The importance of collaboration between IT and automation to mitigate cyber risks to critical infrastructure was highlighted at a security summit held at the Grosvenor House Hotel in London this month.

Delegates from Rockwell Automation and its strategic alliance partner Cisco Systems along with the Centre for the Protection of National Infrastructure (CPNI) and delegates from across the critical infrastructure framework such as Severn Trent Water were welcomed by the US Embassy and The United States Department of Homeland Security.

Doug R Wylie, networks and security manager for Rockwell Automation said: “While many companies and organisations already appreciate the importance of IT security, at times the security of the automation system and critical assets are not as highly prioritised. Security threats to critical infrastructure are real and risks can be reduced through vigilance, successful teaming of IT and Engineering, and careful attention to detail.”

Paul King, Cisco Systems senior security advisor, added: “The security of critical infrastructure has been of concern for years. A growing number of publicised security breaches coupled with the discovery of the Stuxnet malware last year serve as stark indicators to asset owners that network security is both critical and requires constant attention.”

Andy Henton, Severn Trent Water asset strategy manager – waste water, provided an insight into the security challenges facing modern water suppliers and how they are being addressed. Severn Trent strives to mitigate security risk by employing a comprehensive security program that includes company policy, defined procedures, and both physical and cyber security controls such as layered security and defense-in-depth counter measures. In addition, Severn Trent Water works closely with automation vendors and the broader security community to recognise and mitigate risks and threats.

Rockwell Automation highlighted five steps to help improve the security of industrial control systems. These are: 1. Control who has access; 2. Employ firewalls and intrusion detection/prevention; 3. Patch and update your system; 4. Manage your passwords; 5. Turn the processor key(s) to Run mode.