• Ensure one person takes ownership of cybersecurity and is accountable.
• Conduct an audit of current cybersecurity measures. Implement obvious fixes.
• Follow up with a cyber-security vulnerability analysis (risk analysis) for a more complete identification of vulnerabilities and recommendations for corrective action.
• Implement a cybersecurity management program by integrating it into existing management systems for safety, quality and the like.
See the story that goes with this sidebar: Addressing Cybersecurity in Process Control