Hackers of India

Managing Cyber Risk in the Connected Environment

 Gaurav Shukla   Ramachandra Hegde   Sudarshan Rajagopal  , Kabir Mulchandani 

2018/03/03


Presentation Material

AI Generated Summarymay contain errors

Here is a summary of the discussion:

The conversation revolved around the topic of cybersecurity and safety in industrial control systems, (ICS) in traditional industries such as cement and steel. The panel discussed the challenges of defending legacy ICS that run on outdated operating systems like Windows Server 2003 or Windows XP.

One of the panelists emphasized that human safety is the top priority, followed by business considerations. They mentioned a program aimed at systematically isolating potential security threats in these systems without causing damage. The goal is to patch or replace these legacy systems, a process that requires careful planning and execution.

Another question focused on how field service providers can move from legacy systems to cloud-based solutions while ensuring security. The panelist explained that they are working on a program to migrate certain systems to the cloud using secure channels and adhering to stringent security norms.

The discussion also touched on the importance of architectural analysis in heterogeneous environments to identify potential threats and vulnerabilities. Additionally, the panelists highlighted the need for equal emphasis on people, process, and technology when it comes to cybersecurity.

Finally, a question was raised about whether chips can be developed that cannot be broken into, but no clear answer was provided.

The session concluded with a summary of the key takeaways, including:

  1. The importance of considering people, process, and technology in cybersecurity.
  2. Conducting thorough architectural analysis in heterogeneous environments to identify threats.
  3. Prioritizing human safety above business considerations.
  4. The need for talent development to address cybersecurity risks.

Overall, the discussion emphasized the complexities and challenges involved in securing industrial control systems, particularly those with legacy infrastructure.