The Industrial Internet of Things

Size: px
Start display at page:

Download "The Industrial Internet of Things"

Transcription

1

2 The Industrial Internet of Things

3 Presentation and Agenda How ICS has Evolved. Changing Landscapes of ICS 2013 End User Cyber Security Survey. Gaps and Recommendations

4 About Your Presenter Previous: Irving Oil, Canada s Largest Refinery (325 MBPD) and LNG Facility Head of Automation and IT 20 Years Current: Oil & Gas Industry Analyst 3 Years specializing in DCS, Manufacturing IT Applications Peter D. Reynolds Senior Industry Consultant ARC Advisory Group

5 About My Organization ARC Advisory Group Unique research company, focused on Industrial Automation Senior people with automation experience and expertise Global Presence: US, Canada, Germany, France, Japan, China, Korea, India, Brazil, Argentina Established in 1986

6 A Sample of Our Clients Owner Operators Suppliers

7 ICS of 1960 s

8 Present Day ICS Who Can Detect the Main Difference between 1960 and Present Day ICS?

9 What is an ICS? Real-time controllers, PLC, DCS, SCADA Field Sensors Electrical Systems Operator HMI Are there other things that are critical to your business?

10 Remember the Purdue Model for CIM? Enterprise Level 4 Management Level 3 Operation Level 2 Control Level 1 Plant Business Operations & ERP Process Information & Analytics, MES, Planning, Scheduling Real-time Control Execution and Safety Continuous Batch Logic Do We need to worry? Field Devices Level 0 Process Traditional ICS Focus.

11 The Evolution of ICS COTS has been in use for well over a decade. Plant Architectures Evolve or Creep Infrastructure is not designed to be Cyber-Secure Islands of Stranded Data Much focus on Appliance Security Measures Procedures and Practice not Keeping up. ICS Staff focused on Operations Customers. Access to Skilled ICS and Plant Experts is Challenging.

12 The View from Above Ethernet Corporate Business Systems Site #1 Site #1 Site #n ---

13 Automation s View from Below Wireless HMI Enterprise IT Systems Infrastructure (Networks ) Safety Fieldbus Process Control OEM / SKID Discrete Control

14 The Clash over standards for Design I design infrastructure with my supplier for Operations Requirements I design infrastructure for enterprise requirements Automation Enterprise Leaders leverage People, standards, best practices Infrastructure is similar but used for differing requirements

15 The Clash over standards and Reporting IEC, ISA, My Supplier standard I report to Operations ITIL, COBIT etc I report to the CFO, CEO Automation Enterprise

16 The Differing Priorities on the Data Here come your security updates? Manufacturing IT embedded. Corporate IT Plant Automation Wait My Operator is making a change CIA AIC Collaboration The Way We Need to Be Priority on systems in not aligned!

17 How Well do we Prepare our Workers for Cyber Security? Automation suppliers: Limited IT Training We teach our students about the basics in University

18 The Winds of Change Enter The Industrial Internet of Things

19 The Industrial Internet of Things What is IoT? Why IoT? Is it real? Are our Cyber Security practices ready?

20 Terminology of IoT Thing is used interchangeably with the terms: Machine Asset Product Device Physical Entity (Piece of) Equipment Personnel The Industrial Internet of Things is based upon enhanced connectivity of this stuff

21 Main Parts of Industrial IoT Intelligent Assets Technology-enhanced with sensors, processors, memory, communications Software-defined behavior Reactive, predictive, and social Generate more data Potentially self-aware and autonomous Communications & Infrastructure Cloud-based Big Data storage Asset Value Chain Analytics and Software Asset Optimization and System Optimization Descriptive, Predictive, and Prescriptive Analytics Intelligent Information when and where people need it Support New Business Models People, Processes, and Systems Social, connected, better decisions, etc.

22 IoT Basic Concepts Virtual Entity; Software-Defined Machine Software Defined Machine Apps Virtual Device (Virtual Machine) Communication Protocols and Device Technologies Device (Machine) with sensors, intelligence, and communications

23 Software Defined Machine Software Virtual Pump Sensors Pump Bearing Temperature Vibration Power Input Pressure Discharge Pressure Discharge Temperature Ambient Temperature Rotation Speed Select performance profile, buffering, communication frequency, security, etc.

24 Connected Asset Ecosystem Improve Performance with new Business Processes XYZ Chemical Engineering XYZ Chemical Corporate Compressor OEM Aux Equipment Automation OEM Local Service Providers Production Facilities XYZ Chemical Operations

25 Applications of Connected Smart Devices Condition Monitoring Data Visualization Personnel Safety Remote Services Service Planning Replenishment Asset Utilization Asset Location Tracking Compliance Software Update

26 Will the Industrial IoT Change Plant Software and Automation? XYZ Chemical XYZ Chemical XYZ Chemical XYZ Chemical Maintenance Engineering Purchasing Corporate Machine Mfr. Service Provider Enterprise New IoT Analytics and Applications Private Public XYZ Chemical Smart Machine IoT Smart Module Local IoT Compute and Communicate module Physical asset with sensors, actuators Plant Operations Emerging Option: Connect Assets Using New Technologies

27 Has the Cost of ICS Applications been holding us back? software Acquisition cost is 10% of IT Spend network management tools hardware facilities security support backups IT labor power/cooling maintenance disaster recovery Operating cost is 90% of IT Spend

28 Consumers of ICS Data The Cloud Your Data Center Cloud Services (Public or Private) Applications Applications Data Data Runtime Runtime Middleware Middleware O/S O/S Virtualization Servers Storage Networking Service Level Agreement 99.95% (5 min outage per week) Virtualization Servers Storage Networking

29 What does a Cloud look like?

30 The True Cloud Computing Characteristics Cloud Computing is about Increasing the Clock Speed for Automation and IT and delivering more value to the business, faster

31 Would You like Your Solution in the Cloud or On Premise? Smart Grid Solutions

32 The Hybrid-Virtualization Cloud Operating Model Deployment X Deployment Y Deployment Z VM VM VM VM VM VM VM VM VM Isolated Private Network Internet facing VPN ABC Chemicals XYZ Chemicals

33 Microsoft Public Cloud Security Standards ISO Internationally recognized Information security standard -133 controls across 11 domains. Annual surveillance audits with continual improvement EU Data Protection HIPAA BAA Law sets a baseline for handling data in the EU Compliance with EU Safe harbor framework. Specifies privacy, security, disaster recovery guidelines for electronic storage of US health records. Business Associate Agreement (BAA) enables 3rd parties to build HIPPA compliant solutions. SSAE 16 / ISAE Accounting standard relied upon as the authoritative guidance for reporting on service organizations Annual audit, controls monitored for 6 months, 10 domains. FISMA US Federal enacted in 2002, based on NIST 800 series, 18 control domains - Applies to US Federal agencies. There is a financial cost to invest in security

34 Why Industrial IoT? Lower costs for manufacturers AND suppliers Improved production Better Asset Performance Lower Operational Costs Better Turnaround Planning Optimize processes Create new applications, services, or business models Supports better product innovation.

35 Industrial Internet of Things - Opportunities Asset Value Chain 3 rd Party Services Connected Apps People Analytics, Big Data Connected Device Management ERP Enterprise Apps, Services New Opportunities: New Business Models New Services Decision Support Visualization CDM Platform: Device configuration Device management Application development Application management Diagnostics, alarms Enterprise integration Security Communications Control Intelligent Assets/Devices/Machines/Products Connected: Machines Products Assets Devices Sensors

36 What Skills does Industrial IoT Demand Cyber Security Network Architecture and Design (Cellular, Wireless and Wired) Big Data/Analytics SOA / XML / Java /.Net / HANA / Hadoop Virtualization Cloud Brokering Application Specific Process/Machine Control Process/Machine Safety Field Networks & Smart Instrumentation /Sensors Video Physical security Soft skills (people) Much of the value from the data will stem from information outside the plant.

37

38 The Current State of Cyber Health Are We Prepared?

39 Questions to Consider. Have me made the right investment in our ICS? How can we drive more value from our investments? Are there new technologies that can help, while leveraging our current assets? What processes need to be in place? What roles internal to our company will change? How will our partners help us operate more safely? How will technology enable this?

40 ARC Cyber Security Research Orlando, Florida, USA 2014 What Did We Do? Who Participated? What Did We Learn? Future ARC Research

41 What Did We Do? Motivation & Objectives, Issue Many good guidelines exist for what companies should do to secure industrial control systems (NIST, ISA/IEC, NERC) But many organizations are still reluctant to take action -they want to know what others are doing before they act (Hotel Fire Syndrome). ARC s User Survey was launched to help these companies overcome this roadblock We also wanted to help gov t and standards groups understand the factors that are constraining action

42 What Did We Do? Survey Methodology We developed our survey with the help of end users and cyber security experts. The final survey had 15 questions and took about 30 minutes to complete We promoted the survey through several different channels in order to maximize end user participation: ARC Websites and newsletters Industry Publications Automation.com ICS Cyber Security Technology Suppliers Industrial Defender, Innominate Security Technologies This generated 107 good responses which we felt was good given the natural reluctance of people to share information.

43 Who Participated? Types of People Sample=107

44 Who Participated? Industries Q14 - What is your organization's primary industrial focus? (check all that apply) Other Water and Wastewater Transportation Semiconductor Refining Pulp and Paper Pharmaceutical and Biotech Oil and Gas Exploration and Production Mining and Metals Machinery Government Food and Beverage Electronics Electric Power Transmission & Distribution Electric Power Generation Consumer Packaged Goods (CPG) Chemical Automotive Heavy Process Focus 0% 5% 10% 15% 20% 25% 30% % of Respondents

45 Who Participated? Geographic Regions North America, but good distribution

46 What Did We Learn? Major Goals Expected?

47 What Did We Learn? Major Concerns Expected?

48 What Did We Learn? Who is Responsible for What? Central vs. Local Centralized Strategy Guidance from the Center Increasing Localized Tactics

49 What Did We Learn? Who is Responsible for What? IT versus ICS More Sharing Less Sharing The Degree of Sharing is Increasing

50 What Did We Learn? How are External Service Providers Utilized? In Future 80% Recognize External Support

51 What Did We Learn? Use of Endpoint & System Technologies Host Intrusion Detection Application Whitelisting Security Event Management Cyber Forensic Analytics

52 What Did We Learn? Use of NGFW Technologies Caution: Don t Know and No Answers = 20-30%

53 What Did We Learn? What More is Needed? >75%: Its all priority

54 What Did We Learn? What is Constraining Further Progress? Lack of Understanding of IT Lack of Resources Inability to Show a Financial Payback

55 Conclusions 1. Both technology and work process gaps exist. 2. Gaps exist in interactions between automation and IT. 3. Systems and Plant Assets are more complex 4. Industry suffers from lack access to experts in each plant. 5. IoT will change the Industrial Automation landscape. 6. Production and safety expectations will only increase. 7. New Low-Cost IoT Architectures will drive Cyber Security Investment. 8. Suppliers / Service Providers of ICS deepen the leverage of International IT standards ITIL, COBIT, ISO Liberation of data will drive Cyber Investment.

56 Kuwait Industrial Automation & Control Systems Cyber Security Conference May 2014 thank you For more information, contact the author at or visit our web pages at

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies

More information

CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS

CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS WILLIAM (THE GONZ) FLINN M.S. INFORMATION SYSTEMS SECURITY MANAGEMENT; COMPTIA SECURITY+, I-NET+, NETWORK+; CERTIFIED

More information

Securing Industrial Control Systems

Securing Industrial Control Systems L OCKHEED MARTIN Whitepaper Securing Industrial Control Systems The Basics Abstract Critical infrastructure industries such as electrical power, oil and gas, chemical, and transportation face a daunting

More information

IT Consulting and Implementation Services

IT Consulting and Implementation Services PORTFOLIO OVERVIEW IT Consulting and Implementation Services Helping IT Transform the Way Business Innovates and Operates 1 2 PORTFOLIO OVERVIEW IT Consulting and Implementation Services IT is moving from

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Cyber Security. June 2015

Cyber Security. June 2015 Cyber Security June 2015 Table of contents Section Pages Introduction and methodology 3 Key findings 4 Respondent profile 5-9 Cyber security practices 10-25 Resources for monitoring cyber security events

More information

TD01 - Enabling Digital Transformation Through The Connected Enterprise

TD01 - Enabling Digital Transformation Through The Connected Enterprise TD01 - Enabling Digital Transformation Through The Connected Enterprise Name Mukund Title Business Manager, Software, Asia Pacific Date January 22, 2018 Copyright 2016 Rockwell Automation, Inc. All Rights

More information

FLUID COMPUTING. ARC FORUM, India Ricky Watts Director of Industrial Solutions, Wind River IN A SOFTWARE-DEFINED WORLD

FLUID COMPUTING. ARC FORUM, India Ricky Watts Director of Industrial Solutions, Wind River IN A SOFTWARE-DEFINED WORLD FLUID COMPUTING IN A SOFTWARE-DEFINED WORLD ARC FORUM, India Ricky Watts Director of Industrial Solutions, Wind River Chemical Sector Commercial Building Sector Communications Sector Critical Manufacturing

More information

Intermedia s Private Cloud Exchange

Intermedia s Private Cloud Exchange Intermedia s Private Cloud Exchange This is a practical guide to implementing Intermedia s Private Cloud Exchange on AWS. Intermedia, the world s independent provider of Hosted Exchange, and AWS, the leading

More information

IoT Enabling Smart Facilities - an Owner Perspective. Arthur Chuang Senior Director, 300mm Facility Div., TSMC

IoT Enabling Smart Facilities - an Owner Perspective. Arthur Chuang Senior Director, 300mm Facility Div., TSMC IoT Enabling Smart Facilities - an Owner Perspective Arthur Chuang Senior Director, 300mm Facility Div., TSMC EDUCATION Arthur Chuang - Bio BS, Mechanical Engineering, National Taiwan University of Science

More information

Government IT Modernization and the Adoption of Hybrid Cloud

Government IT Modernization and the Adoption of Hybrid Cloud Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments

More information

77% 56% 74% 52% PACKAGING WORLD SURVEY: Ethernet And Wireless In Production Facilities

77% 56% 74% 52% PACKAGING WORLD SURVEY: Ethernet And Wireless In Production Facilities Ethernet Usage + Strategy Survey 2012 A joint survey by Packaging World and XYZ Company was conducted in late 2012 to obtain insight into current engineering and management applications and opinions surrounding

More information

ARC VIEW. Honeywell s New PLC Brings Digital Transformation to the ControlEdge. Keywords. Summary. The Edge and IIoT.

ARC VIEW. Honeywell s New PLC Brings Digital Transformation to the ControlEdge. Keywords. Summary. The Edge and IIoT. ARC VIEW AUGUST 3, 2017 Honeywell s New PLC Brings Digital Transformation to the ControlEdge By Craig Resnick Keywords IIoT, PLC, DCS, Digital Transformation, Mobility, OPC UA, Cybersecurity Summary IIoT

More information

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure SESSION ID: SBX1-R07 Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure Bryan Hatton Cyber Security Researcher Idaho National Laboratory In support of DHS ICS-CERT @phaktor 16 Critical

More information

Hybrid IT for SMBs. HPE addressing SMB and channel partner Hybrid IT demands ANALYST ANURAG AGRAWAL REPORT : HPE. October 2018

Hybrid IT for SMBs. HPE addressing SMB and channel partner Hybrid IT demands ANALYST ANURAG AGRAWAL REPORT : HPE. October 2018 V REPORT : HPE Hybrid IT for SMBs HPE addressing SMB and channel partner Hybrid IT demands October 2018 ANALYST ANURAG AGRAWAL Data You Can Rely On Analysis You Can Act Upon HPE addressing SMB and partner

More information

OSIsoft PI System Usage For Academia

OSIsoft PI System Usage For Academia OSIsoft PI System Usage For Academia Jim O Rourke, Academic Acct. Mgr. OSIsoft jorourke@osisoft.com 281-433-3399 Mike Mihuc, Academic Principal OSIsoft mmihuc@osisoft.com 412-779-6804 March 17, 2016 We

More information

Cyber Security of Industrial Control Systems (ICSs)

Cyber Security of Industrial Control Systems (ICSs) Cyber Security of Industrial Control Systems (ICSs) February 23, 2016 Joe Weiss PE, CISM, CRISC, ISA Fellow Managing Partner Applied Control Solutions, LLC (408) 253-7934 joe.weiss@realtimeacs.com Applied

More information

Measurement Challenges and Opportunities for Developing Smart Grid Testbeds

Measurement Challenges and Opportunities for Developing Smart Grid Testbeds Measurement Challenges and Opportunities for Developing Smart Grid Testbeds 10th Carnegie Mellon Conference on the Electricity Industry April 1, 2015 Paul Boynton boynton@nist.gov Testbed Manager Smart

More information

ARC VIEW. Leveraging New Automation Approaches Across the Plant Lifecycle. Keywords. Summary. By Larry O Brien

ARC VIEW. Leveraging New Automation Approaches Across the Plant Lifecycle. Keywords. Summary. By Larry O Brien ARC VIEW JUNE 22, 2017 Leveraging New Automation Approaches Across the Plant Lifecycle By Larry O Brien Keywords Operational Excellence, Cloud, Virtualization, Operations Management, Field Commissioning,

More information

SGS CYBER SECURITY GROWTH OPPORTUNITIES

SGS CYBER SECURITY GROWTH OPPORTUNITIES SGS CYBER SECURITY GROWTH OPPORTUNITIES Eric Krzyzosiak GENERAL MANAGER DIGITAL Jeffrey Mc Donald Executive Vice President CERTIFICATION & BUSINESS ENHANCEMENT Eric Lee WIRELESS & CONSUMER RETAIL CYBER

More information

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure Information Infrastructure and Security The value of smart manufacturing begins with a secure and reliable infrastructure The Case for Connection To be competitive, you must be connected. That is why industrial

More information

NW NATURAL CYBER SECURITY 2016.JUNE.16

NW NATURAL CYBER SECURITY 2016.JUNE.16 NW NATURAL CYBER SECURITY 2016.JUNE.16 ADOPTED CYBER SECURITY FRAMEWORKS CYBER SECURITY TESTING SCADA TRANSPORT SECURITY AID AGREEMENTS CONCLUSION QUESTIONS ADOPTED CYBER SECURITY FRAMEWORKS THE FOLLOWING

More information

Cybersecurity Overview

Cybersecurity Overview Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where

More information

Network Architectural Design for Cybersecurity in a Virtual World

Network Architectural Design for Cybersecurity in a Virtual World Network Architectural Design for Cybersecurity in a Virtual World Standards Certification Education & Training Publishing Conferences & Exhibits Kenneth Frische aesolutions 2016 ISA Water / Wastewater

More information

Run the business. Not the risks.

Run the business. Not the risks. Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive

More information

Smart Manufacturing in the Food & Beverage Industry

Smart Manufacturing in the Food & Beverage Industry Smart Manufacturing in the Food & Beverage Industry PUBLIC Copyright 2016 Rockwell Automation, Inc. All Rights Reserved. 1 Rockwell Automation at a Glance $5.9B FISCAL 2016 SALES 22,000 EMPLOYEES 80+ COUNTRIES

More information

SANS SCADA and Process Control Europe Rome 2011

SANS SCADA and Process Control Europe Rome 2011 SANS SCADA and Process Control Europe Rome 2011 Ian Buffey Director International Services Industrial Defender ibuffey@industrialdefender.com A Holistic Approach Planning, training and governance Cybersecurity

More information

Control Systems Cyber Security Awareness

Control Systems Cyber Security Awareness Control Systems Cyber Security Awareness US-CERT Informational Focus Paper July 7, 2005 Produced by: I. Purpose Focus Paper Control Systems Cyber Security Awareness The Department of Homeland Security

More information

Title DC Automation: It s a MARVEL!

Title DC Automation: It s a MARVEL! Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights

More information

Accelerating High Performance Manufacturing

Accelerating High Performance Manufacturing Copyright 2013 Rockwell Automation, Inc. All Rights Reserved. Accelerating High Performance Manufacturing John Nesi Vice President Market Development Copyright 2013 Rockwell Automation, Inc. All Rights

More information

Electrical Products Group Conference

Electrical Products Group Conference Electrical Products Group Conference David Farr Chairman and CEO May 20, 2015 Safe Harbor Statement Our commentary and responses to your questions may contain forward-looking statements, including our

More information

T103 PlantPAx System Fundamentals

T103 PlantPAx System Fundamentals T103 PlantPAx System Fundamentals PUBLIC INFORMATION Rev 5058-CO900E Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. PUBLIC INFORMATION Copyright 2014 Rockwell Automation, Inc. All Rights

More information

Thrive in today's digital economy

Thrive in today's digital economy Thrive in today's digital economy "Connectivity redefines everything, and we have believed in its transformative power for decades. Fifty years ago, we integrated intelligence in machines and automated

More information

EPRO. Electric Infrastructure Protection Initiative EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS

EPRO. Electric Infrastructure Protection Initiative EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS EPRO Electric Infrastructure Protection Initiative EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS The Role of Systems Engineering in Addressing Black Sky Hazards

More information

Thrive in today's digital economy

Thrive in today's digital economy Thrive in today's digital economy TABLE OF CONTENTS "Connectivity redefines everything, and we have believed in its transformative power for decades. Fifty years ago, we integrated intelligence in machines

More information

Dell helps you simplify IT

Dell helps you simplify IT Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending

More information

Smart Islands, Intelligent Nations. Carlyle Roberts, Bahamas Telecommunications Company August 1 st, 2016

Smart Islands, Intelligent Nations. Carlyle Roberts, Bahamas Telecommunications Company August 1 st, 2016 Smart Islands, Intelligent Nations Carlyle Roberts, Bahamas Telecommunications Company August 1 st, 2016 Technology: Constantly Evolving Evolutionary Path Technology: Creating a new world Evolutionary

More information

Continuous protection to reduce risk and maintain production availability

Continuous protection to reduce risk and maintain production availability Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading

More information

Innovation policy for Industry 4.0

Innovation policy for Industry 4.0 Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda

More information

MarketsandMarkets. Publisher Sample

MarketsandMarkets.  Publisher Sample MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm

More information

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on

More information

Internet of Things Toolkit for Small and Medium Businesses

Internet of Things Toolkit for Small and Medium Businesses Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors

More information

What It Takes to be a CISO in 2017

What It Takes to be a CISO in 2017 What It Takes to be a CISO in 2017 Doug Copley Deputy CISO Sr. Security & Privacy Strategist February 2017 IMAGINE You re the CISO In Bangladesh Of a bank On a Friday when you re closed You realize 6 huge

More information

USE CASES BROADBAND AND MEDIA EVERYWHERE SMART VEHICLES, TRANSPORT CRITICAL SERVICES AND INFRASTRUCTURE CONTROL CRITICAL CONTROL OF REMOTE DEVICES

USE CASES BROADBAND AND MEDIA EVERYWHERE SMART VEHICLES, TRANSPORT CRITICAL SERVICES AND INFRASTRUCTURE CONTROL CRITICAL CONTROL OF REMOTE DEVICES 5g Use Cases BROADBAND AND MEDIA EVERYWHERE 5g USE CASES SMART VEHICLES, TRANSPORT CRITICAL SERVICES AND INFRASTRUCTURE CONTROL CRITICAL CONTROL OF REMOTE DEVICES HUMAN MACHINE INTERACTION SENSOR NETWORKS

More information

Hannover Milano Fairs India Pvt. Ltd.

Hannover Milano Fairs India Pvt. Ltd. Joint Organisers for MDA INDIA Knowledge Partner for Automation Training Zone Hannover Milano Fairs India Pvt. Ltd. HANNOVER MESSE connect India was a Partner Country at Hannover Messe 2015 and had a wonderful

More information

APRIL 2018 ABB Division Fact Sheets

APRIL 2018 ABB Division Fact Sheets APRIL 208 ABB Division Fact Sheets ABB financial summary Revenues by division 207 % of total revenues 24% 29% 9% PG EP 28% IA RM Revenues by region 207 % of total revenues 35% Europe Americas AMEA 46%

More information

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

Emerging Landscape of IT. Hishamul Hasheel,Vice President Software & Security, Redington Gulf - Value Division

Emerging Landscape of IT. Hishamul Hasheel,Vice President Software & Security, Redington Gulf - Value Division Emerging Landscape of IT Hishamul Hasheel,Vice President Software & Security, Redington Gulf - Value Division SOME PEOPLE DON T LIKE CHANGE BUT YOU NEED TO EMBRACE CHANGE IF THE ALTERNATIVE IS DISASTER

More information

Centralized Control System Architecture

Centralized Control System Architecture Centralized Control System Architecture Standards Certification Education & Training Publishing Conferences & Exhibits Speakers: Hassan Ajami, PE CAP Anil Gosine 2016 ISA Water / Wastewater and Automatic

More information

Cloud Transformation and Significance of Security

Cloud Transformation and Significance of Security Cloud Transformation and Significance of Security Mohit Sharma, Chief Architect & Cloud Evangelist @onlinesince2009 www.cloudsec.com Datacenter Management Change Management Policy Physical Network Management

More information

Digital Substation Unrestricted Siemens AG 2017 siemens.com/digital-substation

Digital Substation Unrestricted Siemens AG 2017 siemens.com/digital-substation Digital Substation A Substation Why Should We Make It Digital? Adopt new business models Time to operation Quality assurance Business agility Avoid outages Investment security Ensuring grid availability

More information

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Making hybrid IT simple with Capgemini and Microsoft Azure Stack Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.

More information

Are You Protected. Get Ahead of the Curve

Are You Protected. Get Ahead of the Curve Are You Protected Get Ahead of the Curve DEMOGRAPHICS INTERVIEWED 2,200 IT DECISION- MAKERS IN 3 REGIONS: 500 Americas 1,100 Europe, Middle East, and Africa 600 Asia Pacific Japan INDEPENDENT RESEARCH

More information

Digitalization Risk or opportunity?»

Digitalization Risk or opportunity?» Digitalization Risk or opportunity?» Thomas Menze, Senior Consultant September 21 st, 2018 Dmitry Feshin, ARC Advisory Group representation Russia and CIS Программа презентации ARC старт операций в России

More information

Agenda. What is Cloud/Azure Azure Services & Scenarios Security Pricing

Agenda. What is Cloud/Azure Azure Services & Scenarios Security Pricing Agenda This presentation explores new and improved features in Windows Azure that help customers deploy and run Windows Server and Linux virtual machines in minutes. Migrate workloads without having to

More information

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) An Operational Cyber Security Perspective on Emerging Challenges Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) Johns Hopkins University Applied Physics Lab (JHU/APL) University

More information

Vscale: Real-World Deployments of Next-Gen Data Center Architecture

Vscale: Real-World Deployments of Next-Gen Data Center Architecture Vscale: Real-World Deployments of Next-Gen Data Center Architecture Key takeaways Dell EMC Vscale is a standard, modular, pre-engineered architecture that transforms data centers into an automated, scalable

More information

The NIST Cybersecurity Framework

The NIST Cybersecurity Framework The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce

More information

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 With the industrialization of hacking and the enormous impact of security breaches,

More information

Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center

Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center Leverage Analytics To Protect and Optimize Your Business Infrastructure SOLUTION PROFILE Managing a data center and the

More information

Challenges of Multivendor Systems in Implementation of IIoT-ready PLCs. ISA/Honeywell Webinar 10 November 2016

Challenges of Multivendor Systems in Implementation of IIoT-ready PLCs. ISA/Honeywell Webinar 10 November 2016 Challenges of Multivendor Systems in Implementation of IIoT-ready PLCs ISA/Honeywell Webinar 10 November 2016 2 Before we begin: Challenges of Multivendor Systems in Implementation of IIoT-ready PLCs Listen

More information

Flexible Capacity. Giovanna Guglielmi Flexible Capacity e Datacenter Care Business Manager Hewlett Packard Enterprise Italia

Flexible Capacity. Giovanna Guglielmi Flexible Capacity e Datacenter Care Business Manager Hewlett Packard Enterprise Italia Flexible Capacity Nuovi modelli di IT consumption per essere innovativi ed efficienti Giovanna Guglielmi Flexible Capacity e Datacenter Care Business Manager Hewlett Packard Enterprise Italia Transforming

More information

Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains

Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains Concept Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains Changes in economic and social conditions, which include the growing diversity of consumer

More information

ARC VIEW. Critical Industries Need Active Defense and Intelligence-driven Cybersecurity. Keywords. Summary. By Sid Snitkin

ARC VIEW. Critical Industries Need Active Defense and Intelligence-driven Cybersecurity. Keywords. Summary. By Sid Snitkin ARC VIEW DECEMBER 7, 2017 Critical Industries Need Active Defense and Intelligence-driven Cybersecurity By Sid Snitkin Keywords Industrial Cybersecurity, Risk Management, Threat Intelligence, Anomaly &

More information

ARM mbed: Internet of Possible

ARM mbed: Internet of Possible ARM mbed: Internet of Possible Bill Woo Director ISG Sales El Tower / 2017 Tech Forum June 28, 2017 Introduction Today enterprises are under pressure to unlock the value in the Internet of Things. Our

More information

IoT, Cloud and Managed Services Accelerating the vision to reality to profitability

IoT, Cloud and Managed Services Accelerating the vision to reality to profitability Dubrovnik, Croatia, South East Europe 20-22 May, 2013 IoT, Cloud and Managed Services Accelerating the vision to reality to profitability M. Abdul Munim Cloud and Managed Services Program Lead EMEAR Region

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

IEC A cybersecurity standard approaching the Rail IoT

IEC A cybersecurity standard approaching the Rail IoT IEC 62443 A cybersecurity standard approaching the Rail IoT siemens.com/communications-for-transportation Today s Siemens company structure focusing on several businesses Siemens AG Power and Gas (PG)

More information

hcloud Deployment Models

hcloud Deployment Models hcloud Deployment Models Drew Dietrich Director, Oracle Managed Cloud Services 1 The Safe Harbor The following is intended to outline our general product direction. It is intended for information purposes

More information

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure

More information

Security & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web

Security & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web Security & Compliance in the AWS Cloud Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web Services @awscloud www.cloudsec.com #CLOUDSEC Security & Compliance in the AWS Cloud TECHNICAL & BUSINESS

More information

IT your way - Hybrid IT FAQs

IT your way - Hybrid IT FAQs Hybrid IT IT your way - Hybrid IT FAQs Create a strategy that integrates in-house and outsourced IT services to meet ever-changing business requirements. Combine on-premise and off premise solutions Mix

More information

Virtustream Managed Services Drive value from technology investments through IT management solutions. Tim Calahan, Manager Managed Services

Virtustream Managed Services Drive value from technology investments through IT management solutions. Tim Calahan, Manager Managed Services Virtustream Managed Services Drive value from technology investments through IT management solutions Tim Calahan, Manager Managed Services Virtustream Managed Services Your partner in delivering IT as

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

Industrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets

Industrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets Industrial Cyber Security ICS SHIELD Top-down security for multi-vendor OT assets OT SECURITY NEED Industrial organizations are increasingly integrating their OT and IT infrastructures. The huge benefits

More information

PI System Crash Course: Get the most out of PI World

PI System Crash Course: Get the most out of PI World PI System Crash Course: Get the most out of PI World Isabelle Lacaille Systems Engineer Joey Kim Instructional Systems Designer 1 Where we are in our PI 101 Journey 01 02 03 04 Landscape PI System & the

More information

Public and Private Interdependencies Filling a Gap in Most Continuity Plans

Public and Private Interdependencies Filling a Gap in Most Continuity Plans Public and Private Interdependencies Filling a Gap in Most Continuity Plans John A Jackson Executive Vice President Fusion Risk Management, Inc. The evolution of the continuity industrytechnology advancement

More information

Digital Forensics - Global Market Outlook ( )

Digital Forensics - Global Market Outlook ( ) Report Information More information from: https://www.wiseguyreports.com/reports/456593-digital-forensics-global-market-outlook-2015-2022 Digital Forensics - Global Market Outlook (2015-2022) Report /

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

SOC 3 for Security and Availability

SOC 3 for Security and Availability SOC 3 for Security and Availability Independent Practioner s Trust Services Report For the Period October 1, 2015 through September 30, 2016 Independent SOC 3 Report for the Security and Availability Trust

More information

Engineering SCADA (Introduction) Dr. Sasidharan Sreedharan

Engineering SCADA (Introduction) Dr. Sasidharan Sreedharan Engineering SCADA (Introduction) Dr. Sasidharan Sreedharan www.sasidharan.webs.com Contents What is a SCADA System Simple SCADA System lay out and working Components of a SCADA System Levels of SCADA -

More information

Cloud Strategies for Addressing IT Challenges

Cloud Strategies for Addressing IT Challenges Cloud Strategies for Addressing IT Challenges Mark Bowker Senior Analyst Enterprise Strategy Group Introduction Mark Bowker, Senior Analyst U.S. Headquarters 20 Asylum Street Milford, MA 01757 2011 Enterprise

More information

SAS SOLUTIONS ONDEMAND

SAS SOLUTIONS ONDEMAND DECEMBER 4, 2013 Gary T. Ciampa SAS Solutions OnDemand Advanced Analytics Lab Birmingham Users Group, 2013 OVERVIEW SAS Solutions OnDemand Started in 2000 SAS Advanced Analytics Lab (AAL) Created in 2007

More information

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Data Sheet Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Available through NASPO ValuePoint Cloud Services VIRTUSTREAM CLOUD AND MANAGED SERVICES SOLUTIONS

More information

Addressing Cyber Threats in Power Generation and Distribution

Addressing Cyber Threats in Power Generation and Distribution Addressing Cyber Threats in Power Generation and Distribution VEO, Asko Tuomela o Bachelor of Science in Electrical Power Engineering o Over 6 years experience in power projects, PLCs and supervision systems

More information

INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE

INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE INTRODUCTION AGENDA 01. Overview of Cloud Services 02. Cloud Computing Compliance Framework 03. Cloud Adoption and Enhancing

More information

FACTS AND OPPORTUNITIES IN BRAZIL. Gartner IT Security Summit Washington DC, June 2008

FACTS AND OPPORTUNITIES IN BRAZIL. Gartner IT Security Summit Washington DC, June 2008 FACTS AND OPPORTUNITIES IN BRAZIL Gartner IT Security Summit Washington DC, June 2008 OUR OBJECTIVE TODAY Raise your awareness that there are several Brazilian IT Services and Solutions Providers that

More information

ALIENVAULT USM FOR AWS SOLUTION GUIDE

ALIENVAULT USM FOR AWS SOLUTION GUIDE ALIENVAULT USM FOR AWS SOLUTION GUIDE Summary AlienVault Unified Security Management (USM) for AWS is a unified security platform providing threat detection, incident response, and compliance management

More information

HCL GRC IT AUDIT & ASSURANCE SERVICES

HCL GRC IT AUDIT & ASSURANCE SERVICES HCL GRC IT AUDIT & ASSURANCE SERVICES Overview The immense progress made in information and communications technology offers enterprises outstanding benefits. However this also results in making the risk

More information

Smart Manufacturing Enterprise

Smart Manufacturing Enterprise Smart Manufacturing Enterprise The Plant of the Future Marco Gamba, Smart Manufacturing Project Manager Fabio Beda, Technical Sales Consultant Smart Manufacturing An evolution which raises from a need

More information

Country Focus: USA +2.2% $43 5.7% Trillion 21.7% of the total global GDP 1 Government Spending on Infrastructure. 80% of GDP. 3% of GDP.

Country Focus: USA +2.2% $43 5.7% Trillion 21.7% of the total global GDP 1 Government Spending on Infrastructure. 80% of GDP. 3% of GDP. North America Country Focus: USA Key facts GDP $19.5 +2.2% Trillion 21.7% of the total global GDP 1 Government Spending on Infrastructure 3% of GDP Annually TIC Services $43 Billion GDP Growth Services

More information

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n CYBETBIT in a Nutshell A leader in the development and integration of Cyber Security Solutions A main provider of Cyber Security solutions for the

More information

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value. An IDC InfoBrief, sponsored by Cisco September 2016

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value. An IDC InfoBrief, sponsored by Cisco September 2016 All Are Trying, Some Are Benefiting; Few Are Maximizing Value September 2016 Executive Summary Cloud adoption has increased 61% from last year, with 73% pursuing a hybrid cloud strategy and on-premises

More information

End-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration

End-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration End-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration Dr. Andreas Hauser Director Digital Service, TÜV SÜD Tokyo, 21 February 2017 Corporate Profile Slide 2 Our heritage: 150

More information

Run a Smart Workplace Introducing the Digital Building. Digital Building Solutions

Run a Smart Workplace Introducing the Digital Building. Digital Building Solutions Digital Building Solutions Run a Smart Workplace Introducing the Digital Building Maximize efficiency and productivity Enhance infrastructure flexibility & network security Reduce installation and operating

More information

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b) AGENDA ADDENDU TE REGULAR EETING OF TE AUDIT COITTEE COITTEE PUBLIC SESSION Tuesday, June 6, 2017 6:30 P.. Pages 13. Staff Reports 13.f Toronto Catholic District School Board's IT Strategic Review - Draft

More information

Introduction to Cisco IoT Tools for Developers IoT 101

Introduction to Cisco IoT Tools for Developers IoT 101 Introduction to Cisco IoT Tools for Developers IoT 101 Mike Maas, Technical Evangelist, IoT, DevNet Angela Yu, Technical Leader DEVNET-1068 Agenda The Cisco IoT System Distributing IoT Applications Developer

More information

ISA99 - Industrial Automation and Controls Systems Security

ISA99 - Industrial Automation and Controls Systems Security ISA99 - Industrial Automation and Controls Systems Security Committee Summary and Activity Update Standards Certification Education & Training Publishing Conferences & Exhibits September 2016 Copyright

More information