Tag Archives: cybersecurity

Willem Ryan, AlertEnterprise
FST Soapbox

Cybersecurity: Risk Moves Squarely to Operational Technology

By Willem Ryan
No Comments
Willem Ryan, AlertEnterprise

Data breaches, ransomware attacks and now, operational shutdowns. Recent events bear out that cyber strikes are not reserved solely to data breaches and IT systems but now include Operational Technology (OT) and industrial controls to disrupt operations, distribution and the entire food supply chain.

JBS Foods, the one of the world’s largest meat producers, was leveled by a cyberattack in early June, affecting U.S. and Australia operations. In a public statement, the organization revealed that it paid the equivalent of $11 million in ransom in response to the criminal hack against its operations. “At the time of payment, the vast majority of the company’s facilities were operational. In consultation with internal IT professionals and third-party cybersecurity experts, the company made the decision to mitigate any unforeseen issues related to the attack and ensure no data was exfiltrated,” according to company documents.

There’s a security divide that shouldn’t be there—distinct lines between Cyber, OT and physical security teams that has resulted in disjointed and ineffective detection, mitigation and response to risk—forged by years of siloed departments.

It’s not a new problem—in fact the vulnerability of the critical infrastructure has been a discussion for decades. Moving to a converged approach across all departments, including HR, IT/cyber and OT/SCADA can effectively secure our most critical food production and distribution resources while actively enforcing compliance and company policies. Identity and Access is at the center of it all and the best way to holistically protect the enterprise.

In the example of high-profile enterprise Molson-Coors, a cyberattack in March centered on ransomware. In its SEC filing after the event, the beverage giant stated that the attack “has caused and may continue to cause a delay or disruption to parts of the company’s business,” which includes brewery operations, production and shipping.

The February attack on a Florida Water Treatment plant, hacked by compromise to a remote access software program on a facility computer, is still another stark reminder of the growing dangers of cyber-physical threats and that even employees can be part of the problem.

You can see just how fragile and vulnerable our supply chains and critical business processes have become. Cybercriminals now realize how disruptive and lucrative attacks targeting these systems can be so they will continue unabated without immediate stop-gaps.

Because these attacks have become blended and omni-present on every part of the critical infrastructure, executives need to move beyond IT-centric cybersecurity to minimize supply threats. This emergence of new attack vectors has other implications. It highlights the dire need to transition from siloed IT, OT, HR and physical security to a converged approach, yet executives remain at odds with how to execute this while working in their own bubbles.

The threat has become even greater than the organization itself. According to predictions by Gartner liability for cyber-physical security incidents will “pierce the corporate veil to personal liability,” for 75% of CEOs by 2024.

Security Convergence Key Ingredient to Digital Transformation

As the food industry continues to digitally transform, systems and processes move to rapidly connect. Security convergence, centered around identity and access governance, links all these separate departments and operations, so communications and processes actively and collectively address and shore up risk preemptively. Events, exceptions, alerts, alarms and targeted attacks on all points, including the network, control systems and physical security can be integrated for a coordinated and cohesive response.

Securing our most important critical resource—the food supply chain—means correlating threats across underlying HR, IT, physical security and OT used in production and processing. Physical access control and identity now links to specialized plant applications like manufacturing execution systems (MES), plant historians and demand management from ERP that can deliver information directly to production. Monitoring insider and contractor access to modifying batch recipes provides alerts and detection when the addition of a preservative has been suppressed, causing a contaminated batch to be produced, for example.

Integrating seamlessly with HR applications, converged software further prevents insider threat by automating background checks and risk analysis during the on-boarding and off-boarding process for employees and contractors.

The threat landscape today demands a single solution to manage operational risk and security. The following just one example of how this converged approach works.

A fictitious company named Big Food was dealing with disgruntled production foreman Tom. Tom not only had physical access to the production floor, but was intimately familiar with the control system settings to configure recipes for the MES.

Security software’s real-time link to SAP SuccessFactors HCM provided critical real-time data that identified Tom’s history of workplace issues. When Tom accessed the plant area after his normal shift hours, the security platform detected that he was making unusual changes to the production settings to eliminate the addition of preservatives. An alert was immediately sent to security operations staff as well as the plant manager. Incident prevented, with huge savings from avoided downtime and protection from loss of reputation to the company brand.

The food and beverage industry must meet high quality standards and adhere to rapid production cycles to preserve nutrition value and freshness. Convergence and automation are the keys to achieving these goals. As OT and IT networks become increasingly interconnected, OT environments become more exposed to cyber-physical attacks, which can result in tainted products, downtime and revenue losses. Security solutions secure enterprise IT applications and plant applications deliver continuous monitoring that prevents sabotage, acts of terrorism and other malicious acts. There’s also the ability to manage other supply chain risks, including changes to master data and transactions as well as the movement of goods and arrival notifications requirements by the FDA.

Today’s malicious actors don’t think in silos but most companies still do. As security and technology leaders we are compelled to rise and meet the challenge. It’s clear that only a converged approach, beyond IT-centric cybersecurity, is the way forward.

Cybersecurity

As Cyber Threats Evolve, Can Food Companies Keep Up?

By Maria Fontanazza
No Comments
Cybersecurity

The recent cyberattack that shut down meat supplier JBS should be a wakeup call to the food industry. These attacks are on the rise across industries, and food operations both large and small need to be prepared. In a Q&A with Food Safety Tech, Brent Johnson, partner at Holland & Hart, breaks down key areas of vulnerability and how companies in the food industry can take proactive steps to protect their operations and ultimately, the consumer.

Food Safety Tech: Given the recent cyberattack on JBS, how vulnerable are U.S. food companies, in general, to this type of attack? How prepared are companies right now?

Brent Johnson, Holland & Hart
Brent Johnson, partner, Holland & Hart

Brent Johnson: Food companies are in the same boat as other manufacturers. Cyber threats are constantly evolving and hackers are developing increasingly sophisticated delivery systems for ransomware. Food companies are obviously focused on making and delivering safe and compliant products and getting paid for them. Cybersecurity is important, but it’s difficult for manufacturers to devote the resources necessary to make their systems bulletproof when it’s an ancillary part of their overall operations and a cost driver. Unfortunately, hackers only have one job.

We tend to think of big tech and financial services companies as the prime targets for ransomware attacks because of the critical nature of their technology and data, but food companies are really no different. Plus, unlike tech companies and the financial services industry, food companies haven’t, as a general matter, developed the robust defenses necessary to thwart attacks, so they’re easier targets.

Food Safety Tech: What is the overall impact of a cyberattack on a food company, from both a business as well as a consumer safety perspective?

Johnson: It may come as a bit of a surprise to those who don’t work in the food industry, but food production (from slaughterhouses to finished products) is highly automated and data driven. That’s one of the lessons of the JBS ransomware attack. The attack shut down meat processing facilities across the United States and elsewhere. I work in Utah and the JBS Beef Plant in Hyrum was temporarily shut down. JBS cancelled two shifts at its meatpacking operation in Greeley, Colorado where my firm has a large presence as well, because of the ransomware attack. So, the impact on a food company’s business from a successful ransomware attack is dramatic.

On the consumer safety side, a ransomware attack that impacts automated safety systems would cause significant problems for a food manufacturer. Software controls much of the food industry’s safety systems—from sanitation (equipment washdowns and predictive maintenance) to traceability (possible pathogen contamination and recalls) to ingredient monitoring (including allergen detection). Every part of a food company’s production system is traced, tracked, and verified electronically. A ransomware attack on a food maker would very likely compromise the company’s ability to produce safe products.

Food Safety Tech: What proactive steps should food companies be taking to protect themselves against a cyberattack?

Johnson: I wish there was an easy and foolproof system for food companies to implement to protect against cyber attacks, but there isn’t. The threats are always changing. The Biden Administration’s recent memorandum to corporate executives and business leaders on strengthening cyber defenses is a good starting point, however. The White House’s Deputy National Security Adviser for Cyber and Emerging Tech, Anne Neuberger, reiterated the following “Five Best Practices” from President Biden’s executive order. These practices are multifactor authentication, endpoint detection and response, aggressive monitoring for malicious activities on the company’s networks and blocking them, data encryption, and the creation of a skilled cyber security team with the ability to train employees, detect threats and patch system vulnerabilities.

Food Safety Tech: Are there specific companies within the food industry that are especially susceptible?

Johnson: Not really. Hackers are opportunistic and look for the paths of least resistance. That said, as can be seen from the recent Colonial Pipeline and JBS ransomware attacks, hackers have transitioned from the early days of going after individuals and small businesses to whale hunting. The money is better.

It’s important to observe that the recent attacks have been directed at industries that present national infrastructure concerns (oil, the food supply). There’s no evidence of any involvement by a foreign government in these attacks, but it’s a fair question as to whether the hackers, themselves, expect that the federal government will step in at some point to assist the victims of cyber attacks financially due to their critical importance.

Food Safety Tech: Where do you see the issue of cybersecurity and cyberattacks related to the food industry headed in the future?

Johnson: Other than the certainty that the attacks will increase in both intensity and sophistication, I have no prediction. It’s not a time for complacency.

Cybersecurity

Cyberattack on Meat Supplier JBS Forces Shut Down of Multiple U.S. Plants

By Food Safety Tech Staff
No Comments
Cybersecurity

On Sunday Brazil-based JBS was targeted by a cyberattack that forced the shutdown of its facilities in Arizona, Colorado, Michigan, Nebraska, Pennsylvania, Texas, Utah and Wisconsin. The ransomware attack affected servers that support the company’s IT systems in North America and Australia. It is suspected to have originated from an organization based in Russia, according to reports.

It is expected that most of the company’s beef, pork, poultry and prepared food plants will be operational today, JBS said in a statement last night. Thus far the company is unaware of any customer, supplier or employee data that has been compromised.

Cyberattacks coming from Russia have increased at a significant rate and are likely to continue. “The fact that this kind of activity is happening with a relatively high frequency and also all signs sort of leading back to Russia, that is very disturbing,” said Javed Ali, a former National Security Council director of counterterrorism, in an ABC News report. “I don’t think we’ve seen a period of this kind of high-intensity cyber operations from Russian soil directed against a variety of different U.S. targets arguably ever, unless the government has been tracking this and the public details of those types of operations haven’t been revealed before.”

Chris Keith, FlexXray
FST Soapbox

COVID-19: We’re In This Together

By Chris Keith
No Comments
Chris Keith, FlexXray

It’s no secret that the COVID-19 pandemic had a major impact on industries and individuals around the world. According to the World Health Organization, as of June 21, 2020, there have been 8,708,008 reported cases of COVID-19 globally, including 461,715 deaths. In a recent article by Forbes, healthcare contributor William Haseltine stated that we are gathering personal stories and statistics right now around COVID-19 survivors who have suffered permanent injuries from the virus. Many experts believe that COVID-19 is also an economic downturn trigger. Author and financial planner Liz Frazier says that even as recessions are a normal part of the U.S. economic cycle, lasting about five and a half years on average, the possibility of a recession starting due to the outbreak would be unprecedented.1 The COVID-19 pandemic is a natural disaster that rocked the world and is a reminder of how connected people are in a global economy.

As quarantine regulations and temporary closures happened across the United States, businesses had to mobilize quickly, pivoting their strategies, distribution efforts, products and beyond to accommodate the new safety measures and external pressures. The food and beverage industry was no different. Although food manufacturers were deemed essential in the United States by Cybersecurity & Infrastructure Security Agency (CISA), manufacturers had to adapt to a new normal during the shutdown.2 Some of the biggest changes that occurred in the food manufacturing industry include fluctuating customers, prices, product and ingredient availability, packaging, distribution, and food quality and safety.

Shifting Demand, Customers and Food Pricing

Sharp changes in food prices and product availability shocked supply and demand and impacted the entire food supply chain across the United States. According to the USDA, there were record levels of demand for food at grocery stores, and, on the supply side, there has been a reduced supply of meat products over the period of quarantine as meatpacking plants faced temporary closures, decreased slaughter pace, and slower production due to COVID-19 regulations.3 Poultry prices took a sharp dip and have been rebounding, hot dog prices are at an all-time high due to increased demand, and beef prices have been climbing due to scarce supply and limited fresh production. Food pricing fluctuation is one of the largest food industry impacts felt directly by the general public and the on-premise sector. Restaurants and bars were crushed by the skyrocketing ingredient prices and mandatory temporary closures due to COVID-19.

As restaurants, school cafeterias and hotels were temporarily shut down due to quarantine restrictions, the food manufacturing industry’s most prominent customers practically disappeared. Before COVID-19, the USDA reported that in 2018, restaurants provided approximately 50% of meals consumed on a daily basis, up from 41% in 1984.4 When COVID-19 hit, consumer trends showed a monumental shift to eating at home. During the height of the pandemic, more people ordered take out from fast-casual dining places and ate from home. A recently published study reveals survey findings that suggest American’s food habits are shifting, as 54% of respondents confirmed they are cooking more, and 46% of respondents, baking more.5 As customers and demand changed, products and packaging had to follow suit.

Scores of manufacturing facilities had to rapidly respond with different products to meet changing consumer demand, despite already being in mid-production for products for restaurant kitchens, cafeterias, and the like. Most of these large-scale and wholesale products would never make it to their original, intended destinations. Manufacturers swiftly adapted their production, creating retail-ready goods from product made or intended for restaurant or fast food supply. These food production facilities had to creatively find ways to change product packaging sizes, salvaging good product with take-home cartons and containers. Some processors pre-sliced deli meat for grocery stores around the country, as markets were unable to slice the meat in-store, dealing with restrictions on the number of people who could work at any given time. The food manufacturing industry showed great ingenuity, repurposing food and getting creative in order to keep the country fed and bridge the gap in convenience shopping that consumers have grown used to.

New Distribution Pressures

There were also disruptions in the food industry’s distribution channel, and the logistics of distribution were adversely affected. Facilities faced increased pressure to have tighter production turnarounds from new consumer behavior and out-of-stock situations as many markets dealt with temporary panic shopping at the beginning of the crisis. Food manufacturing facilities have always faced tight deadlines when dealing with fresh and refrigerated product. However, COVID-19 introduced new critical, immediate needs to the food supply, and, more than ever before, facilities were pressed for time to deliver. Some facilities didn’t have enough dock loading time, and certain cold storage facilities could not meet the raised demands for dock times, making it harder to get product through the distribution channel to consumers. Shipping and logistics came at a premium. Drivers and logistics companies were at capacity with their service offerings, and unable to mobilize to meet the needs of every manufacturing company.

On top of the pressures from consumer demand, manufacturing facilities had to procure PPE (personal protective equipment) in mass for all employees and adjust employee schedules to meet new national and state-wide quarantine restrictions that strained the system. The PPE requirements are part of the distribution logistics, as plants are unable to distribute safe product without adhering to the system’s regulations. Senior Vice President of Regulatory and Environmental Affairs for the National Milk Producers Federation, Clay Detlefsen, said in an article for Food Shot Global that the whole food industry’s system has been turned on its head, as manufacturers are concerned that if they start running out of PPE and sanitation supplies, they would ultimately be forced into shutting down their food processing plants.6

Regulating Food Quality and Safety

Perhaps one of the biggest concerns surrounding the food supply chain during the height of COVID-19 for both producers and consumers was food safety. While safety and quality are always a high priority in the food industry, rising concern around the transmission of COVID-19 became a new and unprecedented challenge for food quality experts. In February the FDA declared that COVID-19 is unlikely to pass through food or food packaging, but that didn’t stop public concern.7 It was critical for food manufacturers and producers to ease public fear, keep the food supply stable and eliminate foreign material contamination that would adversely affect consumers and brand reputation. A mass recall due to foreign material contamination would have dire consequences for the strained food supply chain during this historic crisis. At the same time, the pandemic limited quality and food safety teams, as key teams had to work remotely, shift schedules had to drastically change to meet new safety regulations, production lines cut in half, and quality and safety teams had to make rushed decisions when it came to reworking product.

Some plants that faced potential foreign material contamination risked sending their product into distribution without a thorough rework, up against tight deadlines. And some plants adopted a multifaceted strategy and did something they’ve never done before: Reworked product on hold for potential foreign material contamination themselves. Many of these companies reworked product with their extra available lines, to keep as many of their workers as possible, despite the fact that food production employees are untrained in finding and extracting foreign contaminants. Inline detection machines are also typically limited to metal detection, often incapable of consistently catching many other types of contaminants such as glass, stones, plastic, bone, rubber, gasket material, container defects, product clumps, wood and other possible missing components. Food safety is of the utmost importance when a crisis hits as the food supply chain is crucial to our success as a nation and as an interconnected world. Facing new pressures on all sides, the food industry did not neglect food safety and quality, even while adopting new strategies. There was never a doubt that the industry would overcome the new challenges.

Looking Forward

The food industry has rapidly switched business strategies, swiftly turned around new products, found new ways to align product traceability and work remotely while still meeting industry standards and production expectations. Manufacturing facilities repackaged and repurposed food to keep the country fed, maintained job security for many employees and procured PPE in mass. The food industry is also full of manufacturers and plants that accomplished things they’ve never done before. There are shining examples of heroism in the food and beverage space as a growing list of food businesses, restaurants and delivery services have donated to healthcare workers on the front lines. Many large companies donated millions of dollars and pounds of food to feed their teams, their communities and the less fortunate.8 In the midst of a large obstacle, we have reached new heights and discovered new capabilities.

The challenges aren’t over. The food industry is still facing the effects of COVID-19 shutdowns on businesses even during this period of re-opening in different parts of the country. A lot of places and companies have been hit hard, some even closing their doors for good. Forbes reported at the onset of the pandemic that Smithfield Foods shut down one of its pork processing plants after hundreds of the plant’s 3,700 employees tested positive for coronavirus.8 Tyson Foods also shut down several meat processing plants under threat of the virus.8 Smithfield and Tyson were not the only ones. Food Dive has a compiled tracking system for coronavirus closures in food and beverage manufacturing facilities, recording reduced production, temporary closures, and permanent shutdowns across the industry. We expect some of the COVID-19 challenges to alleviate over time and hope that business will slowly return to normal and previously closed facilities will be able to re-open. However, we strongly hope some changes to the industry will remain: Creativity, ingenuity, resilience, adaptability, and a strong commitment to customers and partners. The bottom line is we’re in this together––together, we’re resilient.

References

  1. Frazier, L. (April 21, 2020). “How COVID-19 Is Leading The US Into A New Type Of Recession, And What It Means For Our Future.” Forbes.
  2. Krebs, C. (May 19, 2020). “Advisory Memorandum on Identification of Essential Critical Infrastructure Workers During COVID-19 Response.” Homeland Security Digital Library.
  3.  Johansson, R. (May 28, 2020) “Another Look at Availability and Prices of Food Amid the COVID-19 Pandemic.” USDA.
  4. Stewart, H. (September 2011). “Food Away From Home.” The Oxford Handbook of the Economics of Food Consumption and Policy. 646–666. Oxford University Press. doi: 10.1093/oxfordhb/9780199569441.013.0027
  5. The Shelby Report. (April 17, 2020). “New Study Reveals Covid-19 Impact On Americans’ Food Habits.”
  6. Caldwell, J. (April 16, 2020). “How Covid-19 is impacting various points in the US food & ag supply chain”. AgFunderNews.
  7. Hahn, M.D., S. (March 27, 2020). Coronavirus (COVID-19) Supply Chain Update. FDA.
  8. Biscotti, L. (April 17, 2020). “Food And Beverage Companies Evolve, Innovate And Contribute Amid COVID-19 Crisis.” Forbes.
Craig Reeds
FST Soapbox

Cybersecurity for Food and Beverage Operational Technology (OT) Environments

By Craig Reeds
No Comments
Craig Reeds

Much of the attention that cybersecurity gets is on the IT or office network side of things, but recently people have begun paying more attention to operational technology (OT) systems that make up the country’s critical infrastructure. When people think of critical infrastructure, they automatically think of oil and gas, power generation, and water. Many people don’t realize that there are actually 16 critical infrastructure industries:

  • Energy
  • Financial
  • Dams
  • Defense
  • Critical Manufacturing
  • Water and Wastewater
  • Food and Agriculture
  • Healthcare
  • Government Facilities
  • Commercial Facilities
  • Transportation
  • Emergency Services
  • Chemical
  • Communications
  • Nuclear
  • Information Technology

One of the easily forgotten, but perhaps most important, is food and beverage manufacturing. A cyber attack on a food and beverage company might not result in the lights going out or clouds of toxic gas, but they could result in explosions, or tainted food. We need to start paying more attention to cybersecurity in the food and beverage industry. What would happen if a hacker got into the control system at a frozen foods distribution facility? They could raise the temperature in the freezers, thaw the food and then refreeze it. This could result in food poisoning for hundreds or thousands of people. Bad actors can do a lot of harm by targeting this sector.

Many companies are pushing to combine their IT and OT departments, something they call IT/OT convergence. This can be done, but you need to first understand that IT and OT have differing goals.

It is important to review the organizational structure. You will typically find that both IT and OT report organizationally to the CEO level. We also find senior management believes IT owns the industrial control system (ICS) networks and security—mainly because IT owns support, maintenance & operational budget for network and security (basically letting OT off the hook).

IT’s primary goals are confidentiality, integrity and availability, the CIA triad. While working toward these objectives IT also tries to make it possible for users to access the network from any location from which they are working, using whatever computing device they have with them. The goal is to make it as easy to work from an airport, hotel room or coffee shop as it is to work in the office itself. Technology is updated and replaced often. Service packs are loaded, new software releases are loaded, and bugs are fixed.

OT’s primary goals are availability, integrity and confidentiality—a complete reversal of the CIA triad. They strive to keep production running, be it an electric utility, an oil rig or a pop-tart factory 24/7/365. OT is all about what works, a “We’ve always done it that way” mentality. OT will always be reluctant to make any change that might bring down the production line. Remember, they are graded on widgets per minute. There must be trust and open communication between IT and OT if things are going to work properly.

When we are talking about OT cybersecurity, we usually use terms like secure or prevent, when we really should be thinking about words like containment. Securing the network and preventing attacks is important, but at some point, an attack will get past your defenses. Then it is a matter of containment: How do we keep the problem from spreading to other networks?

One thing to definitely avoid is the desire by IT to have bi-directional communications between the IT and OT networks—this should never happen. Also, avoid the desire to connect the ICS to the Internet so that you can control the process remotely. There is no reason for the plant manager to be able to go home, have a couple beers and then log on to see if he can make things run better. If the control system is going to be connected to the corporate IT or the Internet, it should only have out-going uni-directional data transmission to allow monitoring of the system.

Building a good OT cybersecurity program, you need to do three things:

  • Get C-Level support and buy-in for the changes to be made.
  • Communicate with stakeholders and vendors.
  • Make decisions as a team, make sure all the stakeholders, IT, OT, engineering are all involved.

After you have set up the structure and started communicating, you need to begin cybersecurity awareness training for the OT staff. This training should be focused on educating plant personnel on what cybersecurity is, both at work and at home, and how to respond or escalate something that seems wrong. They need to be trained what needs to be dealt with immediately and what can wait. Consider doing tabletop exercises where you practice what to do when certain things occur. This can act as a stress test for your incident response plan and help find the holes in your plan and procedures. These tabletop exercises should involve C-suite individuals as well as people from the plant floor, so everyone understand their part in a cyber-attack response.

If these concepts are followed, you will be well on your way to creating a much more cyber-secure production environment.

Data protection, security

Threat of Cyberattacks to Food Safety on the Rise

By Food Safety Tech Staff
No Comments
Data protection, security

A new report released by the University of Minnesota’s Food Protection and Defense Institute warns that the food industry is vulnerable to cyberattacks, suggesting that food companies need to beef up their security and IT systems. According to the report, “Adulterating More Than Food: The Cyber Risk to Food Processing and Manufacturing”, the systems that food companies use for processing and manufacturing could be the most vulnerable and as such, serve as an attractive target for an attack—especially as industries that are currently common targets improve their cybersecurity.

“The food industry has not been a target of costly cyberattacks like financial, energy, and health care companies have,” said Stephen Streng, lead author of the FPDI report, in a news release. “However, as companies in those sectors learn to harden their defenses, the attackers will begin looking for easier victims. This report can help food companies learn about what could be coming their way and how to begin protecting themselves.”

The report calls out that in 2011, researchers and manufacturers found more than 200 vulnerabilities in industrial control systems. In addition to the fact that these vulnerabilities are in many components from different vendors, many of these systems have obsolete operating systems and passwords that are easy to hack. Compounding this issue, “Companies often lack knowledge about how their industrial control systems and IT systems interact and lack awareness about cyber risks and threats,” the FPDI release notes.

And if you’re a small company, don’t think you’re immune, the report cautions. It cites that 74% of U.S. food manufacturers have fewer than 20 employees—yet software company Symantec Corp. points out that small companies have been targeted as often, or sometimes even more, than large companies.

How can food companies address this risk? The report recommends the following “critical” steps all companies should take:

  • Bridge the gap and facilitate more communication between OT (operational technology) and IT (information technology) personnel
  • Conduct risk assessments of inventory control systems and IT systems
  • Ensure that staff with the cybersecurity knowledge is involved in procuring and deploying inventory control system devices
  • Incorporate cybersecurity into your food safety and food defense culture.

FPDI’s full report is available on the organization’s website.

Craig Reeds

Six Ways to Prepare for a Cybersecurity Audit

By Craig Reeds
No Comments
Craig Reeds

In the food manufacturing industry, just as in any other industry, cybersecurity is very important. Your organization should be having cyber vulnerability assessments or penetration tests performed at least once a year. Like any big test you have taken in your life, this sort of assessment can be scary, but if you prepare for it, you can greatly improve the potential of passing the test. As you prepare for the assessment, there are six things you can either implement or do to make the result of this audit better for your organization.

  1. Do an inventory of what is connected to your network. You cannot expect to defend devices on your network that you are not aware of. Be sure when you perform this inventory that you include any device that connects to your network. Think past the routers, switches, desktop PCs, laptops and printers. What is connecting to your wireless network? Is your security system or HVAC system connected to the network? Creating a network device inventory can be difficult, but there are tools available to make it easier. Once you have created the initial inventory, your baseline, go back at least monthly to look for new devices or devices that are no longer connected so you can update your inventory.
  2. Determine what is running on all of your network devices. In the first step you inventoried the hardware—now we need to inventory what is running on each device. You can use tools such as Nessus to inventory the software on each computer as it scans the network to perform the device inventory. This is the quickest way to complete both of these steps. If there is old or unused software on a device, remove it. You need to document the operating system and application software on each device. This software Inventory should also be included in your baseline and verified/updated on at least a monthly basis.
  3. Use the Principle of Least Privilege. This is a very valuable cybersecurity concept. Never give a user or device more rights on the network than they/it need to perform their assigned tasks. Privileges are assigned based on roles or job functions. If a user is unable to download and install applications on their PC or laptop, you reduce the chance of a device becoming compromised. Many hackers, once in a network, move laterally through the network from machine to machine looking for information or vulnerabilities that can be used to give themselves more abilities on the network. If a hacker were to gain access to a user account or system with low privileges, it decreases the amount of damage they could do.
  4. Use Secure Configurations. All operating systems, web browsers and many other networked devices have secure configuration settings. One of the problems with doing this is that operating systems alone can have hundreds of settings to choose from. The Center for Internet Security provides benchmarks for just about every conceivable device. The CIS Benchmarks are distributed free of charge in PDF format to propagate their worldwide use and adoption as user-originated, de facto standards. CIS Benchmarks are the only consensus-based, best-practice security configuration guides both developed and accepted by government, business, industry, and academia.
  5. Set up a policy and procedure for applying security patches. New vulnerabilities are discovered every day and when these vulnerabilities are found, vendors release updates or patches to mitigate the vulnerability. Exploiting vulnerabilities is what a hacker lives for. An unpatched vulnerability can be almost an open door for a hacker to get into your computer or network. It is mind boggling to hear that some organization was hit with ransomware because they didn’t load a security patch that was released six to 12 months ago. When an application reaches end-of-support, the vendor stops releasing patches, and that should tell you that it is time to upgrade the software to the newest version or find another tool to perform that task. Never use unsupported software on your network. Speaking as an auditor, a fully patched network is impressive.
  6. Create an Incident Response Plan. Let’s face it, no matter what you do to protect yourself, something is eventually going to go wrong. Do you have a plan to continue operations if you lose access to your office building? Do your users know what to do if they receive or fall prey to a phishing e-mail? This process starts with performing a risk assessment. Once you have determined the potential risks, you then move on to determining how to mitigate the risks. You will need to create policies and procedures and then train the employees on them, so they know what to do.

By performing these six steps you will be protecting and strengthening your networks, your users, and trust me, you will impress the auditor. Also, it should be noted that these are not once and done steps—these are steps that must be repeated sometimes on a daily, if not at least on a monthly, basis.

Randy Fields, Repositrak
FST Soapbox

Food Safety Technology Disrupters

By Randy Fields
1 Comment
Randy Fields, Repositrak

We’ve all heard about the latest disrupters in the retail supply chain, like the Internet of Things, wearable computers, cognitive analytics, machine learning and even the new value chain in which these technologies intercede to provide a better and more accurate shopping experience for consumers. There are also developments like digital fabrication that interacts with both the consumer and appliances to improve the way product gets to the consumer from the point of production.

Technology disrupters can fundamentally change supply chains, destroying existing ones and creating new ones. Other disruptions can be caused by not a single technology but by several new and existing technologies that come together in innovative ways. Smart retailers and their trading partners are working to judge the impact of these technology disrupters before or at least as they occur. They need to be more proactive by investing in key areas of strategy, culture and partnership.

A company’s supply chain can be the weakest link in its food safety program. Learn how to mitigate these risks at the Food Safety Supply Chain conference | June 5-6, 2017

Many of the technology disrupters in food safety are based on the growing ability to apply analytics, including machine learning, to drive a better understanding of and increase the personalized relationships with the consumer, and to glean insight from all the data being collected. Knowing exactly what information shoppers require to feel safe with the products they are buying from you can only help build and maintain a great reputation. Further, analytics help companies predict and address the weakest links on the production floor and in their own extended supply chain to keep those customers free from potentially deadly pathogens.

Cloud computing for the delivery of IT and business processes as digital services is transforming the food safety world through the unprecedented speed and agility it enables for mobile and social engagement. Telling your customers that a recalled product could cause an illness used to require lots of phone calls or even snail mail, but now technologies in the cloud facilitate almost instantaneous messaging of the warning to whole or subsets of a population. This is just one of the ways that everyone from shoppers to business people are changing the way they interact with each other and the way we all do business due to the cloud.

Security in general and cybersecurity specifically are disrupters for companies concerned with food safety, because they can fall prey to sophisticated hackers and other crooks that try to ransom a business’ reputation in the digital world. Think how important it is to protect your own information as well as that of your consumers and customers for payment details and personal data. Now add health data to the mix and you’ll recognize the critical nature of the issue.

All of these technology disrupters have the potential to seriously impair your food safety plans and procedures, but they can also help you better deploy resources to address individual food safety emergencies and ongoing issues. Knowing the impact of the disruption is the first step in addressing it; then you need to develop a plan that helps you take advantage of the positive sides of the disruption and eliminate the negative ones.