Ensuring Consistency of Critical Systems in Agile Development
|
|
- Mary Owen
- 5 years ago
- Views:
Transcription
1 Ensuring Consistency of Critical Systems in Agile Development Helmut Bunge, Samir Sarkic, Bosch Dr. Christof Ebert, Kai Ruedele, Vector Consulting Services V
2 Bosch technology to enhance quality of life Some 59,000 1 researchers and developers work at Bosch: at locations worldwide, in a single network. Bosch is one of the world s leading international providers of technology and services. Over the past six years, Bosch has invested more than 27 billion euros in research and development. Our objective: to develop innovative, useful, and exciting products and solutions to enhance quality of life technology that is Invented for life. 1 As of R&D locations with >50 associates, as of Internal C/CCB, C/CCD December 2017 Robert Bosch GmbH All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights. 2/21
3 Vector Consulting Services Vector is global market leader in automotive software and engineering toolchain with over employees Vector Consulting Services is supporting clients worldwide Product development, IT and change management Processes, tools, trainings, coaching transformation, interim support Agile, cybersecurity, safety, ASPICE, requirements engineering, etc. Automotive Medical Aerospace IT & Finance Digital Transformation Transport 3/21
4 Agenda 1. Welcome 2. Motivation 3. Ensuring Consistency in Agile Development 4. Conclusions and Outlook 4/21
5 Motivation Vector Client Survey 2018: Security and Safety are Major Challenges 80% 70% 60% 50% Midterm challenges Digital transformation Magic Triangle Innovation Safety and security 40% Connectivity 30% 20% 10% 0% Others Compliance Distributed teams Complexity Flexibility Competences Efficiency 0% 10% 20% 30% 40% 50% 60% 70% Shortterm challenges Vector Client Survey Details: Horizontal axis shows shortterm challenges; vertical axis shows midterm challenges. Sum > 200% due to 5 answers per question. Strong validity with >4% response rate of 2000 recipients from different industries worldwide. Safety and Cybersecurity have arrived as major challenges now and in future. Solution: Agile innovation 5/21
6 Motivation Overview: Agile Safety and Cybersecurity Vision Safe and secure product release within few hours with formal approval process and documentation This allows to react fast to cybersecurity attacks with safety impact. Challenge Frequent and late changes in safety related product development are often hindered because they take too much effort to release with right quality level. Solution Agile safety analysis process supported by semiautomated tooling: Method, Organization, Tooling This presentation presents the evolution path to integrate agile and safety/security. With the growth of IoT and convergence of IT and embedded systems it applies to practically all industries 6/21
7 Agenda 1. Welcome 2. Motivation 3. Ensuring Consistency in Agile Development 4. Conclusions and Outlook 7/21
8 Ensuring Consistency in Agile Development Method: ModelBased Dependency Analysis (1/2) System Requirements Logical System Architecture SwitchMatrix y:pm_y x:pm_x sel:pm_selection Type: SwitchMatrix PowerManagement KeyIn:KeyIn x+:pm_pass_x+ y+:pm_pass_y+ y:pm_pass_yx:pm_pass_xy+:pm_driv_yx:pm_driv_x y:pm_driv_y x+:pm_driv_x+ Assembly Net Assembly Net PowerMirrorCtrl y:pm_y x:pm_x sel:pm_selection def12:keyin PowerMirrorPass x+:pm_pass_x+ y+:pm_pass_y+ y:pm_pass_yx:pm_pass_xy+:pm_driv_y+ Type: PowerMirr... PowerMirrorDriver x:pm_driv_x y:pm_driv_y x+:pm_driv_x+ System FTA/FMEA Type: PowerMan... Type: PowerMirrorCtrl Type: PowerMirr... Pass Door Ctrl Driver Door Ctrl Component Architecture PassengerMirror DriverMirror cv2:4w KA_Pass Door Ctrl _0 DoorLIN:LIN SwtichMatrix BatMng CANPT:CANC Gateway Body Ctrl PowerSupply Ground Component FTA/FMEA Simulation Implementation Fault Injection / TDD Traceability from changes based on hierarchic modelling & update of analysis and tests 8/21
9 Ensuring Consistency in Agile Development Method: ModelBased Dependency Analysis (2/2) Scenario: small change leads to negative impact on safety Challenge: early detection of safety impact Target: Continuous Safety Analysis Simplified Example: Activity Diagram (SysML) helps to investigate impact of changes Based on this effect chain analysis the related tasks for safety analysis update can be identified (e.g. are safety related operations affected by change) 9/21
10 Ensuring Consistency in Agile Development Method: Continuous Regression Testing Assets and Attack Potentials Features and Operation Scenarios? Safety Operations Security Operations Threat and Risk Assessment Security Goals Hazard and Risk Assessment Safety Goals Safety Case Validate Safety Assumptions Security Case Validate Security Assumptions Security Architecture Functional SafetyConcept Test Safety Mechanisms Test Security Mechanisms, Pen Tests Technical Security Concept Technical SafetyConcept Verify Safety Mechanisms Verify Security Mechanisms Implement. of Security Mechanisms Implement. of Safety Mechanisms Safety Verification on Unit Level Security Verification on Unit Level Safety Activity Security Activity Safe / Secure Implementation of Nominal Functions Similar to Safety, Security needs to be an integrated part of the development process. For efficient and fast rampup, connect security with existing safety governance. 10/21
11 Ensuring Consistency in Agile Development Organization: Scaled Agile with Safety integration Testing Team Scrum of Scrums Challenge: Manage dependencies between teams in case of safety related changes Location 2 Location 1 Coordinate safety via Scrum Of Scrums focus on safety impact coordination SW Team 1 SW Team 2 HW Team Coordinate change waves e.g. update of HW leads to significant SW and Safety update Location 1 Location 2 Location 3 Semiautomated safety analysis to detect unexpected sideeffects 11/21
12 Ensuring Consistency in Agile Development Organization: Testoriented Requirements Engineering (TORE) with Agile Teams Testing Team Scrum of Scrums Location 2 Location 1 Safety Manager SW Team 1 SW Team 2 HW Team Mechanical Team Safety Engineering Location 1 Location 2 Location 3 Location 1 Legend Chief Technical Lead SW Lead Team 1 SW Lead Team 2 Technical Lead Testing Team Member Hardware Lead Mechanical Lead Kanban Board Agile teams clarify initially the test setup based on hierarchic requirements and models 12/21
13 Ensuring Consistency in Agile Development Tools: Integrated Safety Tools Why is the tooling important? Safety Analysis depends on Respective scope, i.e. System, SW, HWDesign Specific safety requirements Dependencies from cybersecurity threat analysis Requirements Architecture + Design 1 Develop Safety Analysis 3 Improve Changes have complex dependencies and interactions across work products. Tooling is mandatory for efficient and consistent change handling. Interface Design to Safety Analysis 2 Analyse 13/21
14 Ensuring Consistency in Agile Development Tools: Support for Consistency in Agile Development Benefits from automated tools Maintaining the continuous safetycase with necessary documentation in agile incremental deliveries of critical systems Efficient implementation of cybersecurity and functional safety during changes Full LifeCycle support from requirements to concept, design, test and aftersales Traceability and governance Support for heterogeneous environments Evolution to automated generation of Safety Analysis based on detailed modeling of static and dynamic aspects Vector SafetyCheck / SecurityCheck Continuous Safety Case PREEvision Safety support Bosch DASP Workbench 14/21
15 Agenda 1. Welcome 2. Motivation 3. Ensuring Consistency in Agile Development 4. Conclusions and Outlook 15/21
16 Conclusions and Outlook Conclusion: Safety/Security are Possible in Agile Development Integration of safety and cybersecurity in agile projects is possible and has benefits if the following conditions are fulfilled Methods > Consistency across work products from HARA/TARA to safety/security goals and requirements to design, implementation, (regression) test and safety/security case documentation Organization > Safety team is integrated in agile team (safety manager / safety engineer). > Agile team has necessary safety and security competences. Tools > Sufficient tool based traceability (requirements, architecture, tests, change sets..) is established. > Safety tooling supports interfaces to design tools (System, SW, HW). Safety and cybersecurity engineering must be integrated with software development. Systematic integration ensures efficient and robust development in agile context 16/21
17 Conclusions and Outlook Evolution: Critical Systems Demand Agility Scaling High Vector ACE Risk Criticality Governance Low Flexibility, Continuity High Source: Ebert, Requirements Engineering, 2018 Agility for safety and cybersecurity needs profound methodology and guidance 17/21
18 Conclusions and Outlook Further Information: Automotive E/E Trends Mobility: From driving to multimodal mobility services and sharing culture Business Models: From incumbent tiered supplychain to flexible new players from IT industry E/E architecture: From distributed electronic controllers to standardized threetier architecture IT architecture: From proprietary building blocks to open IT systems with offtheshelf components and adaptive SOA. Development lifecycle: From the classic V model with rather heavy release cycles to agile DevOpslike approach. Governance: From encapsulated safetycritical functions to interwoven quality assurance for liability, safety, cybersecurity, privacy. Culture: From R&D vs. IT separation to convergence. Competences: From automotive embedded electronics to IT as a core competence of all engineers. Source: IEEE Software May 2017 (Vector Guest Edited) Contact Vector for white papers, technical benchmarks and consulting 18/21
19 Conclusions and Outlook Agile in Practice Vector Forum 2019 The Agile Organization Adaptive, Distributed, Scaling Agile for Critical Systems 27. June 2019 in Stuttgart Practical experiences from global leaders, across industries Enhance your competences Grow your networks Details 19/21
20 Conclusions and Outlook More Information Bosch: Vector: 20/21
21 Thank you for your attention. For more information please contact us. Passion. Partner. Value. Vector Consulting Phone:
Functional Safety and Cyber-Security Experiences and Trends
Functional Safety and Cyber-Security Experiences and Trends Dr. Christof Ebert, Vector Consulting Services V1.0 2017-12-11 Welcome Vector Consulting Services Experts for product development, product strategy
More informationFunctional Safety and Cyber Security Experiences and Trends
Functional Safety and Cyber Security Experiences and Trends Vector China Congress, Shanghai, 7. Sep. 2017 Dr. Christof Ebert, Vector Consulting Services V1.0 2017-09-07 Welcome Vector Consulting Services
More informationMASP Chapter on Safety and Security
MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationVersion: V2.0. Integrated Building. Architecture. 19 April dimension data advanced infrastructure
Version: V2.0 Integrated Building 19 April 2013 Architecture dimension data advanced infrastructure Agenda Framework for Implementation Case Studies Copyright Dimension Data 19 April 2013 2 Question Given
More informationCertified Automotive Software Tester Sample Exam Paper Syllabus Version 2.0
Surname, Name: Gender: male female Company address: Telephone: Fax: E-mail-address: Invoice address: Training provider: Trainer: Certified Automotive Software Tester Sample Exam Paper Syllabus Version
More informationEnd-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration
End-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration Dr. Andreas Hauser Director Digital Service, TÜV SÜD Tokyo, 21 February 2017 Corporate Profile Slide 2 Our heritage: 150
More informationOrganizational Readiness for Digital Transformation
IVI Community Event Organizational Readiness for Digital Transformation Dr. Marian Carcary June 22nd 2017 Introduction Digital business transformation goes beyond traditional process optimization, to leveraging
More informationEUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE
EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile
More informationCAPABILITY. Managed testing services. Strong test managers experienced in working with business and technology stakeholders
TESTING SERVICES 1 CAPABILITY Innovative use of open source tools helping early and frequent and reducing license costs Test strategy Managed services Test management Functional Strong test managers experienced
More informationMaking hybrid IT simple with Capgemini and Microsoft Azure Stack
Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.
More informationEnhancing Security With SQL Server How to balance the risks and rewards of using big data
Enhancing Security With SQL Server 2016 How to balance the risks and rewards of using big data Data s security demands and business opportunities With big data comes both great reward and risk. Every company
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationA C H I E V E B O T H W I T H K E Y S I G H T. Company Profile
A C H I E V E B O T H W I T H K E Y S I G H T 1 W E H E L P Y O U C R E AT E. I N N O VAT E. A N D D E L I V E R W H AT S N E X T. The innovation leader in electronic design and test for over 75 years
More informationSoftware Verification and Validation (VIMMD052) Introduction. Istvan Majzik Budapest University of Technology and Economics
Software Verification and Validation (VIMMD052) Introduction Istvan Majzik majzik@mit.bme.hu Budapest University of Technology and Economics Dept. of Measurement and Information s Budapest University of
More informationSecure Product Design Lifecycle for Connected Vehicles
Secure Product Design Lifecycle for Connected Vehicles Lisa Boran Vehicle Cybersecurity Manager, Ford Motor Company SAE J3061 Chair SAE/ISO Cybersecurity Engineering Chair AGENDA Cybersecurity Standards
More informationIFS. Company Presentation JONAS SKAGERHULT- BUSINESS SOLUTION ARCHITECT ANN-KRISTIN SANDER- ACCOUNT MANAGER 2011 IFS
IFS Company Presentation 2012-12-12 JONAS SKAGERHULT- BUSINESS SOLUTION ARCHITECT ANN-KRISTIN SANDER- ACCOUNT MANAGER 2011 IFS I SHALL NEVER DO ANTYHING STUPID IN LIFE. EVER. I SHALL NEVER DO ANTYHING
More informationNISTCSF Enterprise Training Solutions. By David Nichols & Rick Lemieux December 2018
DxCERTS NISTCSF Enterprise Training Solutions By David Nichols & Rick Lemieux December 2018 Copyright and Trademark Notice Copyright 2018 itsm Publishing. itsm Solutions is a Registered Trademark of itsm
More informationCyber Security in Smart Commercial Buildings 2017 to 2021
Smart Buildings Cyber Security in Smart Commercial Buildings 2017 to 2021 Published: Q2 2017 Cyber Security in Smart Buildings Synopsis 2017 This report will help all stakeholders and investors in the
More informationCybersecurity and Commercial Aviation
Cybersecurity and Commercial Aviation Pascal ANDREI Chief Security Officer Airbus Group Jim Vasatka Director, Aviation Security Boeing Commercial Airplanes Agenda Aviation Cybersecurity External Drivers
More informationCertified Software Quality Engineer Preparation On Demand, Web-Based Course Offered by The Westfall Team
Certified Software Quality Engineer (CSQE) Preparation course is an on demand, web-based course design to be a comprehensive, in-depth review of the topics in the ASQ s Certified Software Quality Engineer
More informationCybersecurity. Securely enabling transformation and change
Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why
More informationCOBIT 5 Assessor Certification Course
COBIT 5 Assessor Certification Course About COBIT 5.0 Information is created, used, retained, disclosed and destroyed. Technology plays a key role in these actions and technology is becoming pervasive
More informationCountry Focus: USA +2.2% $43 5.7% Trillion 21.7% of the total global GDP 1 Government Spending on Infrastructure. 80% of GDP. 3% of GDP.
North America Country Focus: USA Key facts GDP $19.5 +2.2% Trillion 21.7% of the total global GDP 1 Government Spending on Infrastructure 3% of GDP Annually TIC Services $43 Billion GDP Growth Services
More informationOVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE. Dr. Angelos Amditis Research Director, ICCS
OVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE Dr. Angelos Amditis Research Director, ICCS OUTLINE Introduction L3Pilot: Pilot Testing INFRAMIX: Hybrid Infrastructure SAFERtec:Cyber-security / Security
More informationTHE POWER OF TECH-SAVVY BOARDS:
THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES
More informationAddressing Future Challenges in the Development of Safe and Secure Software Components The MathWorks, Inc. 1
Addressing Future Challenges in the Development of Safe and Secure Software Components 2016 The MathWorks, Inc. 1 Cybersecurity Emerging Topic in the Auto Industry Vehicle-to-Infrastructure Wifi Hotspot
More informationSecure Agile How to make secure applications using Agile Methods Thomas Stiehm, CTO
Secure Agile How to make secure applications using Agile Methods Thomas Stiehm, CTO tom.stiehm@coveros.com 1 About Coveros Coveros helps organizations accelerate the delivery of business value through
More informationBUILDING GOOD-QUALITY FUNCTIONAL SPECIFICATION MODEL
BUILDING GOOD-QUALITY FUNCTIONAL SPECIFICATION MODEL A few words on Samares Engineering Research and Consultancy on Systems Engineering Requirement engineering Model-Based Systems Engineering Co-simulation
More informationEB, Elektrobit Corporation Interim Report 2Q CEO Jukka Harju August 8, 2012
EB, Elektrobit Corporation Interim Report 2Q 2012 CEO Jukka Harju August 8, 2012 Forward-looking Statements Some statements made in this material relating to future circumstances or status, including,
More informationICT Mentors e-learning portfolio provides our delegates with materials for study at the comfort of their homes, work place etc.
ICT Mentors e-learning portfolio provides our delegates with materials for study at the comfort of their homes, work place etc. We provide white labelled training packages and courses in: ITIL COBIT 5
More informationInstitute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI
Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee
More informationEveryday Security: Simple Solutions to Complex Security Problems
Everyday Security: Simple Solutions to Complex Security Problems Adrian Aldea Tivoli Technical Sales IBM South East Europe The world continues to get flatter, smaller and more interconnected through forces
More informationEvolve Your Security Operations Strategy To Account For Cloud
Evolve Your Security Operations Strategy To Account For Cloud GET STARTED The growth of cloud computing and proliferation of complex service delivery models continue to accelerate as companies recognize
More informationAutomotive Functional Safety
Automotive Functional Safety Complexity, Confidence, Compliance, Certification Farmington, 2018-03-22 23.03.2018 150 years TÜV SÜD 150 years of inspiring trust Inspiring trust since 1866 The year 2016
More informationNew Zealand Government IBM Infrastructure as a Service
New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand
More informationIDC FutureScape: Worldwide Security Products and Services 2017 Predictions
IDC FutureScape: Worldwide Security Products and Services 2017 Predictions Sean Pike, Program Vice President, Robert Ayoub, Research Director IDC Web Conference December, 7, 2016 Logistics Submit any questions
More informationIntroducing Cyber Resiliency Concerns Into Engineering Education
Introducing Cyber Resiliency Concerns Into Engineering Education Mr. Tom McDermott Georgia Tech Research Institute Mr. Barry Horowitz University of Virginia NDIA 20 th Annual Systems Engineering Conference
More informationBUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE
BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not
More informationPA TechCon. Cyber Wargaming: You ve been breached: Now what? April 26, 2016
PA TechCon Cyber Wargaming: You ve been breached: Now what? April 26, 2016 Cyber attacks are on the rise $3.79M The average cost of a cyber incident [1] o f i n c i d e n t s 15% s t i l l t a k e d a
More informationCyber Security Technologies
1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales
More informationSmart Data Center Solutions
Smart Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing,
More informationFrom Zero to Security Hero
From Zero to Security Hero Dr Carl Shaw IoTSF Security Conference December 2018 PUBLIC Making products that are secure by design Who am I? Some of our clients: Our recent project types Silicon devices
More informationHealthcare Security Success Story
Regional Forum on Cybersecurity in the Era of Emerging Technologies & the Second Meeting of the Successful Administrative Practices -2017 Cairo, Egypt 28-29 November 2017 Healthcare Security Success Story
More informationThe modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.
Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased
More informationCybersecurity Engineering and Assurance for Connected and Automated Vehicles
Cybersecurity Engineering and Assurance for Connected and Automated Vehicles Paul Wooderson Vehicle cybersecurity concerns Privacy vehicle as a data hub Theft physical cybersecurity Safety - impacts of
More informationModel-Based Systems Engineering Backbone of the Thales Engineering Manifesto
www.thalesgroup.com Model-Based Systems Engineering Backbone of the Thales Engineering Manifesto MBSE Symposium, Canberra Oct. 28 th, 2014 Olivier Flous, VP Engineering 2 / Thales: Company Profile Collective
More informationISO/ IEC (ITSM) Certification Roadmap
ISO/ IEC 20000 (ITSM) Certification Roadmap Rasheed Adegoke June 2013 Outline About First Bank Motivations Definitions ITIL, ISO/IEC 20000 & DIFFERENCES ISO/ IEC 20000 Certification Roadmap First Bank
More informationIntegrating Cyber Security and Safety Systems Engineering Disciplines with a common Code of Practice
Integrating Cyber Security and Safety Systems Engineering Disciplines with a common Code of Practice Dr Richard Piggin 16 November 2017 - Atkins Limited 1 Introduction Background Motivation Safety Engineering
More informationAutomated Continuous Verification & Validation for Automobile Software
Speakers Information- Controls, Measurement & Calibration Congress ABSTRACT Automated Continuous Verification & Validation for Automobile Software Vinodhini Vijayaraghavan, Jagadeeswara Vijayaraghavan
More informationMax Security Solutions
Max Security Solutions Max Security Solutions Proactive Risk Management What we do Max Security provides comprehensive security and risk management solutions for the business sector, private clients and
More informationIOT FLAGSHIP PROJECT. Dr. Mario Drobics, AIT
IOT FLAGSHIP PROJECT Dr. Mario Drobics, AIT Challenge Digitalization over the entire product lifecycle accelerates the development, validation, instrumentation and deployment of complex industrial products
More informationBusiness resilience in the face of cyber risk. By Roger Ostvold and Brian Walker
Business resilience in the face of cyber risk By Roger Ostvold and Brian Walker When it comes to experiencing failure of at least part of an enterprise s digital environment, it is a matter of when rather
More informationKey Findings from the Global State of Information Security Survey 2017 Indonesian Insights
www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.
More informationManagement Direction Briefing October 29, 2015 Fujitsu Limited
Management Direction Briefing October 29, 2015 Fujitsu Limited Copyright 2015 FUJITSU LIMITED Market Trend: Accelerating Digitalization Expectations for the delivery of higher-value ICT services Manufacturing
More informationWE IMPROVE THE WORLD THROUGH ENGINEERING!
WE IMPROVE THE WORLD THROUGH ENGINEERING! MARCH 2018 Assystem Technologies worldwide At a glance. 700m TURNOVER IN 2017 PORTFOLIO: Product Engineering Consulting In Service Offerings >9.000 EMPLOYEES OUR
More informationServiceable Luminaires in a Circular Economy - White Paper -
Serviceable Luminaires in a Circular Economy - White Paper - LIGHTINGEUROPE 1. Introduction scope and objective of this White Paper LightingEurope members have a long experience in dealing with aspects
More informationManagement Direction. FY2017 Progress Review. June 6, Copyright 2017 FUJITSU LIMITED
Management Direction FY2017 Progress Review June 6, 2017 FY 2015-2016 Financial Results and FY 2017 Plan Operating profit margin Free cash flow 2.5% 2.9% 4.5% Target 10% or more (Billion JPY) 88.7 104.8
More informationSIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC
W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,
More informationINTEGRATING AUTOMOTIVE HAZARD AND THREAT ANALYSIS METHODS: HOW DOES THIS FIT WITH ASSUMPTIONS OF THE SAE J3061
INTEGRATING AUTOMOTIVE HAZARD AND THREAT ANALYSIS METHODS: HOW DOES THIS FIT WITH ASSUMPTIONS OF THE SAE J3061 23rd EuroAsiaSPI Conference, Graz, Austria Georg Macher AVL List GmbH (Headquarters) INTEGRATING
More informationRiccardo Mariani, Intel Fellow, IOTG SEG, Chief Functional Safety Technologist
Riccardo Mariani, Intel Fellow, IOTG SEG, Chief Functional Safety Technologist Internet of Things Group 2 Internet of Things Group 3 Autonomous systems: computing platform Intelligent eyes Vision. Intelligent
More informationLPWA NETWORKS FOR IoT: WORLDWIDE TRENDS AND FORECASTS
RESEARCH FORECAST REPORT LPWA NETWORKS FOR IoT: WORLDWIDE TRENDS AND FORECASTS 2015 2025 MICHELE MACKENZIE Analysys Mason Limited 2016 analysysmason.com About this report Low-power, wide-area (LPWA) is
More informationInnovation policy for Industry 4.0
Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda
More informationChristoph Schmittner, Zhendong Ma, Paul Smith
FMVEA for Safety and Security Analysis of Intelligent and Cooperative Vehicles 1st International workshop on the Integration of Safety and Security Engineering (ISSE 14) Christoph Schmittner, Zhendong
More informationLifecycle Management (LCM)
Lifecycle Management (LCM) Presented by: John Sorensen Dave Trice PRESENTATION TITLE 2017 MHI Copyright claimed for audiovisual works and sound recordings of seminar sessions. All rights reserved. What
More information13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)
AGENDA ADDENDU TE REGULAR EETING OF TE AUDIT COITTEE COITTEE PUBLIC SESSION Tuesday, June 6, 2017 6:30 P.. Pages 13. Staff Reports 13.f Toronto Catholic District School Board's IT Strategic Review - Draft
More informationAn Integrated Framework for Multi-layer Certification-based Assurance
1 An Integrated Framework for Multi-layer Certification-based Assurance ACSAC 2014 - Layered Assurance Workshop New Orleans, Louisiana, USA. December 2014 Authors: Rajesh Harjani, Marcos Arjona, Javier
More informationInterim Report Q2/2016 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR
Interim Report Q2/216 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR AGENDA New CEO Highlights from Q2 Market update Business update Outlook Financials 2 SAMU KONTTINEN
More informationEstablishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security
Establishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security Michael John SmartSec 2016, Amsterdam www.encs.eu European Network for Cyber Security The European
More informationDesigning and Building a Cybersecurity Program
Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (CSF) Larry Wilson lwilson@umassp.edu ISACA Breakfast Meeting January, 2016 Designing & Building a Cybersecurity
More informationSecurity analysis and assessment of threats in European signalling systems?
Security analysis and assessment of threats in European signalling systems? New Challenges in Railway Operations Dr. Thomas Störtkuhl, Dr. Kai Wollenweber TÜV SÜD Rail Copenhagen, 20 November 2014 Slide
More informationClick ISO to edit Master title style Update on development of the standard
Click ISO 26262 to edit Master title style Update on development of the standard Dr David Ward Head of Functional Safety January 2016 Agenda Why update ISO 26262? What is the process for updating the standard?
More informationWELCOME ISO/IEC 27001:2017 Information Briefing
WELCOME ISO/IEC 27001:2017 Information Briefing Denis Ryan C.I.S.S.P NSAI Lead Auditor Running Order 1. Market survey 2. Why ISO 27001 3. Requirements of ISO 27001 4. Annex A 5. Registration process 6.
More informationSECURITY CODE. Responsible Care. American Chemistry Council. 7 April 2011
American Chemistry Council Responsible Care SECURITY CODE 7 April 2011 Debra Phillips Managing Director, Responsible Care American Chemistry Council Why develop a Separate Security Code? Need for a clearly
More informationCloud & CyberSecurity Services
Cloud & CyberSecurity Services Franck Greverie Cloud & CyberSecurity, Group Leader, EVP Sept 12th Cloud & CyberSecurity services A huge business opportunity for Capgemini Key enablers for the digital enterprise
More informationSTRATEGIC PLAN
STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology
More informationInstitute of Internal Auditors 2018 IIA CHICAGO CHAPTER JOIN NTAC:4UC-11
AUDITING ROBOTICS AND THE INTERNET OF THINGS (IOT) APRIL 9, 2018 PRESENTERS Kara Nagel Manager, Information Security Accenture Ryan Hopkins Assistant Director, Internal Audit Services Packaging Corp. of
More informationPaper. Delivering Strong Security in a Hyperconverged Data Center Environment
Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and
More informationCity as a Platform: From Vision to Reality
1 City as a Platform: From Vision to Reality Nik Willetts CEO, TM Forum 2017 TM Forum 1 2 Cities as Collections of Ecosystems 2017 TM Forum 2 3 2017 TM Forum 3 Maslow s Hierarchy of Needs Self actualization:
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationMedical Device Safety in a Connected World
Mr. Clark Fortney Senior Software Engineer Medical Device Safety in a Connected World IoT Expo June 6-8 2017 1 Clark Fortney My Background 20 years designing systems & software for medical devices at Battelle.
More informationBringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016
Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the
More informationBuilding resilience. Delivering assurance.
Building resilience. Delivering assurance. Strengthening and improving the way organisations operate, creating robust and resilient cultures. 01 02 RiskLogic Building resilience. Delivering assurance.
More informationAVS: A Test Suite for Automatically Generated Code
AVS: A Test Suite for Automatically Generated Code Ekkehard Pofahl Ford Motor Company Torsten Sauer Continental Automotive Systems Oliver Busa TUV Rheinland Industrie Service GmbH Page 1 of 22 AVS: Automotive
More informationDEPARTMENT OF HEALTH and HUMAN SERVICES. HANDBOOK for
DEPARTMENT OF HEALTH and HUMAN SERVICES HANDBOOK for FEDERAL ACQUISITION CERTIFICATION PROGRAM/PROJECT MANAGERS Issuer Office of the Secretary Office of the Assistant Secretary for Financial Resources
More informationCyber Risk and Networked Medical Devices
Cyber Risk and Networked Medical Devices Hot Topics Deloitte & Touche LLP February 2016 Copyright Scottsdale Institute 2016. All Rights Reserved. No part of this document may be reproduced or shared with
More informationOracle Buys Automated Applications Controls Leader LogicalApps
Oracle Buys Automated Applications Controls Leader LogicalApps To strengthen Oracle s Governance, Risk and Compliance Suite with Real-time Policy Enforcement October 26, 2007 Disclaimer The following is
More informationSecuring a Dynamic Infrastructure. IT Virtualization new challenges
Christian Fahlke GMT Channel Leader Internet Security Systems IBM Central & Eastern Europe, Middle East and Africa (CEEMEA) May 20th, 2009 Securing a Dynamic Infrastructure IT Virtualization new challenges
More informationAutomotive Security An Overview of Standardization in AUTOSAR
Automotive Security An Overview of Standardization in AUTOSAR Dr. Marcel Wille 31. VDI/VW-Gemeinschaftstagung Automotive Security 21. Oktober 2015, Wolfsburg Hackers take over steering from smart car driver
More informationDeriving safety requirements according to ISO for complex systems: How to avoid getting lost?
Deriving safety requirements according to ISO 26262 for complex systems: How to avoid getting lost? Thomas Frese, Ford-Werke GmbH, Köln; Denis Hatebur, ITESYS GmbH, Dortmund; Hans-Jörg Aryus, SystemA GmbH,
More informationSwedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation
Think Cloud Compliance Case Study Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation Customer details : Collector Bank - Sweden 329 employees www.collector.se/en Banking
More informationHow to be cyber secure A practical guide for Australia s mid-size business
How to be cyber secure A practical guide for Australia s mid-size business Introduction The digital age has bred opportunity for mid-size business. From ecommerce to social media, agile organisations have
More informationA Framework for Managing Crime and Fraud
A Framework for Managing Crime and Fraud ASIS International Asia Pacific Security Forum & Exhibition Macau, December 4, 2013 Torsten Wolf, CPP Head of Group Security Operations Agenda Introduction Economic
More informationMartijn Loderus. Merritt Maxim. Principal Analyst Forrester. Director & Global Practice Partner for Advisory Consulting Janrain
Merritt Maxim Principal Analyst Forrester Martijn Loderus Director & Global Practice Partner for Advisory Consulting Janrain Merritt and Martijn will share insights on Digital Transformation & Drivers
More informationFDA & Medical Device Cybersecurity
FDA & Medical Device Cybersecurity Closing Keynote, February 19, 2017 Suzanne B. Schwartz, M.D., MBA Associate Director for Science & Strategic Partnerships Center for Devices and Radiological Health US
More informationRiskSense Attack Surface Validation for IoT Systems
RiskSense Attack Surface Validation for IoT Systems 2018 RiskSense, Inc. Surfacing Double Exposure Risks Changing Times and Assessment Focus Our view of security assessments has changed. There is diminishing
More informationVulnerability Assessments and Penetration Testing
CYBERSECURITY Vulnerability Assessments and Penetration Testing A guide to understanding vulnerability assessments and penetration tests. OVERVIEW When organizations begin developing a strategy to analyze
More informationIEEE-SA Internet of Things - Security & Standards
IEEE-SA Internet of Things - Security & Standards Srikanth Chandrasekaran IEEE Standards Association MOBILE WORLD CONGRESS, SHANGHAI JUNE 2018 What does the IEEE Standards Association (IEEE-SA) do? Vision:
More informationConvergence of Safety, Systems & Cybersecurity Bill StClair, Director, LDRA, US Operations
Convergence of Safety, Systems & Cybersecurity Bill StClair, Director, LDRA, US Operations Agenda Nexus of Safety and Cybersecurity Separation and Connectivity Trends in Aerospace Cybersecurity Isn t Security
More informationMeeting PCI DSS 3.2 Compliance with RiskSense Solutions
Meeting PCI DSS 3.2 Compliance with Solutions Platform the industry s most comprehensive, intelligent platform for managing cyber risk. 2018, Inc. What s Changing with PCI DSS? Summary of PCI Business
More information