JOIN OMAC WORKGROUP ON SECURING REMOTE ACCESS FROM CYBER ATTACKS
Collaborate with industry professionals and explore how to better protect the shop floor by joining the workgroup hosted by the Organization of Machine Automation and Control (OMAC)
Recent ransomware attacks have put pressure on industries to thoroughly review their policies around access for remote support. Protecting automation endpoints from attacks taking advantage of remote connectivity is a vital concern for businesses that rely on input from their Information Technology (IT), Operational Technology (OT), and Security professionals.
The OMAC “Practical Guide for Remote Access to Plant Equipment” was written to provide useful information on key elements of remote access from various perspectives, including manufacturers, machine builders, system integrators, and technology providers. To expand and update the guide, OMAC is now hosting a second workgroup that will create an addendum focused solely on cybersecurity and those areas of remote access that require protection. The methods include:
- Direct VPN
- Converged Network
- Cell Modem Access
- Black Box
- External Managed Secure Network
- Technician Access
ei3 is once again leading this workgroup and plans to focus on different methods for connecting remotely and how these can be configured to provide protection from cyberattacks.
The first session is scheduled for September 22nd at 10 am EST. The following sessions will be held every 2 weeks with the final session scheduled for November 17th. A review of the material to be included in the guide will be held on December 15th and will be open to all participants. The release date is set for January 2022.
The five sessions will follow the format established by the first workgroup and will include input from a number of cybersecurity experts. OMAC members interested in participating can join the workgroup alongside the original members who collaborated to create the guide.
All workgroup members will meet virtually for 45 minutes every 14 days starting 22nd September, 2021.
|Introduction, agenda review
|Vetting risks associated with external resources
|Risks associated with external network connections
|Navigating and connecting through internal OT Networks
|Isolating and validating the connected equipment
|Review of the report and final approval
In order to be extremely efficient and reduce the burden on participants, there will be a core group of experts that will organize the information collected and create summary material to be sent to the members for review and editing.
Companies that attended Remote Access Workgroup - Part 1
- Dole Vegetables
- Frito Lay – Pepsico
OEMs AND ASSOCIATIONS
- Durr USA,
- ID Technology
- ITW Hartness
- Mettler Toledo
- Nordson Corporation
- Martin CSI
- Outlier Automation
- PREMIER System Integrators
- CIPA GmbH
- EtherCAT Technology Group
- Mitsubishi Electric Europe B.V.
We hope that you consider joining this activity as your input is valuable
please email email@example.com