
![]() |
Charlotte Stonestreet
Managing Editor |
Home> | IIot & Smart Technology | >Cyber Security | >Virtual summit warns against cyber attack complacency |
Virtual summit warns against cyber attack complacency
27 April 2023
OVER 800 cyber security delegates recently attended ABB’s Ransom-Aware OT Defense Summit, organised in partnership with the global technology advisory board Industry IoT. The event focused on strategies to reduce risk of ransomware attacks and identify security threats to critical infrastructure.

The World Economic Forum’s Global Cyber Security Outlook 2022 reveals that 80% of cyber leaders believe ransomware is a dangerous and evolving threat – with 50 percent indicating it is one of their greatest concerns when it comes to cyber threats.
“The likelihood of being attacked is no longer a matter of ‘if’ but ‘when’. Being complacent when it comes to cyber security can be as dangerous as an attack itself, and not being prepared is no longer an option,” said Ragnar Schierholz, global cyber security portfolio manager at ABB.
During the event, ABB launched its “Defense in Depth” playbook which includes a recommended risk reduction roadmap for customers and outlines strategies that leverage multiple security measures and defensive mechanisms to protect systems and data from vulnerabilities.
“Defense in depth is a tried and tested strategy that can be universally applied to reduce cyber risk,” said Joseph Catanese, cyber security practice lead at ABB and author of the playbook. “We have created a guide that shares examples of best practice, with a focus on reducing the surface area of vulnerability. To explain it better, let’s visualise a dartboard which represents all the openings an attacker can use to access a machine or system. Each dart that lands on the dartboard is a successful attack. The larger the dartboard, the higher the probability that a dart will stick to the board. However, reducing the surface area will make it more difficult to successfully land on the board.”
The efficacy of the defense in depth methodology has been widely acknowledged. The National Institute of Technology (NIST) recommends using it from the very start through to the design of security and privacy architectures. The International Society of Automation (ISA) refers to it as a superior approach to achieving security objectives.
“This methodology will help organisations find the best approach to industrial cyber security, to successfully reduce risk of cyber attacks, and therefore downtime, while enabling digitalisation,” said Curt Dukes, executive vice president and general manager at the Center for Internet Security (CIS).
ABB’s summit brought together industrial cyber experts and technology leaders from companies including IBM, Cisco, Boston Consulting Group, Johnson Matthey, BASF Digital Solutions, Norsk Hydro and Boliden.
“Our research shows we still have a lot of work to do to secure our modern connected society, but also that we can’t ‘do it all’ and so need to choose wisely where our focus goes. What is clear is that everybody has the same fear, uncertainty and doubt around what we do not know, and about which doors and windows of their technology castle have been left open,” said Derek Harp, Founder and Chairman of The Control System Cyber Security Association International (CS2AI), who attended to unveil the second annual Control System Cyber Security Report.
To download ABB’s “Defense in Depth” playbook, click campaign-pa.abb.com/l/961062/2023-02-28/3s8m5
- Remote support with augmented reality
- ABB divests UK technical engineering consultancy
- ABB celebrates 20-year milestone in DCS leadership
- ABB & Ericsson pave way for digital transformation
- Energy management user experience enhanced
- Register for the webinar: Energy efficiency in hazardous areas
- ABB acquires R&D engineering company
- Bringing AI to asset management
- ABB & Zume to accelerate transition away from single use plastics
- Driving smart manufacturing in China's automotive industry
- Protect your ICS from cyber-attacks
- Secure data handling
- Cyber security wake-up call
- Serial-to-Ethernet server
- How secure is your ERP system?
- Malware targets industrial safety systems
- Protects controllers from manipulation
- Cyber inventory solution
- Network rental scheme
- Security flaws found in power grid systems