With the water industry embracing new technologies, cyber security threats are an unfortunate reality. WASA talks to Johan Potgieter, cluster industrial software leader, Schneider Electric, about securing water operations.

- Connected products (hardware that connects to a SCADA system or the cloud) Here, cybersecurity measures would be implemented to prevent unauthorised people from controlling the drive.
- Edge control (data storage, SCADA system) Routers, switchers, software, user security enablement and two factor authentication can be implemented.
- Apps and analytics (cloud platforms) Gateways, and protocol secure connect can be installed.
Before proposing a cyber security solution, we always start with an assessment to understand a client’s needs. Cyber security can be daunting due to the vast number of available products. We evaluate a client’s network, system architecture, policies and procedures, industry compliance, risk assessment, security assurance level and a gap analysis.
The next phase is the design phase where a small cyber security agenda programme is developed and we list projects that need to be implemented, their cost and duration. Step three is the implementation phase that covers an entity’s procurement, staging, system, commissioning, end user training, hardware and software, backups and data loss prevention. From there, Schneider Electric will continue to partner with the company, monitoring the cyber security policies and programmes in place as well as making sure that all systems are up to date and tested regularly and employees are regularly trained. What misconceptions do companies have regarding cyber security? The first misconception is that an entity is too small to implement cyber security measures. Small sized entities are prone to data loss, business disruption and intellectual theft. The next misconception is that only IT should have cyber security. The water industry is increasingly relying on operational technology (OT) like sensors, PLCs and SCADA systems and OT is being connected to IT. OT assets have a long-life cycle of several years or more, and their underlying operating systems tend to be more dated compared to IT assets which are routinely updated and replaced. This makes them particularly vulnerable to attacks that arise from IT issues, as the OT system could contain software loopholes that have not been patched. How does Schneider Electric stay up to date with evolving cyber security threats? We have developed strong partnerships with various companies such as Fortinet. Schneider Electric also has a dedicated cyber security business unit that constantly updates all software and tests for potential threats. There are 3700 engineers and cyber security specialists worldwide that constantly monitor and test our systems and our clients’ systems against cyber security threats. Watch: https://www.linkedin.com/feed/update/urn:li:activity:6980823373115260928