Case studies
Cybersecurity threats targeting organizations' industrial control systems (ICS) are not always direct. Instead, the most vulnerable entries to an ICS can start with external partners, like suppliers and vendors. Honeywell's customer, a global pharmaceutical company, realized that potential vulnerabilities like these might be in its partner ecosystem. Therefore, the pharmaceutical company wanted to get ahead of a potential breach so they trusted Honeywell to do a thorough assessment of its...
A major European oil and gas company that acquires, explores, produces and supplies chemical and petroleum products had a cybersecurity challenge. Company leadership wanted a better way to quantify and respond to the industry’s increasing levels of cybersecurity risk. Pioneers were looking for a new way to better understand and improve their company’s OT cybersecurity. As part of this effort, pioneers wanted to compare the company’s current levels of protection against a serie...
A major European oil and gas company that acquires, explores, produces and supplies chemical and petroleum products had a cybersecurity challenge. Company leadership wanted a better way to quantify and respond to the industry’s increasing levels of cybersecurity risk. Cybersecurity challenges Pioneers were looking for a new way to understand better and improve their company’s OT cybersecurity. As part of this effort, pioneers wanted to compare the company’s current levels...
Around production environments, the main concern was always the efficiency of the production output. The risks of operational technology (OT) cybersecurity were unknown for many years. However, that all changed as the need for knowing what is connected, where it’s connected, and how it’s connected became imperative. As cybersecurity is a necessity for oil and gas, the integrity of the OT network is very crucial for the safety and operation of the Motor Oil refinery. O...
Hackers gain control of a chemical plant’s furnace control system. They tamper with the temperature settings and cause an explosion. The consequences of an incident like that can be catastrophic, especially since 9.3 million people reside within a 10-kilometer radius of the average chemical plant in the US. Targeting operational technology (OT) systems has become a typical tactic for bad actors. Cybercriminals and nation-state actors see these critical assets as an open invitation to disr...
Honeywell announced that Petróleos del Perú S.A. (Petroperú), one of the largest hydrocarbon producers, refiners, and distributors in Peru, will implement Honeywell cybersecurity solutions to help Petroperú strengthen the cyber resiliency of its refinery operations and accelerate its broader digital transformation. Cybersecurity consulting support Petroperú’s multi-year investment with Honeywell includes access to Honeywell’s cybersecurity consult...
Honeywell Industrial Cybersecurity news
Honeywell released its 2024 USB Threat Report, which provides new insight into how “silent residency” is an increasing cyber threat for industrial and critical infrastructure facilities. In the report, Honeywell highlighted the growing risk of “living off the land” (“LotL”) attacks in which adversaries use USB devices to gain access to industrial control systems to hide and observe operations before launching attacks that evade detection and manipulate the ta...
Honeywell unveiled Honeywell Forge Performance+ for Aerospace, a cloud-based platform that utilizes AI and machine learning (ML) to help commercial aerospace manufacturing and maintenance, repair & overhaul (MRO) facilities modernize production and lower operational costs through digitalization. This addition to the Honeywell Forge suite further supports Honeywell’s alignment with the megatrends of advancing automation and the future of aviation. Complexity and operating costs...
Honeywell launched Cyber Watch, a breakthrough enterprise solution designed to help organizations better identify, mitigate, and manage the latest Operational Technology (OT) cyber threats. Stop before attack “Everyone from the plant manager to the CISO is a line of defense against the next cyberattack. No company wants to be a front-page headline as the next victim of a ransomware attack. We know hackers are lurking – waiting for months or even years – to strike,” said...
Honeywell Industrial Cybersecurity white papers