Ensuring Consistency of Critical Systems in Agile Development

Size: px
Start display at page:

Download "Ensuring Consistency of Critical Systems in Agile Development"

Transcription

1 Ensuring Consistency of Critical Systems in Agile Development Helmut Bunge, Samir Sarkic, Bosch Dr. Christof Ebert, Kai Ruedele, Vector Consulting Services V

2 Bosch technology to enhance quality of life Some 59,000 1 researchers and developers work at Bosch: at locations worldwide, in a single network. Bosch is one of the world s leading international providers of technology and services. Over the past six years, Bosch has invested more than 27 billion euros in research and development. Our objective: to develop innovative, useful, and exciting products and solutions to enhance quality of life technology that is Invented for life. 1 As of R&D locations with >50 associates, as of Internal C/CCB, C/CCD December 2017 Robert Bosch GmbH All rights reserved, also regarding any disposal, exploitation, reproduction, editing, distribution, as well as in the event of applications for industrial property rights. 2/21

3 Vector Consulting Services Vector is global market leader in automotive software and engineering toolchain with over employees Vector Consulting Services is supporting clients worldwide Product development, IT and change management Processes, tools, trainings, coaching transformation, interim support Agile, cybersecurity, safety, ASPICE, requirements engineering, etc. Automotive Medical Aerospace IT & Finance Digital Transformation Transport 3/21

4 Agenda 1. Welcome 2. Motivation 3. Ensuring Consistency in Agile Development 4. Conclusions and Outlook 4/21

5 Motivation Vector Client Survey 2018: Security and Safety are Major Challenges 80% 70% 60% 50% Midterm challenges Digital transformation Magic Triangle Innovation Safety and security 40% Connectivity 30% 20% 10% 0% Others Compliance Distributed teams Complexity Flexibility Competences Efficiency 0% 10% 20% 30% 40% 50% 60% 70% Shortterm challenges Vector Client Survey Details: Horizontal axis shows shortterm challenges; vertical axis shows midterm challenges. Sum > 200% due to 5 answers per question. Strong validity with >4% response rate of 2000 recipients from different industries worldwide. Safety and Cybersecurity have arrived as major challenges now and in future. Solution: Agile innovation 5/21

6 Motivation Overview: Agile Safety and Cybersecurity Vision Safe and secure product release within few hours with formal approval process and documentation This allows to react fast to cybersecurity attacks with safety impact. Challenge Frequent and late changes in safety related product development are often hindered because they take too much effort to release with right quality level. Solution Agile safety analysis process supported by semiautomated tooling: Method, Organization, Tooling This presentation presents the evolution path to integrate agile and safety/security. With the growth of IoT and convergence of IT and embedded systems it applies to practically all industries 6/21

7 Agenda 1. Welcome 2. Motivation 3. Ensuring Consistency in Agile Development 4. Conclusions and Outlook 7/21

8 Ensuring Consistency in Agile Development Method: ModelBased Dependency Analysis (1/2) System Requirements Logical System Architecture SwitchMatrix y:pm_y x:pm_x sel:pm_selection Type: SwitchMatrix PowerManagement KeyIn:KeyIn x+:pm_pass_x+ y+:pm_pass_y+ y:pm_pass_yx:pm_pass_xy+:pm_driv_yx:pm_driv_x y:pm_driv_y x+:pm_driv_x+ Assembly Net Assembly Net PowerMirrorCtrl y:pm_y x:pm_x sel:pm_selection def12:keyin PowerMirrorPass x+:pm_pass_x+ y+:pm_pass_y+ y:pm_pass_yx:pm_pass_xy+:pm_driv_y+ Type: PowerMirr... PowerMirrorDriver x:pm_driv_x y:pm_driv_y x+:pm_driv_x+ System FTA/FMEA Type: PowerMan... Type: PowerMirrorCtrl Type: PowerMirr... Pass Door Ctrl Driver Door Ctrl Component Architecture PassengerMirror DriverMirror cv2:4w KA_Pass Door Ctrl _0 DoorLIN:LIN SwtichMatrix BatMng CANPT:CANC Gateway Body Ctrl PowerSupply Ground Component FTA/FMEA Simulation Implementation Fault Injection / TDD Traceability from changes based on hierarchic modelling & update of analysis and tests 8/21

9 Ensuring Consistency in Agile Development Method: ModelBased Dependency Analysis (2/2) Scenario: small change leads to negative impact on safety Challenge: early detection of safety impact Target: Continuous Safety Analysis Simplified Example: Activity Diagram (SysML) helps to investigate impact of changes Based on this effect chain analysis the related tasks for safety analysis update can be identified (e.g. are safety related operations affected by change) 9/21

10 Ensuring Consistency in Agile Development Method: Continuous Regression Testing Assets and Attack Potentials Features and Operation Scenarios? Safety Operations Security Operations Threat and Risk Assessment Security Goals Hazard and Risk Assessment Safety Goals Safety Case Validate Safety Assumptions Security Case Validate Security Assumptions Security Architecture Functional SafetyConcept Test Safety Mechanisms Test Security Mechanisms, Pen Tests Technical Security Concept Technical SafetyConcept Verify Safety Mechanisms Verify Security Mechanisms Implement. of Security Mechanisms Implement. of Safety Mechanisms Safety Verification on Unit Level Security Verification on Unit Level Safety Activity Security Activity Safe / Secure Implementation of Nominal Functions Similar to Safety, Security needs to be an integrated part of the development process. For efficient and fast rampup, connect security with existing safety governance. 10/21

11 Ensuring Consistency in Agile Development Organization: Scaled Agile with Safety integration Testing Team Scrum of Scrums Challenge: Manage dependencies between teams in case of safety related changes Location 2 Location 1 Coordinate safety via Scrum Of Scrums focus on safety impact coordination SW Team 1 SW Team 2 HW Team Coordinate change waves e.g. update of HW leads to significant SW and Safety update Location 1 Location 2 Location 3 Semiautomated safety analysis to detect unexpected sideeffects 11/21

12 Ensuring Consistency in Agile Development Organization: Testoriented Requirements Engineering (TORE) with Agile Teams Testing Team Scrum of Scrums Location 2 Location 1 Safety Manager SW Team 1 SW Team 2 HW Team Mechanical Team Safety Engineering Location 1 Location 2 Location 3 Location 1 Legend Chief Technical Lead SW Lead Team 1 SW Lead Team 2 Technical Lead Testing Team Member Hardware Lead Mechanical Lead Kanban Board Agile teams clarify initially the test setup based on hierarchic requirements and models 12/21

13 Ensuring Consistency in Agile Development Tools: Integrated Safety Tools Why is the tooling important? Safety Analysis depends on Respective scope, i.e. System, SW, HWDesign Specific safety requirements Dependencies from cybersecurity threat analysis Requirements Architecture + Design 1 Develop Safety Analysis 3 Improve Changes have complex dependencies and interactions across work products. Tooling is mandatory for efficient and consistent change handling. Interface Design to Safety Analysis 2 Analyse 13/21

14 Ensuring Consistency in Agile Development Tools: Support for Consistency in Agile Development Benefits from automated tools Maintaining the continuous safetycase with necessary documentation in agile incremental deliveries of critical systems Efficient implementation of cybersecurity and functional safety during changes Full LifeCycle support from requirements to concept, design, test and aftersales Traceability and governance Support for heterogeneous environments Evolution to automated generation of Safety Analysis based on detailed modeling of static and dynamic aspects Vector SafetyCheck / SecurityCheck Continuous Safety Case PREEvision Safety support Bosch DASP Workbench 14/21

15 Agenda 1. Welcome 2. Motivation 3. Ensuring Consistency in Agile Development 4. Conclusions and Outlook 15/21

16 Conclusions and Outlook Conclusion: Safety/Security are Possible in Agile Development Integration of safety and cybersecurity in agile projects is possible and has benefits if the following conditions are fulfilled Methods > Consistency across work products from HARA/TARA to safety/security goals and requirements to design, implementation, (regression) test and safety/security case documentation Organization > Safety team is integrated in agile team (safety manager / safety engineer). > Agile team has necessary safety and security competences. Tools > Sufficient tool based traceability (requirements, architecture, tests, change sets..) is established. > Safety tooling supports interfaces to design tools (System, SW, HW). Safety and cybersecurity engineering must be integrated with software development. Systematic integration ensures efficient and robust development in agile context 16/21

17 Conclusions and Outlook Evolution: Critical Systems Demand Agility Scaling High Vector ACE Risk Criticality Governance Low Flexibility, Continuity High Source: Ebert, Requirements Engineering, 2018 Agility for safety and cybersecurity needs profound methodology and guidance 17/21

18 Conclusions and Outlook Further Information: Automotive E/E Trends Mobility: From driving to multimodal mobility services and sharing culture Business Models: From incumbent tiered supplychain to flexible new players from IT industry E/E architecture: From distributed electronic controllers to standardized threetier architecture IT architecture: From proprietary building blocks to open IT systems with offtheshelf components and adaptive SOA. Development lifecycle: From the classic V model with rather heavy release cycles to agile DevOpslike approach. Governance: From encapsulated safetycritical functions to interwoven quality assurance for liability, safety, cybersecurity, privacy. Culture: From R&D vs. IT separation to convergence. Competences: From automotive embedded electronics to IT as a core competence of all engineers. Source: IEEE Software May 2017 (Vector Guest Edited) Contact Vector for white papers, technical benchmarks and consulting 18/21

19 Conclusions and Outlook Agile in Practice Vector Forum 2019 The Agile Organization Adaptive, Distributed, Scaling Agile for Critical Systems 27. June 2019 in Stuttgart Practical experiences from global leaders, across industries Enhance your competences Grow your networks Details 19/21

20 Conclusions and Outlook More Information Bosch: Vector: 20/21

21 Thank you for your attention. For more information please contact us. Passion. Partner. Value. Vector Consulting Phone:

Functional Safety and Cyber-Security Experiences and Trends

Functional Safety and Cyber-Security Experiences and Trends Functional Safety and Cyber-Security Experiences and Trends Dr. Christof Ebert, Vector Consulting Services V1.0 2017-12-11 Welcome Vector Consulting Services Experts for product development, product strategy

More information

Functional Safety and Cyber Security Experiences and Trends

Functional Safety and Cyber Security Experiences and Trends Functional Safety and Cyber Security Experiences and Trends Vector China Congress, Shanghai, 7. Sep. 2017 Dr. Christof Ebert, Vector Consulting Services V1.0 2017-09-07 Welcome Vector Consulting Services

More information

MASP Chapter on Safety and Security

MASP Chapter on Safety and Security MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Version: V2.0. Integrated Building. Architecture. 19 April dimension data advanced infrastructure

Version: V2.0. Integrated Building. Architecture. 19 April dimension data advanced infrastructure Version: V2.0 Integrated Building 19 April 2013 Architecture dimension data advanced infrastructure Agenda Framework for Implementation Case Studies Copyright Dimension Data 19 April 2013 2 Question Given

More information

Certified Automotive Software Tester Sample Exam Paper Syllabus Version 2.0

Certified Automotive Software Tester Sample Exam Paper Syllabus Version 2.0 Surname, Name: Gender: male female Company address: Telephone: Fax: E-mail-address: Invoice address: Training provider: Trainer: Certified Automotive Software Tester Sample Exam Paper Syllabus Version

More information

End-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration

End-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration End-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration Dr. Andreas Hauser Director Digital Service, TÜV SÜD Tokyo, 21 February 2017 Corporate Profile Slide 2 Our heritage: 150

More information

Organizational Readiness for Digital Transformation

Organizational Readiness for Digital Transformation IVI Community Event Organizational Readiness for Digital Transformation Dr. Marian Carcary June 22nd 2017 Introduction Digital business transformation goes beyond traditional process optimization, to leveraging

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

CAPABILITY. Managed testing services. Strong test managers experienced in working with business and technology stakeholders

CAPABILITY. Managed testing services. Strong test managers experienced in working with business and technology stakeholders TESTING SERVICES 1 CAPABILITY Innovative use of open source tools helping early and frequent and reducing license costs Test strategy Managed services Test management Functional Strong test managers experienced

More information

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Making hybrid IT simple with Capgemini and Microsoft Azure Stack Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.

More information

Enhancing Security With SQL Server How to balance the risks and rewards of using big data

Enhancing Security With SQL Server How to balance the risks and rewards of using big data Enhancing Security With SQL Server 2016 How to balance the risks and rewards of using big data Data s security demands and business opportunities With big data comes both great reward and risk. Every company

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

A C H I E V E B O T H W I T H K E Y S I G H T. Company Profile

A C H I E V E B O T H W I T H K E Y S I G H T. Company Profile A C H I E V E B O T H W I T H K E Y S I G H T 1 W E H E L P Y O U C R E AT E. I N N O VAT E. A N D D E L I V E R W H AT S N E X T. The innovation leader in electronic design and test for over 75 years

More information

Software Verification and Validation (VIMMD052) Introduction. Istvan Majzik Budapest University of Technology and Economics

Software Verification and Validation (VIMMD052) Introduction. Istvan Majzik Budapest University of Technology and Economics Software Verification and Validation (VIMMD052) Introduction Istvan Majzik majzik@mit.bme.hu Budapest University of Technology and Economics Dept. of Measurement and Information s Budapest University of

More information

Secure Product Design Lifecycle for Connected Vehicles

Secure Product Design Lifecycle for Connected Vehicles Secure Product Design Lifecycle for Connected Vehicles Lisa Boran Vehicle Cybersecurity Manager, Ford Motor Company SAE J3061 Chair SAE/ISO Cybersecurity Engineering Chair AGENDA Cybersecurity Standards

More information

IFS. Company Presentation JONAS SKAGERHULT- BUSINESS SOLUTION ARCHITECT ANN-KRISTIN SANDER- ACCOUNT MANAGER 2011 IFS

IFS. Company Presentation JONAS SKAGERHULT- BUSINESS SOLUTION ARCHITECT ANN-KRISTIN SANDER- ACCOUNT MANAGER 2011 IFS IFS Company Presentation 2012-12-12 JONAS SKAGERHULT- BUSINESS SOLUTION ARCHITECT ANN-KRISTIN SANDER- ACCOUNT MANAGER 2011 IFS I SHALL NEVER DO ANTYHING STUPID IN LIFE. EVER. I SHALL NEVER DO ANTYHING

More information

NISTCSF Enterprise Training Solutions. By David Nichols & Rick Lemieux December 2018

NISTCSF Enterprise Training Solutions. By David Nichols & Rick Lemieux December 2018 DxCERTS NISTCSF Enterprise Training Solutions By David Nichols & Rick Lemieux December 2018 Copyright and Trademark Notice Copyright 2018 itsm Publishing. itsm Solutions is a Registered Trademark of itsm

More information

Cyber Security in Smart Commercial Buildings 2017 to 2021

Cyber Security in Smart Commercial Buildings 2017 to 2021 Smart Buildings Cyber Security in Smart Commercial Buildings 2017 to 2021 Published: Q2 2017 Cyber Security in Smart Buildings Synopsis 2017 This report will help all stakeholders and investors in the

More information

Cybersecurity and Commercial Aviation

Cybersecurity and Commercial Aviation Cybersecurity and Commercial Aviation Pascal ANDREI Chief Security Officer Airbus Group Jim Vasatka Director, Aviation Security Boeing Commercial Airplanes Agenda Aviation Cybersecurity External Drivers

More information

Certified Software Quality Engineer Preparation On Demand, Web-Based Course Offered by The Westfall Team

Certified Software Quality Engineer Preparation On Demand, Web-Based Course Offered by The Westfall Team Certified Software Quality Engineer (CSQE) Preparation course is an on demand, web-based course design to be a comprehensive, in-depth review of the topics in the ASQ s Certified Software Quality Engineer

More information

Cybersecurity. Securely enabling transformation and change

Cybersecurity. Securely enabling transformation and change Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why

More information

COBIT 5 Assessor Certification Course

COBIT 5 Assessor Certification Course COBIT 5 Assessor Certification Course About COBIT 5.0 Information is created, used, retained, disclosed and destroyed. Technology plays a key role in these actions and technology is becoming pervasive

More information

Country Focus: USA +2.2% $43 5.7% Trillion 21.7% of the total global GDP 1 Government Spending on Infrastructure. 80% of GDP. 3% of GDP.

Country Focus: USA +2.2% $43 5.7% Trillion 21.7% of the total global GDP 1 Government Spending on Infrastructure. 80% of GDP. 3% of GDP. North America Country Focus: USA Key facts GDP $19.5 +2.2% Trillion 21.7% of the total global GDP 1 Government Spending on Infrastructure 3% of GDP Annually TIC Services $43 Billion GDP Growth Services

More information

OVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE. Dr. Angelos Amditis Research Director, ICCS

OVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE. Dr. Angelos Amditis Research Director, ICCS OVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE Dr. Angelos Amditis Research Director, ICCS OUTLINE Introduction L3Pilot: Pilot Testing INFRAMIX: Hybrid Infrastructure SAFERtec:Cyber-security / Security

More information

THE POWER OF TECH-SAVVY BOARDS:

THE POWER OF TECH-SAVVY BOARDS: THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES

More information

Addressing Future Challenges in the Development of Safe and Secure Software Components The MathWorks, Inc. 1

Addressing Future Challenges in the Development of Safe and Secure Software Components The MathWorks, Inc. 1 Addressing Future Challenges in the Development of Safe and Secure Software Components 2016 The MathWorks, Inc. 1 Cybersecurity Emerging Topic in the Auto Industry Vehicle-to-Infrastructure Wifi Hotspot

More information

Secure Agile How to make secure applications using Agile Methods Thomas Stiehm, CTO

Secure Agile How to make secure applications using Agile Methods Thomas Stiehm, CTO Secure Agile How to make secure applications using Agile Methods Thomas Stiehm, CTO tom.stiehm@coveros.com 1 About Coveros Coveros helps organizations accelerate the delivery of business value through

More information

BUILDING GOOD-QUALITY FUNCTIONAL SPECIFICATION MODEL

BUILDING GOOD-QUALITY FUNCTIONAL SPECIFICATION MODEL BUILDING GOOD-QUALITY FUNCTIONAL SPECIFICATION MODEL A few words on Samares Engineering Research and Consultancy on Systems Engineering Requirement engineering Model-Based Systems Engineering Co-simulation

More information

EB, Elektrobit Corporation Interim Report 2Q CEO Jukka Harju August 8, 2012

EB, Elektrobit Corporation Interim Report 2Q CEO Jukka Harju August 8, 2012 EB, Elektrobit Corporation Interim Report 2Q 2012 CEO Jukka Harju August 8, 2012 Forward-looking Statements Some statements made in this material relating to future circumstances or status, including,

More information

ICT Mentors e-learning portfolio provides our delegates with materials for study at the comfort of their homes, work place etc.

ICT Mentors e-learning portfolio provides our delegates with materials for study at the comfort of their homes, work place etc. ICT Mentors e-learning portfolio provides our delegates with materials for study at the comfort of their homes, work place etc. We provide white labelled training packages and courses in: ITIL COBIT 5

More information

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee

More information

Everyday Security: Simple Solutions to Complex Security Problems

Everyday Security: Simple Solutions to Complex Security Problems Everyday Security: Simple Solutions to Complex Security Problems Adrian Aldea Tivoli Technical Sales IBM South East Europe The world continues to get flatter, smaller and more interconnected through forces

More information

Evolve Your Security Operations Strategy To Account For Cloud

Evolve Your Security Operations Strategy To Account For Cloud Evolve Your Security Operations Strategy To Account For Cloud GET STARTED The growth of cloud computing and proliferation of complex service delivery models continue to accelerate as companies recognize

More information

Automotive Functional Safety

Automotive Functional Safety Automotive Functional Safety Complexity, Confidence, Compliance, Certification Farmington, 2018-03-22 23.03.2018 150 years TÜV SÜD 150 years of inspiring trust Inspiring trust since 1866 The year 2016

More information

New Zealand Government IBM Infrastructure as a Service

New Zealand Government IBM Infrastructure as a Service New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand

More information

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions IDC FutureScape: Worldwide Security Products and Services 2017 Predictions Sean Pike, Program Vice President, Robert Ayoub, Research Director IDC Web Conference December, 7, 2016 Logistics Submit any questions

More information

Introducing Cyber Resiliency Concerns Into Engineering Education

Introducing Cyber Resiliency Concerns Into Engineering Education Introducing Cyber Resiliency Concerns Into Engineering Education Mr. Tom McDermott Georgia Tech Research Institute Mr. Barry Horowitz University of Virginia NDIA 20 th Annual Systems Engineering Conference

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

PA TechCon. Cyber Wargaming: You ve been breached: Now what? April 26, 2016

PA TechCon. Cyber Wargaming: You ve been breached: Now what? April 26, 2016 PA TechCon Cyber Wargaming: You ve been breached: Now what? April 26, 2016 Cyber attacks are on the rise $3.79M The average cost of a cyber incident [1] o f i n c i d e n t s 15% s t i l l t a k e d a

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

Smart Data Center Solutions

Smart Data Center Solutions Smart Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing,

More information

From Zero to Security Hero

From Zero to Security Hero From Zero to Security Hero Dr Carl Shaw IoTSF Security Conference December 2018 PUBLIC Making products that are secure by design Who am I? Some of our clients: Our recent project types Silicon devices

More information

Healthcare Security Success Story

Healthcare Security Success Story Regional Forum on Cybersecurity in the Era of Emerging Technologies & the Second Meeting of the Successful Administrative Practices -2017 Cairo, Egypt 28-29 November 2017 Healthcare Security Success Story

More information

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased

More information

Cybersecurity Engineering and Assurance for Connected and Automated Vehicles

Cybersecurity Engineering and Assurance for Connected and Automated Vehicles Cybersecurity Engineering and Assurance for Connected and Automated Vehicles Paul Wooderson Vehicle cybersecurity concerns Privacy vehicle as a data hub Theft physical cybersecurity Safety - impacts of

More information

Model-Based Systems Engineering Backbone of the Thales Engineering Manifesto

Model-Based Systems Engineering Backbone of the Thales Engineering Manifesto www.thalesgroup.com Model-Based Systems Engineering Backbone of the Thales Engineering Manifesto MBSE Symposium, Canberra Oct. 28 th, 2014 Olivier Flous, VP Engineering 2 / Thales: Company Profile Collective

More information

ISO/ IEC (ITSM) Certification Roadmap

ISO/ IEC (ITSM) Certification Roadmap ISO/ IEC 20000 (ITSM) Certification Roadmap Rasheed Adegoke June 2013 Outline About First Bank Motivations Definitions ITIL, ISO/IEC 20000 & DIFFERENCES ISO/ IEC 20000 Certification Roadmap First Bank

More information

Integrating Cyber Security and Safety Systems Engineering Disciplines with a common Code of Practice

Integrating Cyber Security and Safety Systems Engineering Disciplines with a common Code of Practice Integrating Cyber Security and Safety Systems Engineering Disciplines with a common Code of Practice Dr Richard Piggin 16 November 2017 - Atkins Limited 1 Introduction Background Motivation Safety Engineering

More information

Automated Continuous Verification & Validation for Automobile Software

Automated Continuous Verification & Validation for Automobile Software Speakers Information- Controls, Measurement & Calibration Congress ABSTRACT Automated Continuous Verification & Validation for Automobile Software Vinodhini Vijayaraghavan, Jagadeeswara Vijayaraghavan

More information

Max Security Solutions

Max Security Solutions Max Security Solutions Max Security Solutions Proactive Risk Management What we do Max Security provides comprehensive security and risk management solutions for the business sector, private clients and

More information

IOT FLAGSHIP PROJECT. Dr. Mario Drobics, AIT

IOT FLAGSHIP PROJECT. Dr. Mario Drobics, AIT IOT FLAGSHIP PROJECT Dr. Mario Drobics, AIT Challenge Digitalization over the entire product lifecycle accelerates the development, validation, instrumentation and deployment of complex industrial products

More information

Business resilience in the face of cyber risk. By Roger Ostvold and Brian Walker

Business resilience in the face of cyber risk. By Roger Ostvold and Brian Walker Business resilience in the face of cyber risk By Roger Ostvold and Brian Walker When it comes to experiencing failure of at least part of an enterprise s digital environment, it is a matter of when rather

More information

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.

More information

Management Direction Briefing October 29, 2015 Fujitsu Limited

Management Direction Briefing October 29, 2015 Fujitsu Limited Management Direction Briefing October 29, 2015 Fujitsu Limited Copyright 2015 FUJITSU LIMITED Market Trend: Accelerating Digitalization Expectations for the delivery of higher-value ICT services Manufacturing

More information

WE IMPROVE THE WORLD THROUGH ENGINEERING!

WE IMPROVE THE WORLD THROUGH ENGINEERING! WE IMPROVE THE WORLD THROUGH ENGINEERING! MARCH 2018 Assystem Technologies worldwide At a glance. 700m TURNOVER IN 2017 PORTFOLIO: Product Engineering Consulting In Service Offerings >9.000 EMPLOYEES OUR

More information

Serviceable Luminaires in a Circular Economy - White Paper -

Serviceable Luminaires in a Circular Economy - White Paper - Serviceable Luminaires in a Circular Economy - White Paper - LIGHTINGEUROPE 1. Introduction scope and objective of this White Paper LightingEurope members have a long experience in dealing with aspects

More information

Management Direction. FY2017 Progress Review. June 6, Copyright 2017 FUJITSU LIMITED

Management Direction. FY2017 Progress Review. June 6, Copyright 2017 FUJITSU LIMITED Management Direction FY2017 Progress Review June 6, 2017 FY 2015-2016 Financial Results and FY 2017 Plan Operating profit margin Free cash flow 2.5% 2.9% 4.5% Target 10% or more (Billion JPY) 88.7 104.8

More information

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,

More information

INTEGRATING AUTOMOTIVE HAZARD AND THREAT ANALYSIS METHODS: HOW DOES THIS FIT WITH ASSUMPTIONS OF THE SAE J3061

INTEGRATING AUTOMOTIVE HAZARD AND THREAT ANALYSIS METHODS: HOW DOES THIS FIT WITH ASSUMPTIONS OF THE SAE J3061 INTEGRATING AUTOMOTIVE HAZARD AND THREAT ANALYSIS METHODS: HOW DOES THIS FIT WITH ASSUMPTIONS OF THE SAE J3061 23rd EuroAsiaSPI Conference, Graz, Austria Georg Macher AVL List GmbH (Headquarters) INTEGRATING

More information

Riccardo Mariani, Intel Fellow, IOTG SEG, Chief Functional Safety Technologist

Riccardo Mariani, Intel Fellow, IOTG SEG, Chief Functional Safety Technologist Riccardo Mariani, Intel Fellow, IOTG SEG, Chief Functional Safety Technologist Internet of Things Group 2 Internet of Things Group 3 Autonomous systems: computing platform Intelligent eyes Vision. Intelligent

More information

LPWA NETWORKS FOR IoT: WORLDWIDE TRENDS AND FORECASTS

LPWA NETWORKS FOR IoT: WORLDWIDE TRENDS AND FORECASTS RESEARCH FORECAST REPORT LPWA NETWORKS FOR IoT: WORLDWIDE TRENDS AND FORECASTS 2015 2025 MICHELE MACKENZIE Analysys Mason Limited 2016 analysysmason.com About this report Low-power, wide-area (LPWA) is

More information

Innovation policy for Industry 4.0

Innovation policy for Industry 4.0 Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda

More information

Christoph Schmittner, Zhendong Ma, Paul Smith

Christoph Schmittner, Zhendong Ma, Paul Smith FMVEA for Safety and Security Analysis of Intelligent and Cooperative Vehicles 1st International workshop on the Integration of Safety and Security Engineering (ISSE 14) Christoph Schmittner, Zhendong

More information

Lifecycle Management (LCM)

Lifecycle Management (LCM) Lifecycle Management (LCM) Presented by: John Sorensen Dave Trice PRESENTATION TITLE 2017 MHI Copyright claimed for audiovisual works and sound recordings of seminar sessions. All rights reserved. What

More information

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b) AGENDA ADDENDU TE REGULAR EETING OF TE AUDIT COITTEE COITTEE PUBLIC SESSION Tuesday, June 6, 2017 6:30 P.. Pages 13. Staff Reports 13.f Toronto Catholic District School Board's IT Strategic Review - Draft

More information

An Integrated Framework for Multi-layer Certification-based Assurance

An Integrated Framework for Multi-layer Certification-based Assurance 1 An Integrated Framework for Multi-layer Certification-based Assurance ACSAC 2014 - Layered Assurance Workshop New Orleans, Louisiana, USA. December 2014 Authors: Rajesh Harjani, Marcos Arjona, Javier

More information

Interim Report Q2/2016 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR

Interim Report Q2/2016 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR Interim Report Q2/216 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR AGENDA New CEO Highlights from Q2 Market update Business update Outlook Financials 2 SAMU KONTTINEN

More information

Establishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security

Establishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security Establishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security Michael John SmartSec 2016, Amsterdam www.encs.eu European Network for Cyber Security The European

More information

Designing and Building a Cybersecurity Program

Designing and Building a Cybersecurity Program Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (CSF) Larry Wilson lwilson@umassp.edu ISACA Breakfast Meeting January, 2016 Designing & Building a Cybersecurity

More information

Security analysis and assessment of threats in European signalling systems?

Security analysis and assessment of threats in European signalling systems? Security analysis and assessment of threats in European signalling systems? New Challenges in Railway Operations Dr. Thomas Störtkuhl, Dr. Kai Wollenweber TÜV SÜD Rail Copenhagen, 20 November 2014 Slide

More information

Click ISO to edit Master title style Update on development of the standard

Click ISO to edit Master title style Update on development of the standard Click ISO 26262 to edit Master title style Update on development of the standard Dr David Ward Head of Functional Safety January 2016 Agenda Why update ISO 26262? What is the process for updating the standard?

More information

WELCOME ISO/IEC 27001:2017 Information Briefing

WELCOME ISO/IEC 27001:2017 Information Briefing WELCOME ISO/IEC 27001:2017 Information Briefing Denis Ryan C.I.S.S.P NSAI Lead Auditor Running Order 1. Market survey 2. Why ISO 27001 3. Requirements of ISO 27001 4. Annex A 5. Registration process 6.

More information

SECURITY CODE. Responsible Care. American Chemistry Council. 7 April 2011

SECURITY CODE. Responsible Care. American Chemistry Council. 7 April 2011 American Chemistry Council Responsible Care SECURITY CODE 7 April 2011 Debra Phillips Managing Director, Responsible Care American Chemistry Council Why develop a Separate Security Code? Need for a clearly

More information

Cloud & CyberSecurity Services

Cloud & CyberSecurity Services Cloud & CyberSecurity Services Franck Greverie Cloud & CyberSecurity, Group Leader, EVP Sept 12th Cloud & CyberSecurity services A huge business opportunity for Capgemini Key enablers for the digital enterprise

More information

STRATEGIC PLAN

STRATEGIC PLAN STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology

More information

Institute of Internal Auditors 2018 IIA CHICAGO CHAPTER JOIN NTAC:4UC-11

Institute of Internal Auditors 2018 IIA CHICAGO CHAPTER JOIN NTAC:4UC-11 AUDITING ROBOTICS AND THE INTERNET OF THINGS (IOT) APRIL 9, 2018 PRESENTERS Kara Nagel Manager, Information Security Accenture Ryan Hopkins Assistant Director, Internal Audit Services Packaging Corp. of

More information

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and

More information

City as a Platform: From Vision to Reality

City as a Platform: From Vision to Reality 1 City as a Platform: From Vision to Reality Nik Willetts CEO, TM Forum 2017 TM Forum 1 2 Cities as Collections of Ecosystems 2017 TM Forum 2 3 2017 TM Forum 3 Maslow s Hierarchy of Needs Self actualization:

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

Medical Device Safety in a Connected World

Medical Device Safety in a Connected World Mr. Clark Fortney Senior Software Engineer Medical Device Safety in a Connected World IoT Expo June 6-8 2017 1 Clark Fortney My Background 20 years designing systems & software for medical devices at Battelle.

More information

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016 Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the

More information

Building resilience. Delivering assurance.

Building resilience. Delivering assurance. Building resilience. Delivering assurance. Strengthening and improving the way organisations operate, creating robust and resilient cultures. 01 02 RiskLogic Building resilience. Delivering assurance.

More information

AVS: A Test Suite for Automatically Generated Code

AVS: A Test Suite for Automatically Generated Code AVS: A Test Suite for Automatically Generated Code Ekkehard Pofahl Ford Motor Company Torsten Sauer Continental Automotive Systems Oliver Busa TUV Rheinland Industrie Service GmbH Page 1 of 22 AVS: Automotive

More information

DEPARTMENT OF HEALTH and HUMAN SERVICES. HANDBOOK for

DEPARTMENT OF HEALTH and HUMAN SERVICES. HANDBOOK for DEPARTMENT OF HEALTH and HUMAN SERVICES HANDBOOK for FEDERAL ACQUISITION CERTIFICATION PROGRAM/PROJECT MANAGERS Issuer Office of the Secretary Office of the Assistant Secretary for Financial Resources

More information

Cyber Risk and Networked Medical Devices

Cyber Risk and Networked Medical Devices Cyber Risk and Networked Medical Devices Hot Topics Deloitte & Touche LLP February 2016 Copyright Scottsdale Institute 2016. All Rights Reserved. No part of this document may be reproduced or shared with

More information

Oracle Buys Automated Applications Controls Leader LogicalApps

Oracle Buys Automated Applications Controls Leader LogicalApps Oracle Buys Automated Applications Controls Leader LogicalApps To strengthen Oracle s Governance, Risk and Compliance Suite with Real-time Policy Enforcement October 26, 2007 Disclaimer The following is

More information

Securing a Dynamic Infrastructure. IT Virtualization new challenges

Securing a Dynamic Infrastructure. IT Virtualization new challenges Christian Fahlke GMT Channel Leader Internet Security Systems IBM Central & Eastern Europe, Middle East and Africa (CEEMEA) May 20th, 2009 Securing a Dynamic Infrastructure IT Virtualization new challenges

More information

Automotive Security An Overview of Standardization in AUTOSAR

Automotive Security An Overview of Standardization in AUTOSAR Automotive Security An Overview of Standardization in AUTOSAR Dr. Marcel Wille 31. VDI/VW-Gemeinschaftstagung Automotive Security 21. Oktober 2015, Wolfsburg Hackers take over steering from smart car driver

More information

Deriving safety requirements according to ISO for complex systems: How to avoid getting lost?

Deriving safety requirements according to ISO for complex systems: How to avoid getting lost? Deriving safety requirements according to ISO 26262 for complex systems: How to avoid getting lost? Thomas Frese, Ford-Werke GmbH, Köln; Denis Hatebur, ITESYS GmbH, Dortmund; Hans-Jörg Aryus, SystemA GmbH,

More information

Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation

Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation Think Cloud Compliance Case Study Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation Customer details : Collector Bank - Sweden 329 employees www.collector.se/en Banking

More information

How to be cyber secure A practical guide for Australia s mid-size business

How to be cyber secure A practical guide for Australia s mid-size business How to be cyber secure A practical guide for Australia s mid-size business Introduction The digital age has bred opportunity for mid-size business. From ecommerce to social media, agile organisations have

More information

A Framework for Managing Crime and Fraud

A Framework for Managing Crime and Fraud A Framework for Managing Crime and Fraud ASIS International Asia Pacific Security Forum & Exhibition Macau, December 4, 2013 Torsten Wolf, CPP Head of Group Security Operations Agenda Introduction Economic

More information

Martijn Loderus. Merritt Maxim. Principal Analyst Forrester. Director & Global Practice Partner for Advisory Consulting Janrain

Martijn Loderus. Merritt Maxim. Principal Analyst Forrester. Director & Global Practice Partner for Advisory Consulting Janrain Merritt Maxim Principal Analyst Forrester Martijn Loderus Director & Global Practice Partner for Advisory Consulting Janrain Merritt and Martijn will share insights on Digital Transformation & Drivers

More information

FDA & Medical Device Cybersecurity

FDA & Medical Device Cybersecurity FDA & Medical Device Cybersecurity Closing Keynote, February 19, 2017 Suzanne B. Schwartz, M.D., MBA Associate Director for Science & Strategic Partnerships Center for Devices and Radiological Health US

More information

RiskSense Attack Surface Validation for IoT Systems

RiskSense Attack Surface Validation for IoT Systems RiskSense Attack Surface Validation for IoT Systems 2018 RiskSense, Inc. Surfacing Double Exposure Risks Changing Times and Assessment Focus Our view of security assessments has changed. There is diminishing

More information

Vulnerability Assessments and Penetration Testing

Vulnerability Assessments and Penetration Testing CYBERSECURITY Vulnerability Assessments and Penetration Testing A guide to understanding vulnerability assessments and penetration tests. OVERVIEW When organizations begin developing a strategy to analyze

More information

IEEE-SA Internet of Things - Security & Standards

IEEE-SA Internet of Things - Security & Standards IEEE-SA Internet of Things - Security & Standards Srikanth Chandrasekaran IEEE Standards Association MOBILE WORLD CONGRESS, SHANGHAI JUNE 2018 What does the IEEE Standards Association (IEEE-SA) do? Vision:

More information

Convergence of Safety, Systems & Cybersecurity Bill StClair, Director, LDRA, US Operations

Convergence of Safety, Systems & Cybersecurity Bill StClair, Director, LDRA, US Operations Convergence of Safety, Systems & Cybersecurity Bill StClair, Director, LDRA, US Operations Agenda Nexus of Safety and Cybersecurity Separation and Connectivity Trends in Aerospace Cybersecurity Isn t Security

More information

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions Meeting PCI DSS 3.2 Compliance with Solutions Platform the industry s most comprehensive, intelligent platform for managing cyber risk. 2018, Inc. What s Changing with PCI DSS? Summary of PCI Business

More information