Electrician in blue helmet checking control panel wiring for safety compliance.
| |

IEC 62443-3-2 Risk Assessment Workflow

Critical infrastructure faces a growing number of security threats.. Critical infrastructure typically relies on Industrial Automation and Control Systems (IACS) and other non-IT components, often referred to as “Operational Technology.” To effectively assess cybersecurity risks within operational technology (OT) systems, adhering to the internationally recognized IEC 62443 standard is best practice. IEC 62443-3-2, part of…

DKE

This morning I’m on the way to Frankfurt for ICS – Informatik Consulting Systems participating at a DKE security working group meeting regarding standardisation of railway security.

Investigation of cyber-attack on Polish rail network

The Polish Press Agency (PAP) reports a cyber attack on the Polish rail network in the north-west of the country in Szczecin. A BBC article reports: “Hackers broke into railway frequencies to disrupt traffic in the north-west of the country overnight, the Polish Press Agency (PAP) reported on Saturday.The signals were interspersed with recording of…

| |

How railway cyber security works in a nutshell

Step 1: Plan Security Management: This is the first step in the process, indicating the importance of planning and managing security measures effectively. Step 2: Security Risk Analysis (IEC 62443-3-2): The second step involves conducting a security risk analysis in accordance with the IEC 62443-3-2 standard. This step is crucial for identifying potential security risks…

Stefan Karg sitting on a staircase outside of a building with a glass wall.

What’s happening in the German security & AI startup sector?

Tomorrow is the final of the “Deutscher Startup-Pokal” for the security and AI sector, organised by GFFT e.V.. 🧔I have been asked to be part of the jury for the security startups that will be pitching tomorrow: 💡 sematicon AG💡 Cybervize💡 ONEKEY Together with the other expert jury members, I will be asking questions about…