has signed a definitive agreement to purchase Nextnine, a privately held provider of security management solutions and technologies for industrial cyber security. The addition of Nextnine’s industry-leading security solutions and secure remote service capabilities will enhance the Company’s existing range of innovative cyber security technologies and significantly increase Honeywell’s Connected Plant cyber security customer base.
June 8, 2017 : Honeywell Invests in Cyber Security Innovation Center in Asia Pacific
Honeywell (NYSE: HON) Process Solutions (HPS), with the support of the Singapore Economic Development Board (EDB), will establish a new industrial cyber security center of excellence (COE) for Asia Pacific in Singapore.The COE will feature a state-of-the-art cyber security research and development lab, an advanced training facility and a security operations center that provides managed security services.
April 4, 2017 : Honeywell Launches New Industrial Cyber Security Solution to Enable Secure Use of USB Devices
Honeywell (NYSE: HON) Process Solutions (HPS) today announced a new solution for industrial sites as they balance productivity and cyber security demands. Honeywell’s new Secure Media Exchange (SMX) protects facilities against current and emerging USB-borne threats, without the need for complex procedures or restrictions that impact operations or industrial personnel.
February 23, 2016 : Honeywell and Palo Alto Networks Team up to Protect Industrial Control Systems from Cyber Attacks
Honeywell Process Solutions and Palo Alto Networks®, the next-generation security company, today announced they will collaborate to boost the cyber security capabilities of control systems used by industrial facilities and critical infrastructure. This next-generation offering enhances Honeywell’s comprehensive portfolio of cyber security solutions including its Industrial Cyber Security Risk Manager platform.
June 24, 2015 : Honeywell and Intel Security Team to Secure Critical Infrastructure and Industrial Internet of Things
Honeywell Process Solutions and Intel Security today announced they will collaborate to bolster protection of critical industrial infrastructure and the Industrial Internet of Things (IIoT). Intel Security's McAfee® technologies will be integrated with Honeywell's Industrial Cyber Security Solutions, providing Honeywell customers with enhanced security software to protect their control systems from malware and misuse.
April 21, 2015 : Honeywell Technology First to Proactively Manage Cyber Security Risk for Industrial Sites
Honeywell Process Solutions today launched the first digital dashboard designed to proactively monitor, measure and manage cyber security risk for control systems for refineries, power plants and other automated production sites throughout the world that are at increasing risk of cyber attacks.
March 31, 2015 : Honeywell Expands Cyber Security Development Capabilities with new Research Lab
Honeywell Process Solutions announced the opening of the Honeywell Industrial Cyber Security Lab to advance its development and testing of new technologies and software to defend industrial facilities and operations such as refineries and manufacturing plants from cyber attacks.
November 11, 2014 : Honeywell survey uncovers 3 in 4 adults are fearful that cyber attacks could damage their country’s economy
A recent survey conducted by Ipsos Public Affairs Research uncovered that 36 per cent of respondents believed that it isn’t possible to stop all cyber attacks. A further similar amount reported they didn’t have faith in their country’s ability to keep up with cyber attacks because they felt governments and organisations are not taking these attacks seriously enough.
July 2, 2014 : Honeywell provides improved cyber security for QAFAC
Honeywell’s integrated control and safety solution, including a new fire and gas system, will improve automation at the plant and increase cyber security at Qatar Fuel Additives Company’s Mesaieed Industrial City plant, 50 kilometers south of Doha.
April 18, 2013 : Japanese industrial giant selects Honeywell cyber security solutions
One of Japan’s largest refining and petrochemical companies, Idemitsu Kosan, is modernizing its control systems at its Tokuyama Refining and Petrochemical Complex in western Japan. The site, which supplies energy and chemical raw materials, will deploy Experion® Process Knowledge System, Abnormal Situations Management, alarm management, and cyber-security solutions.
Binh Son Refining & Petrochemical Improves Cyber Security with Honeywell
With Honeywell’s MSS, security updates, BSR’s PCN are today better managed and constantly kept up to date. And with the MSS’s Secure Connection, an authenticated and encrypted Virtual Private (VPN) for Honeywell dedicated support engineers as well as Honeywell subject matter specialists to remotely troubleshoot security and maintenance issues, the site has seen reduction of downtime and more responsiveness to issues before further deterioration. Honeywell's Secure Media Exchange (SMX) further strengthens endpoint defenses by managing USB removable media and ports against cyber risk and unauthorized usage.
Cyber-Securing Honeywell PMT Sites
A wide range of Honeywell Process Solutions’ technologies and expertise underpin cyber security across Honeywell’s Performance Materials and Technologies sites, providing a robust but efficient solution for industrial plants.
Total Improves Cyber Security with Managed Security Services
With Managed Industrial Cyber Security Services, the Port Arthur Refinery has greater visibility into the cyber security and system conditions of its PCN architecture.
Honeywell Migration Solutions Help Saudi Electricity Company Revitalize Control System and Address Cyber Threats
The project was delivered with the latest hardware and software platforms and yielded higher reliability, enhanced performance and improved safety with the cyber security implementation.
U.S. Power Company works with Honeywell to perform a SCADA cyber security vulnerability assessment
Honeywell's cyber security assessment services helped a US power company to assess existing cyber security risks, abide by corporate standard of audit and review, and prioritize the tasks they needed to execute.
Cyber security vulnerability assessment reduces risks to gas pipeline operation
As a result of Honeywell’s cyber security vulnerability assessment solution, a natural gas pipeline company was able to empirically identify and quantify all of the steps required to improve the security and reliability of its natural gas distribution pipeline network, and therefore increase the uptime and availability of its system.
Honeywell helps Canadian power company design secure network for industrial environment
A Canadian power company was embarking on an environmental monitoring project at a coal-fired generation facility that involved the bridging of two control systems with their business network. The company required an expert consulting firm to address their security and integration issues. Honeywell advised the power company to design a multi-layered defense-in-depth network.
If you want to protect your Industrial Control Systems (ICS), you must learn to understand how hackers think and act. Cybersecurity risks change quickly. To keep industrial processes safe, operators need to know how to anticipate, prevent and defend against threats to their control systems.
Honeywell’s Red Team and Blue Team ICS Cybersecurity training provides an unrivalled insight into the hacker’s mind from an operational technology (OT) perspective. Our experts don’t just provide in-depth insights into cybersecurity threats; they give you first-hand experience battling them, letting you go head-to-head with live adversaries.
In a cutting-edge computer simulated training environment, you can practice your skills in turn-based contests. Blue Team defenders tackle Red Team attackers in realistic operational settings and real-world scenarios.
Trainees can see common attack sequences played out and how hackers look to exploit vulnerabilities, avoid detection and respond to countermeasures. It’s a unique opportunity to gain a deeper understanding of how hackers think and behave.
Defenders can then put their strategies for identifying and responding to attacks into practice.
In a four-day intensive course, Honeywell’s experts take trainees through all the key concepts:
• How all the cybersecurity pieces work together
• Practical industrial cybersecurity concepts
• Emerging trends in cyber attacks
• Vulnerabilities and attack vectors specific to industrial control systems
• Methods for responding to, adapting to and defending against active attacks
• Identifying areas of vulnerability within the organization
• Reporting and recommending countermeasures
Trainees will learn tools and techniques, such as reverse engineering, log and memory analysis, cyber forensics, vulnerability scanning, penetration testing and incident response – all from seasoned professionals and experts in both cybersecurity and operational technology.
They can then put all they’ve learned in the classroom into practice, honing their skills and learning to respond under pressure. It’s a unique experience for cybersecurity and plant managers, as well as IT security staff, engineers, operators, administrators and anyone else responsible for OT security.
To find out more about the training, please contact Honeywell Cybersecurity team.
White Paper: HONEYWELL CYBERSECURITY REPORT: USB HARDWARE ATTACK PLATFORMS
USB Threats are More than Malware
White Paper: USB Security - Myths vs. Reality Latest USB Security Threats & Best Practices to Follow
In this White Paper, we discuss about what makes USBs such a successful attack vehicle, advanced USB threats, USB Security - Myths vs. Reality and recommended best practices.
eGuide: Overcoming the Industrial Cybersecurity Skills Gap Facing the Process Industries
There is a predicted global shortfall of 3.5 million cybersecurity jobs by 2021, up from 1 million openings last year. On top of that, 51 percent of organizations report having a problematic shortage of cybersecurity skills in 2018, up from 45 percent in 2017. In this eGuide, we discuss some of the best practices that enterprises and their boards can consider to tackle the ever-increasing skills gap.
White Paper: Staffing for Cybersecurity: 5 Considerations for Plant Managers
In this white paper, we detail five key considerations for plant managers, drawn from the scope of work for defending industrial networks found in the NIST Cybersecurity Framework: Identify, Protect, Detect, Respond and Recover.
White Paper: How to Leverage Cyber Security Assessments to Attract the PCN Investments You Need
This white paper articulates pragmatic steps that operational engineering teams can take to attract the business investments they need to modernize their industrial control system environments - and make security an enabler instead of an inhibitor.
Honeywell Industrial USB Threat Report: Universal Serial Bus (USB) Threat Vector Trends and Implications for Industrial Operators
With increasing pressure to limit network access to industrial control systems, industrial plant dependence upon USB removable media to transfer information, files, patches, and updates has been greater than ever. In context of these USB security concerns and ongoing threat vector changes, researchers from Honeywell’s Industrial Cyber Security team analyzed USB usage and behavioral data from live production sites globally.
Article Reprint: What Are the Financial Savings from a Refinery Cyber Security Program?
In this Hydrocarbon Processing special focus article, the authors Tom Ayral from Honeywell and Mark Fligner from Liberty International Underwriters, share a first-pass financial estimate of the savings resulting from the implementation of a cyber security program for a 100-Mbpd refinery.
FIVE BIG REASONS Why Industrial Companies Should Invest in Cyber Security Now
Most industrial enterprises and manufacturing companies are by now fully aware that they are facing more serious threats to their cyber security than ever before. This white paper examines five compelling reasons why enterprises and their boards should take steps now, instead of dealing with the considerable and often underestimated consequences later.
LNS Study: Putting Industrial Cyber Security at the Top of the CEO Agenda
Study reveals low adoption of cyber security capabilities and technology among industrial companies despite the increasing number of global industrial attacks and changing threat landscape. The study suggests that cyber security must be part of a CEO’s agenda to ensure the fast and effective long-term deployment of strategies and technologies. It also recommends three immediate actions.
Remediating Identified Risk and Reducing Future Risk -
Are you equipped to prioritize and address the cyber security risks in your industrial control environment? Honeywell offers a free eBook to help you remediate identified risks and reduce future risks.
Science Fiction Becomes Reality
Instead of continuously reacting to the onslaught of security incidents, battle-tested security professionals continue to stress the importance of building a solid security program. Read this eBook to discover how you can stay ahead of advanced cyber threats and reduce risks for your plant(s).
The Essential Guide to Industrial Cyber Security
Cyber security is an acknowledged and growing threat to the operational integrity of process manufacturing and other critical infrastructure sectors. To combat this fast growing threat it is important to make a conscious change from reactive to proactive measures. Here’s a roadmap to help organizations evolve from reactive to preventive, proactive strategies for risk management.
The Four-Step Guide to Understanding Cyber Risk
It is estimated that cyber risks costs the global economy up to $400 billion a year— maybe even more. For industrial control systems (ICSs) however, the risks are even more acute. Understand vulnerabilities. Identifying threats. Measuring consequences. Bringing it all together and measure risk. This four-step guide will help you identifying cyber risks and addressing the cyber security gap.
Mitigating cyber security risks in legacy process control systems
Legacy control systems are more vulnerable to attacks than contemporary systems. Read this white paper to learn more about techniques for protecting legacy systems, the problems surrounding these techniques, and new methods for analyzing security.
Staying ahead of today's cyber threats
The increasing number of cyber security threats requires evolving approaches and tools to combat potential attacks. Read this whitepaper to learn how application whitelisting can be used to combat viruses and malware.
Application Whitelisting 101
Application Whitelisting is an effective tool for enhancing your "Defense in Depth" security strategy. With increasing numbers of attempted intrusions, cautionary tales of security breaches and the potential for resulting damages at your site, Application Whitelisting can be an important addition to your security arsenal.
Effective use of assessments for cyber security risk mitigation
This paper covers how cyber security assessments can be effectively used for risk mitigation and how they relate to the overall cycle of securing critical infrastructure.
Cyber security regulations: Pipe dream or reality?
This whitepaper recommends that pipeline operators shift from reactive to proactive and begin the process of adopting a long-term cyber security strategy before regulations become mandated.
Growing Risk of USB Threats To Industrial Systems
Honeywell industrial cybersecurity USB Threat Report -2020
Cyber Security Risk Management Infographic
Cyber threats to industrial control systems have rapidly emerged as a key risk to safety, efficiency and continued production across the process industries.
Securing Industrial Process against USB-Borne Threats
Since discovery of the Stuxnet computer virus, industrial organizations have struggled with finding secure ways to use and monitor removable media. Take a look at some interesting stats from the process industry and how to protect against USB-borne threats.
Industrial cyber security risk is on the rise, and reducing it is critical to a company's operational and production goals. Honeywell Industrial Cyber Security Risk Manager can help companies effectively migrate and rapidly respond to cyber vulnerabilities and threats.Download PDF
Industrial Cyber Security: Perception vs. Reality.
Usher in Cyber Security Awareness Month with knowledge to fight cyber threats this October. Take a look at intriguing findings from a study that compares leading industry threat research with our own firsthand observations gleaned from hundreds of cyber security engagements worldwide.
Honeywell Forge Cybersecurity Suite Webinar: Japanese language version
Enable Business Continuity with Industrial Grade Secure Remote Access
Are you using VPN or Remote Desktop to access your control system (ICS/OT) remotely? Remote access is actively targeted by cyber attackers and their use could be endangering the safety and reliability of the ICS/OT. With the global situation and travel restrictions, imagine critical skills unable to provide on-site support or respond to an operational or cybersecurity event? Industrial operators are quickly evaluating remote access solutions as part of their business continuity planning to remotely support and operate their ICS/OT.Watch Webinar
|ACL||Access Control List|
|AES||Advanced Encryption Standard|
|ARP||Address Resolution Protocol|
|Active Attack||Active attack is an assault on system security that derives from an intelligent threat, i.e., an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system Source|
|Adversary||An adversary is a malicious entity whose aim is to prevent the users of the computer system from achieving data privacy, system integrity and availability. Actual adversaries are known as attackers|
|Alert||An alert is a communication about a known cyber security issue, typically with details of how to mitigate the issue|
|BERT||Bit Error Test|
|BIND||Berkeley Internet Name Domain|
|BIOS||Basic Input/Output System|
|BSS||Basic Service Set|
|Blacklist (Application Blacklisting)||Application blacklisting, sometimes just referred to as blacklisting, is a network administration practice used to prevent the execution of undesirable programs. Such programs include not only those known to contain security threats or vulnerabilities but also those that are deemed inappropriate within a given organization. Blacklisting is the method used by most antivirus programs, intrusion prevention/detection systems and spam filters Source|
|Business Continuity Planning (BCP)||BCP involves keeping all essential aspects of a business functioning despite significant disruptive events, of which disaster recovery planning (DRP) is a subset of it.|
|Canaries||A Canary is an early test version of software, alluding to a Canary in a coal mine|
|CERT||Computer Emergency Response Team, sometimes aka Computer Security Incident Response Team. These are organizations, in APAC they are usually government-linked agencies, responsible for maintaining vigilance on cyber security threats and the need for creating awareness of such. Formerly, before CERTs evolved to such focus today, they were expert groups that handle computer security incidents. At national level, CERTs differ from one country to another in terms of their portfolio. Certain countries' CERTs are legislated with enforcement authority while others just at advisory functions.|
|Computer Network Defense Analysis||Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network in order to protect information, information systems, and networks from threats Source|
|CISO||Chief Information Security Officer|
|Critical infrastructure||Critical infrastructure are the assets, systems, and networks, whether physical or virtual, so vital to a country or company that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof. Source|
|DCS||Distributed Control System. For Honeywell DCS offerings, please click here|
|Denial of Service (attack)||A denial-of-service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users. A DoS attack generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a server host serving mutliple users connected in a network.
Perpetrators of DoS attacks typically target sites or services hosted on mission-critical servers, including DCS/SCADA systems, or high-profile web servers such as banks, credit card payment gateways, and even root name servers.
|DHCP||Dynamic Host Configuration Protocol|
|DNS||Domain Name System|
|Disaster Recovery Planning (DRP)||Disaster Recovery Planning involves a set of policies and procedures to enable the recovery or continuation of vital technology infrastructure and systems following a natural or human-induced disaster. Disaster recovery focuses on the IT or technology systems supporting critical business functions, as opposed to business continuity, which involves keeping all essential aspects of a business functioning despite significant disruptive events. Disaster recovery is therefore a subset of business continuity planning (BCP).|
|EAP||Extensible Authentication Protocol|
|Endpoint Protection||Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted. Source|
|FAT||Factory Acceptance Test|
|Firewall||A firewall is a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts. It is a network security system that controls the incoming and outgoing network traffic based on an applied rule set.|
|FTP||File Transfer Protocol|
|Governance||Governance, largely in the context of corporate and IT, focuses on compliance in an organization's management of its operations and processes - in the best interest of stakeowners and shareholders. Governance has its interest in the set of multi-disciplinary structures, policies, process and procedural controls implemented to order to meet the statutory and regulatory compliance, legal, risk and environmental requirements.|
|Heartbeat Signals||Heartbeat signals indicate the communication health of the system and is a periodic signal generated by hardware or software to indicate normal operation or to synchronize other parts of a system|
|Host Intrusion Detection Systems (HIDS)||Developed for mainframe computers, HIDS is the earliest type of intrusion software that monitors and analyzes the internals of a computing system and sometimes the network packets on its network interfaces|
|HTTP||Hypertext Transfer Protocol|
|IDPS||Intrusion Detection and Prevention Systems|
|ISASecure||ISASecure independently certifies industrial automation and control (IAC) products and systems to ensure that they are robust against network attacks and free from known vulnerabilities. Source|
|ISC||Internet Software Consortium|
|LAN||Local Area Network|
|LR-WPAN||Low-Rate Wireless Personal Area Networks|
|MAC||Media Access Control|
|Malware||Malware (short for malicious software) is any software used to disrupt a computers operation, collect sensitive data, or gain access to private computer systems. Also known as Badware|
|MISPC||Minimum Interoperability Specification for PKI Components|
|NAT||Network Address Table|
|NERC||North American Electric Reliability Corporation|
|Network security||The provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources|
|Network Intrusion Detection Systems (NIDS)||A network based device or software application that monitors network activities for malicious activities or policy violations and produces reports to a management station|
|OLE||Object Linking and Embedding|
|OPC||OLE for Process Control|
|OSI||Open Systems Interconnectivity|
|PCS||Process Control System|
|Penetration Testing||Penetration testing is often confused as "vulnerability assessment" (VA). Essentially, it is a further step into simulating the exploitation on a system vulnerability discovered in a VA. Its purpose is to confirm if a security breach or a catastrophic damage can really be inflicted on the system if it would have been a real cyber attack.|
|PLC||Programmable Logic Controller|
|PROFIBUS||Process Field Bus|
|Qualified Anti-malware Definitions||Testing and qualification of newly released anti-malware definition or signature files adds to system stability by identifying and restricting potential ICS conflicts before implementation on site.|
|Qualified OS Patch Updates||Testing and qualification of newly released Microsoft security updates adds to system stability by identifying and restricting potential ICS conflicts before implementation on site.|
|Remote Terminal Unit||A Remote Terminal Unit (or RTU) is a microprocessor-controlled electronic device that interfaces objects in the physical world to a DCS (distributed control system) or SCADA (supervisory control and data acquisition) system by transmitting telemetry data to a master system, and by using messages from the master supervisory system to control connected objects. For details of Honeywell's RTU offerings please click here|
|SCADA||Supervisory Control and Data Acquisition
– for Honeywell's SCADA offerings please click here
|Security Assessments and Audits||Security assessments are usually with the purpose to survey and review the security health or posture of a system, processes or an organisation's susceptibility to cyber security threats. Audits are essentially inspections on the state of compliance to governance requirement. While security assessments would promptly raise findings on vulnerabilities for quick remediation, audits will aim to report on non-compliances and systemic weaknesses to executive management for managerial actions.|
|Security Information & Event Management (SIEM)||SIEM technology provides real-time analysis of security alerts generated by network hardware and applications. SIEM is sold as managed services, software, or appliances and are also used to log security data and generate reports for compliance purposes. SIEM is primarily about real-time monitoring, correlation of events, notifications and console views, and secondarily about reporting of log data and long-term archiving.|
|SIS||Safety Instrumented System|
|SMTP||Simple Mail Transfer Protocol|
|SSL||Secure Sockets Layer|
|TCP||Transmission Control Protocol|
|TDEA||Triple Data Encryption Algorithm|
|UDP||User Datagram Protocol|
|USB||Universal Serial Bus|
|Vulnerability Assessment (VA)||In a vulnerability assessment, data is collected from the system and compared with documented issues to deduce if the system is vulnerable to any known exploits. "Documented issues" refer to vulnerabilities or systems weaknesses that have been discovered and therefore known and, hence, they have been documented and most probably made available to the public for awareness. VA can be easily confused as "Penetration Testing" which essentially can be the next step into simulating the exploitation on a system vulnerability discovered during a VA.|
|VPN||Virtual Private Network|
|WPA||WiFi Protected Access|
In this section we've provided a list of useful links to relevant websites. Bookmark this page so you can find it easier in the future.
|GIAC||Global Information Assurance Certification (GIAC) is the leading provider and developer of Cyber Security Certifications.||www.giac.org|
|ISACA||As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems.||www.isaca.org|
|ISA||The International Society of Automation is a leading, global, nonprofit organization that is setting the standard for automation by helping over 30,000 worldwide members and other professionals solve difficult technical problems, while enhancing their leadership and personal career capabilities.||www.isa.org|
|WIB||WIB – Process Automation Users' Association. WIB provides process instrumentation evaluation- and assessment services for- and on behalf of – its industrial user member companies.||www.wib.nl|
|VGB||VGB is a technical association for power and heat generation. It is a non-profit organization and a voluntary association of companies of power plant operators and manufacturers. VGB published the cyber security standard - VGB-S-175.||www.vgb.org|
|ANSSI||Agence Nationale de la sécurité des systems d'information. ANSSI core missions are to detect and early react to cyber attacks, prevent threats, advice governmental entities and operators of critical infrastructure and inform industry and general public about security threats and protective measures.||www.ssi.gouv.fr/en/|
|APCERT||APCERT (Asia Pacific Computer Emergency Response Team) is a coalition of CERTs and CSIRTs (Computer Security Incident Response Teams), from 13 economies across the Asia Pacific region to ensure internet security in the Asia Pacific region.||www.apcert.org|
|BSI||Federal Office for Information Security, Germany. BSI's goal is to promote IT security in Germany. It is the first and foremost central IT security service provider for the federal government in Germany.||www.bsi.bund.de|
|CERT Australia||CERT Australia is the national computer emergency response team, working with major Australian businesses, providing cyber security advice and support to critical infrastructure and other systems of national interest.||www.cert.gov.au|
|CERT-In||The Indian Computer Emergency Response Team (CERT-In), under the Department of Information Technology of Ministry of Communications and Information Technology, works to enhance the security of India's communications and information infrastructure through proactive action and effective collaboration.||http://deity.gov.in/content/icert|
|CPNI||Centre for the Protection of National Infrastructure. CPNI protects UK national security by providing protective security advice. Their advice covers physical security, personnel security and cyber security/ information assurance.||www.cpni.gov.uk|
|CNCERT/CC||National Computer Network Emergency Response Technical Team/Coordination Center of China. CNCERT/CC is a non-governmental non-profit cybersecurity technical center and the key coordination team for China's cybersecurity emergency response community.||www.cert.org.cn|
|ENISA||European Union Agency for Network and Information Security. It is the 'pace-setter' for Information Security in Europe, and a centre of expertise.||www.enisa.europa.eu|
|ICS-CERT||The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) operates within the National Cybersecurity and Integration Center (NCCIC), a division of the Department of Homeland Security's Office of Cybersecurity and Communications (DHS CS&C). NCCIC/ICS-CERT is a key component of the DHS Strategy for Securing Control Systems.||https://ics-cert.us-cert.gov/|
|OLF||The Norwegian Oil and Gas Association have established a number of guidelines in the areas of Competence, Employment, Environment, HSE & Operations, Integrated Operations and Industrial Policy. OLF 104 recommends guidelines for information security baseline requirements for process control, safety and support ICT systems.||www.norskoljeoggass.no/en|
|ICT QATAR||The National Standards for Security of Critical Industrial Automation and Control Systems by ICT Qatar focuses on the various controls for the security of critical industrial automation and control systems.||www.ictqatar.qa/en|
|NERC||The North American Electric Reliability Corporation (NERC) is a not-for-profit international regulatory authority whose mission is to assure the reliability of the bulk power system in North America.||www.nerc.com|
|ISS Source||Industrial Safety and Security Source is a web-based information provider devoted solely to keeping manufacturers current on safety, cyber and physical security news, products, features, applications and trends.||www.isssource.com|
|SC Magazine||SC Magazine arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face and establish risk management and compliance postures that underpin overall business strategies.||www.scmagazine.com|
|Security Magazine||Security is uniquely focused on solutions for enterprise security leaders. It is designed and written for business-minded executives who manage enterprise risk and security.||www.securitymagazine.com|
|Security Week||Information Security News, IT Security News & Expert Insights||www.securityweek.com|
|INDUSTRIAL CYBER SECURITY SOCIAL MEDIA LINKS|
|Honeywell Process Solutions on Twitter||Get the latest news and offerings from Honeywell Process Solutions||https://twitter.com/hwusers|
|Honeywell Process Solutions on LinkedIn||Stay up to date with news and job opportunities from Honeywell Process Solutions||https://www.linkedin.com/company/honeywell-process-solutions|
|Honeywell on YouTube||See the latest news and stories from Honeywell||www.youtube.com/user/Honeywell|
Honeywell SMX Walkthrough Demo
Honeywell SMX Walkthrough
Honeywell Forge Cybersecurity Software
Honeywell Forge brings together our industry-leading software into one, OT cybersecurity platform that standardizes critical security capabilities.
Honeywell Forge for Cybersecurity: Meet Cyber Expert – Sema Tutucu
Sema Tutucu could be a superhero because her job is to fight the bad guys. She's protecting critical infrastructure from cyberattacks. Are you ready to shape your future? #futureshaper
How Honeywell Helps Customers Manage Cybersecurity Risks
Sam Wilson, Global Product Marketing Manager for Honeywell Industrial Cybersecurity discusses about how Honeywell is helping customers effectively manage cybersecurity risks on their digital transformation journey with Mark Sen Gupta, Director of Research for ARC Advisory Group.
Honeywell’s Industrial Cyber Security Center of Excellence, Middle East
The center of excellence, located in Dubai, is a demonstration of Honeywell’s commitment to addressing the industrial cyber security needs of customers in the Middle East region. The state-of-the-art facility will strengthen regional industrial cyber security preparedness by providing a safe environment to test process control network vulnerabilities and training customers through real-time attack simulations.
Study: Putting Industrial Cyber Security at the Top of the CEO Agenda
This study by LNS Research reveals low adoption of cyber security capabilities and technology among industrial companies despite the increasing number and sophistication of global industrial attacks. The study suggests that industrial cyber security must be part of a CEO’s agenda to ensure the fast and effective long-term deployment of strategies and technologies. It also recommends three immediate actions.
Secure Media Exchange (SMX) - Industrial Cyber Security Solution for USB Protection
Secure Media Exchange reduces cyber security risk and limits operational disruptions by monitoring, protecting, and logging use of removable media throughout industrial facilities. SMX provides plant operators with unprecedented control and visibility into the secure use of USB and removable media by personnel and contractors, reducing cyber risk to process control networks globally. SMX provides the latest in advanced threat detection capabilities to critical infrastructures and manufacturing facilities.
Secure Media Exchange (SMX) - Infographic Video on USB-Borne Threats
Industrial facilities are humming with people & productivity, but it takes hand-carried USB device updates to stay operational. Malware via removable media is ranked as the #2 ICS threat. Secure Media Exchange (SMX) reduces cyber security risk and limits operational disruptions by monitoring, protecting, and logging use of removable media throughout industrial facilities.
Take a tour of Honeywell’s new cyber security research lab
Step inside the brand new Honeywell Industrial Cyber Security Lab in Duluth, Georgia. The lab's world-class environment is used to develop and test new cyber security solutions for the industrial market. It is another investment in Honeywell's ongoing commitment to help customers defend the availability, reliability and safety of their industrial automation and control systems.