Building An Industrial Cybersecurity Workforce
Building An Industrial Cybersecurity Workforce
AN INDUSTRIAL
CYBERSECURITY
WORKFORCE
A Manager’s Guide
INDUSTRIAL CYBERSECURITY AWAKENING
As smart devices and networks push deeper into power grids, oil refineries, and water treatment plants, we
must consciously prepare professionals to securely design, build, operate and maintain such infrastructures so
that they are prepared to protect and defend them.
This document, “A Manager’s Guide” is the first in a series of guidebooks dedicated to the important topic of
developing an industrial cybersecurity workforce. Other publications will include “A Human Resources Guide”
for Human Resource (HR) personnel seeking to ensure the effectiveness of industrial cybersecurity personnel,
and “A Career Development Guide” for individuals seeking to develop industrial cybersecurity competencies.
IT systems consist of desktops, laptops, web servers, communications networks, email, storage and backup
systems used to help humans make better decisions.
OT systems consist of programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA),
control logic, sensors and actuators that provide reliable electricity, consistent transportation, and safe
drinking water. Operational technology systems are the collection of technologies used to control and monitor
industrial operations used in electric power, oil & natural gas, water & wastewater, and manufacturing sectors.
These systems include:
• Industrial control systems (ICS)
• Supervisory control and data acquisition (SCADA)
• Programmable logic controllers (PLCs)
• Industrial control communications protocols, control logic, sensors and actuators.
The table below shows some of the differing characteristics between information technology and operational
technology.
Failure to appreciate the IT-OT gap can hamper effective and sustainable approaches to industrial
cybersecurity. The Industrial Cybersecurity Awakening Model describes the stages many organizations pass
through as their OT security efforts mature. The materials in this guide helps shift management mentality
towards Stage 5.
Industrial Industrial
External Allocated Appropriate
cybersecurity cybersecurity
Management consultants budget technology
program team
mentality
“Get someone “Here’s some “Technology “Let’s do “Let’s build
in here before money to will help IT this right by a team to
that happens go make us security staff following the make this
again.” secure.” cover OT too.” guidance.” sustainable.”
[ ] [ ]
• Instrumentation and control • Software
• Equipment
• Communications + • Component
• Connection
• Safety • System
• Regulation • Human, organizational
and societal
Industrial operations and processes: industry sectors, professional roles and responsibilities in industrial
environments, engineering diagrams, process types, plant lifecycle.
Instrumentation and control: sensing elements, control devices, programmable control devices, control
paradigms, programming methods, process variables, data acquisition, supervisory control, alarms,
engineering laptops/workstations, data historians.
Equipment under control: motors/generators, pumps, valves, relays, generators, transformers, breakers,
variable frequency drives.
Safety: electrical safety, personal protective equipment, safety/hazards assessment, safety instrumented
systems, lock-out tag-out, safe work procedures, common failure modes for equipment under control.
Regulation and guidance: presidential/executive orders, NIST SP 800-82 R2, IEC 62443, NERC CIP.
Defensive technologies and approaches: firewalls, data diodes, independent sensing and backhaul, ICS
network monitoring, cyber-informed engineering, cyber process hazards assessment, cyber-physical fail-safes,
awareness and training for ICS-related personnel.
KEY ROLE
RESPONSIBILITY
SUBTASKS
ANALYST
Synthesize threat and
vulnerability information.
MANAGER
Direct and oversee
industrial cybersecurity
TECHNICIAN
program.
Assure security RESEARCHER
and safety of ICS Identify new
operations. vulnerabilities to
achieve kinetic
consequences.
HIRING GUIDANCE
MANAGER PRIMARY TASKS
Ideal candidate has project management
y Prioritize efforts experience in cybersecurity AND
y Understand requirements per effort engineering.
y Obtain and manage budget One senior manager per strategic business
y Build the team unit.
HIRING GUIDANCE
ENGINEER PRIMARY TASKS
Most important role on the industrial
y Direct creation of industrial systems
cybersecurity team and may require
inventory and model for cybersecurity
purposes skilled recruitment.
HIRING GUIDANCE
TECHNICIAN PRIMARY TASKS
Demonstrates fascination and enthusiasm
y Maintains ICS device asset inventory for
for knowing how things work.
security purposes
y Reviews architecture of ICS networks Demonstrates hands-on experience with
industrial automation equipment.
y Updates ICS software and firmware
during stoppages Demonstrates proficiency in safe work
y Maintains backups of control software procedures.
HIRING GUIDANCE
ANALYST PRIMARY TASKS
Enjoys the professional writing process.
y Stays abreast emerging developments
relevant to industrial cybersecurity
Reads insatiably.
y Dissects analytical requests
Does not shy away from potentially
y Collects information controversial topics.
y Synthesizes information
Presents compelling arguments in written
y Analyzes threats, vulnerabilities and and verbal form.
consequences pertinent to industrial
environments Has developed deep expertise in various
subject areas.
y Produces analytical products
y Proposes new work. Works well with other analytical thinkers,
and appreciates constructive critique.
HIRING GUIDANCE
RESEARCHER PRIMARY TASKS
Thrives when working with technology.
y Describes and characterizes systems
y Designs and conducts tests Must be capable of explaining and
defending their findings.
y Discovers vulnerabilities
y Develops adversarial perspective May enjoy technology interaction outside
of work hours.
y Recommends mitigations
Shares findings and techniques with other
y Documents and reports findings.
researchers.
Qualifications and
Certifications
• Bachelor or Master of Science
in computer science
• Technical track presentations
at security conferences
• Publicly referenced
vulnerability disclosures
• Authored security-related
tools.
In Phase I, INL sent 14 subject matter experts to Future deliverables include an Human Resources
Idaho State University’s Simplot Decision Support Guide and a Career Development Guide for Industrial
Center (SDSC) with the objective of creating a Cybersecurity.
framework for developing industrial cybersecurity
training and education standards. The SDSC is an REFERENCES
in-person electronic meeting room designed to
S. McBride, J. Slay “Towards Standards-Based
implement the nominal group technique for decision
Industrial Control Systems Security Education in The
making – the same facility and technique that the
United States” (2020). https://industrialcyberforce.
federal government used repeatedly between 1987
org/wp-content/uploads/2020/07/Towards-
and 2005 to create the first federal cybersecurity Standards-based-ICS-Security-Education-in-the-
training and education standards (NSTISS/CNSS United-States.pdf
Instructions 4011-4016).
S. McBride, J. Slay “Criteria for International
For Phase II, INL identified 10 additional collaborators ICS Security Education Standards” (2020).
(two per role) with significant experience in each https://industrialcyberforce.org/wp-content/
role. The collaborators described tasks each role uploads/2020/07/Criteria-for-International-ICS-
performs relevant to industrial cybersecurity. The task Security-Education-Standards.pdf
statements were then consolidated into the primary
S. McBride, C. Schou, J. Frost, J. Slay “An Initial
task lists provided in this document.
Industrial Cybersecurity Workforce Development
Framework” (2020). https://industrialcyberforce.org/
LIMITATIONS wp-content/uploads/2020/08/An-Initial-Industrial-
Cybersecurity-Workforce-Development-Framework.
In applying the archetype roles and tasks describd
pdf
herein, orgainzations should consider them
notionally prescriptive rather than specifically S. McBride, J. Slay, C. Schou “A Security
prescriptive. Workforce to Bridge the IT-OT Gap” (2020).
https://industrialcyberforce.org/wp-content/
FUTURE WORK uploads/2020/08/A-Security-Workforce-to-Bridge-
the-IT-OT-Gap.pdf.
Identifying the unique knowledge and job roles
required of industrial cybersecurity professionals
represents a significant step towards developing a
capable workforce. The subject collaborators have For more information, visit:
noted that there is an ongoing need to establish INL’s National and Homeland Security’s Training
a repository of knowledge, skills, attitudes, and and Workforce Development Center at https://inl.
behaviors on which diverse groups can rely to create gov/critical-infrastructure-protection-training/
training and education standards, personalized
training plans, intervention methods, and training Idaho State University College of Technology at
https://www.isu.edu/industrialcybersecurity/
content. Their intentions are to use surveys,