Triconex Safety System Platforms

Size: px
Start display at page:

Download "Triconex Safety System Platforms"

Transcription

1

2 Triconex Safety System Platforms Presented to OpsManage 13 ANZ User Conference Presented by Al Fung May 6, Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks of Invensys or its subsidiaries. All third party trademarks and service marks are the proprietary marks of their respective owners. Slide 2 Invensys 00/00/00 Invensys proprietary & confidential

3 PEOPLE PROCESS Certified People: +650 Safety Engineers +270 Certified Functional Safety Engineers +15 Certified Functional Safety Experts Certified Products: IEC61508:2010 Tricon SIS Trident SIS Tri-GP SIS Tristation software SafetyView software 30 years of Safety Certified Procedures: IEC61511 certified Certified Delivery centres: UK Singapore India Egypt Etc... Service & Support: Global Customer Support Customer First program Global support, delivered locally Safety Lifecycle Services Service Level Agreements TECHNOLOGY SUPPORT Continuously Safe, Reliable Production Think Safe Available Secure

4 1 Product Updates and Roadmap Security Overview and Roadmap Alarm and Bypass Management for Safety Systems Slide 4

5 Continuously Safe, Reliable Production pplications Process Safety Management APerformance visibility, reporting, KPIs and decision support Software Unified Control and Safety Configuration Tools Simplify configuration, maintenance and change management Controller Common Enhanced Main Processors Superior performance and on-line functionality Device & Sys Int. I/O subsystem. Triconex on the Control Network Simplify network implementation, reduce infrastructure costs Harmonize I/O & Reduced Footprint Optimize Total Cost of Ownership Think Safe Available Secure Invensys Proprietary & Confidential

6 Continuously Safe, Reliable Production pplications Continuously Safe, Reliable Production A Lower o e safety incident probability. Software Fewer personnel needed to engineer and maintain SIS operation. Controller Extend SIS lifecycle. Increase plant duty cycles for greater continuous operation and production Device & Sys Int. Faster SIS start-up schedules. Lower network infrastructure & maintenance costs. Faster post Trip Analysis I/O subsystem. Lower Total Cost of Ownership. Think Safe Available Secure Invensys Proprietary & Confidential

7 Trident / Tri-GP v3.0 Release Application New Communications Integration Module (CIM) Adds OPC-UA (Unified Architecture) communications Features Enhanced security features e.g. digital signature and authentication Improved performance of safety peer to peer communications Auto discovery on Enhanced Diagnostic Monitor application Benefits Freedom of choice - Open connectivity Safe and Secure Defense in depth Broad industry support Flexible integration with other systems Think Safe Available Secure Invensys Proprietary & Confidential

8 Trident / Tri-GP v3.0 New Communications Integration Module Media support for both Copper and Fiber Optic New Peer to Peer functionality Enhanced encryption algorithms New function blocks Supports both existing (for tie into existing systems) and new function blocks Performance improvements Certified by TUV for SIL3 applications Embedded OPC-UA functionality Embedded OPC-UA Server Supports up to 10 concurrent OPC UA clients Slide 8 Invensys Proprietary & Confidential

9 Trident / Tri-GP v3.0 Tristation V4.10 Support for Trident / Tri-GP 3.0 controllers and Communications Module Secure communication with Trident / Tri-GP 3.0 through windows security certificates New function blocks for alarms (safety view) and peer to peer 2 new I/O reports :- I/O utilization, Disabled points Verify download operation via comparison of control program elements in the Triconex controller with those in Tristation 1131 project Enhanced Diagnostic Monitor V2.7 Support for Trident / Tri-GP 3.0 systems Secure communication with Trident / Tri-GP 3.0 through windows security certificates Automatic discovery of Trident / Tri-GP 3.0 controllers (with CIM installed) on the network, eliminating the need to manually configure the network connection to the controllers. Slide 9 Invensys Proprietary & Confidential

10 Trident / Tri-GP Wireless Peer to Peer Application Wireless media for peer to peer communications between Trident / Tri-GP systems (e.g. Well head, Tank Farm) Features COTS equipment, dual frequency radio (2.4 GHz, 5.8 GHz) Wireless MESH configuration for resilience Equivalent performance to wired solutions Secured wireless network (proprietary wireless frame) Benefits Estimated 50-70% less cost than wired solution Flexible and easily adapted to future needs Easy to deploy and manage Safety for stranded assets Think Safe Available Secure Invensys Proprietary & Confidential

11 Wireless Peer to Peer Tools for Wireless Configuration Virtual Switch (wireless mesh) Invensys Proprietary & Confidential

12 Triconex I/A Series Integration Application Triconex I/A Series Hardware Integration Features Direct integration of Triconex onto control network Triconex appears as a control station Exchange Interlock data with control stations Maintain Separation Benefits Lower Total Cost of Ownership Reduced physical space Faster installation & commissioning Tricon Trident Tri-GP Integrated and Separate you can have both! Think Safe Available Secure Invensys Proprietary & Confidential

13 Integrated Control & Safety Operator Workstations Engineering / Maintenance Workstation Real Time Data Historian Alarms / SOE Engineering Galaxy Repository Control Network Dedicated Safety Peer to Peer Process Controllers Safety Controllers Slide 13 Invensys Proprietary & Confidential

14 Virtualization Application Safety system software run in a virtual environment Safety visualization on Thin Clients Features Consistent and compatible with I/A Series DCS Qualified & operational on standard hardware Benefits Less cost, space, energy consumption Reduction in workstation maintenance activities Support multiple Triconex software versions from a single server Simplify software configurations Think Safe Available Secure Invensys Proprietary & Confidential

15 Virtualization Triconex Software & OS Tristation TS1131 v4.10 (or later) Enhanced Diagnostic Monitor v4.7 (or later) Excluded: TriLogger and SOE Windows 7 and Windows Server 2008 r2 Thin Client Support Remote Desktop Protocol (RDP) HP Thin Client Stations Specification to qualify other TC Hardware Architecture Guidelines Sizing Guidelines Performance Recommendations Virtualization Server HP DL380 Rack Mount Server Thin Client HP t610 Flexible Thin Client Slide 15 Invensys Proprietary & Confidential

16 2 Product Updates and Roadmap Security Overview and Roadmap Alarm and Bypass Management for Safety Systems Slide 16

17 Slide 17

18 Industry & Technology Trends Defense e Economic Liberalization Industrialization in Asia and Middle East Trend towards open communication Rise of networked solutions Corporate, IT, Automation Confusion between IT and Automation departments Continuous push to lower cost Human Element in Security Breach Certification becoming mandatory E.g. Achilles Level I and II, WIB, ISA Secure Speed of Change at IT level = Fast, at Automation level = Slow Standards continue to evolve E.g. ISA 99, NERC, ISA Secure Thr reat Cyber Attacks cost business an average of $2 Million per year Attacks are more hostile, frequent, and impact is greater Threats are more complex E.g. latest malware penetrated Firewalls Malicious Attacks increased by 81% in 2011 Slide 18

19 Where is Triconex today? Achilles Certification Secure Access Model Tofino Firewall Enhanced Security Slide 19

20 Security Application Continuous security hardening for Safety System and engineering workstation Features Consistent with standard practice for I/A Series DCS Operating System Patch and Anti Virus validation White listing TriStation engineering g workstation Benefits Continuous security updates mitigate external security threats to safety system assets Slide 20

21 Triconex Software Security Patch Management Scope Software: TriStation 1131 and Enhanced Diagnostic Monitor Versions Tested: current plus (2) prior Windows 7 Operating System Security Patch updates Anti Virus.dat virus signature file updates Process Monthly test of Triconex software against standard test procedure on standard PC (I/A Series workstation) ti Publish appropriate Sales Alert and Customer Notifications

22 Cyber Security Roadmap Product Secure tional Security Assessment Funct Ac chilles Test Kit.dat TEST TCX Achilles II Compliance TCX& IA ISA Secure TCX ISA Secure IA TCX OS & AV patch = IA Anti Virus on IA / TCX.dat TEST Strategic TCX ISA Secure SCADA ISA Secure PAC ISA Secure SYSTEM Secure e Service Secure Delivery ity Assessment TriStation 1131 White Listing Secure Tricon TCM ewib Compliance Functional Secur Global Windows Server Update Service Best Practices & Procedures Hardening TriStation 1131 & Enhanced Diagnostic Monitor International Docs ISO LEGEND: BLUE under development; YELLOW planned Continuous Validation Invensys Proprietary & Confidential

23 3 Product Updates and Roadmap Security Overview and Roadmap Alarm and Bypass Management for Safety Systems Slide 23

24 Refinery Safety BP Refinery, Texas City 2005 refinery explosion 15 killed, 180 injured, $21 million fines, $1.5 billion loss Two of the four key hazard contributors: Failed management of instrumentation and alarm systems Allowing of non essential personnel in high risk areas Slide 24 Invensys Proprietary

25 Refinery Safety After BP Texas City Chemical Safety Board recommends Safety Metrics Results of survey, 51 of 159 U.S. refineries 90% at least one of the key contributor 43% had 3 of the key hazard contributor Slide 25 Invensys Proprietary

26 Current Issues with Safety Management in a Plant How safe is my plant running or operating? Is it safe at this point in time? Are there leading and lagging safety metrics? Safety impact of a device alert/failure/bypass What is the impact of a device alert/failure on a SIF? Are SIF assumptions valid? E.g. Proof testing is performed as per SIF design? Slide 26 Invensys Proprietary

27 Safety View Online tool to help clients run their plant safely: Operator tool for Priority Level 1 alarms Maintenance tool for bypass management Manage Operational Risk with Confidence Provides: Situational awareness and visibility of the risks being managed Contextual information to facilitate decision support Slide 27

28 Certification World s First TÜV Certified software based Alarm & Bypass HMI system: TÜV Certifiedto to IEC61508:2010 For use in applications up to SIL3 Systematic Capability Level 3 (SC3) Note: Systematic capability is the measure (expressed on a scale of 1 (low) to 4 (high)) of the confidence that equipment will not fail due to relevant systematic failure mechanisms when the equipment tis applied in accordance with the instructions specified in its safety manual. Slide 28

29 Priority 1 Alarms ISA 18.1 Annunciator Sequence and Specifications: Sequence Code M: Manual Reset Sequence Code A: Automatic Reset Sequence Code R: Ring Back Safety View allows you to: Acknowledge individual / group alarms Re activate alarms acknowledged by an operator during previous shift Clear first out alarms Silence Audible alarms Reset alarms in ring back state Slide 29

30 Features Independent from DCS Supports Redundancy for increased availability Records all operator actions Provides audit trail Configurable displays Grouped by Lines Of Equipment Detailed description for each alarm for greater context and understanding Effective Operator Response Slide 30

31 Bypass Bypass safety critical devices for: Maintenance Calibration During start up, shutdown etc. Clear indication of devices in Bypass Records all operator actions Provides audit trail Slide 31

32 Benefits Maximize Return on Assets: Lower equipment costs Lower installation costs Minimize footprint, power consumption, HVAC etc. Increase Overall Equipment Efficiency ReduceUnscheduled Downtime: Minimize production downtime due to operator error Provide contextual information Increase visibility of risks Reduce Maintenance Costs: Rd Reduce spares holding No LED / Lamp replacement No servicing required Slide 32

33 Safety View - Today Alarm zone, displays all configured alarms Bypass zone, displays all active bypasses Control zone, Information provides zone, displays controls for information acknowledging g about selected and bypassing alarm alarms Provides audit trail for operator actions Invensys Proprietary & Confidential Slide 33 Invensys Proprietary

34 Safety View Application Alarm and Bypass Management in compliance with ISA Annunciator Sequences and Specifications Standard Features Dedicated Operator view of Priority Level 1 (P1) alarms Maintenance tool for bypass management Provides audit trail of operator actions Easy to configure - Dedicated alarm function blocks available in TS1131 library for Tricon, Trident, Tri-GP Benefits IEC61508:2010TUV approved to SC3 Minimize production downtime due to operator error Easy for clients to standardize Manage operational risk with confidence Think Safe Available Secure Invensys Proprietary & Confidential

35 Operational Integrity (Process Safety Management) Functional Safety Process Safety Occupational Safety DCS Operations Trips, slips, falls Safety Systems Maintenance Working at heights Alarms Procedures Handling materials Performance and Reporting Slide 35

36

Industrial Security - Protecting productivity. Industrial Security in Pharmaanlagen

Industrial Security - Protecting productivity. Industrial Security in Pharmaanlagen - Protecting productivity Industrial Security in Pharmaanlagen siemens.com/industrialsecurity Security Trends Globally we are seeing more network connections than ever before Trends Impacting Security

More information

Foxboro DCS beyond 2013

Foxboro DCS beyond 2013 Foxboro DCS beyond 2013 Future Directions I/A Series DCS Roadmap Grant Le Sueur, Portfolio Director April 2013 2010 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products

More information

Cyber Security for Process Control Systems ABB's view

Cyber Security for Process Control Systems ABB's view Kaspersky ICS Cybersecurity 2017, 2017-09-28 Cyber Security for Process Control Systems ABB's view Tomas Lindström, Cyber Security Manager, ABB Control Technologies Agenda Cyber security for process control

More information

Summary. Business Value

Summary. Business Value Summary Feedwater control systems Tricon Triple Modular Redundant (TMR) Digital System for Feedwater Control and Safety Application in Nuclear Power Plants are critical to the safe and efficient operation

More information

Presenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks.

Presenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks. Presenter Jakob Drescher Industry Cyber Security 1 Cyber Security? Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks. Malware or network traffic

More information

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services Mark Littlejohn June 23, 2016 DON T GO IT ALONE Achieving Cyber Security using Managed Services Speaker: Mark Littlejohn 1 Mark is an industrial technology professional with over 30 years of experience

More information

Functional. Safety and. Cyber Security. Pete Brown Safety & Security Officer PI-UK

Functional. Safety and. Cyber Security. Pete Brown Safety & Security Officer PI-UK Functional Safety and Cyber Security Pete Brown Safety & Security Officer PI-UK Setting the Scene 2 Functional Safety requires Security Consider just Cyber Security for FS Therefore Industrial Control

More information

Wireless Field Data Backhaul

Wireless Field Data Backhaul Service Data Sheet Wireless Field Data Backhaul Scalable Reduced cost Safer deployment Secure and reliable communications Full support service An Emerson Smart Wireless Field Data Backhaul Solution integrates

More information

Removal of Hardware ESD, Independent of Safety Logic Solver

Removal of Hardware ESD, Independent of Safety Logic Solver Removal of Hardware ESD, Independent of Safety Logic Solver by Sam Roy Executive summary This is a discussion to remove independent hardware based Emergency Shutdown for Logic Solver as identified in ANSI/ISA-84.00.01-2004,

More information

Ensuring Your Plant is Secure Tim Johnson, Cyber Security Consultant

Ensuring Your Plant is Secure Tim Johnson, Cyber Security Consultant Ensuring Your Plant is Secure Tim Johnson, Cyber Security Consultant 1 The Foxboro Evo TM Process Automation System Addressing the needs across your operation today and tomorrow. 2 Industrial Control Systems

More information

Maarten Oosterink for PPA 2010 Delft, Vendor Requirements. Process Control Domain - Security Requirements for Vendors

Maarten Oosterink for PPA 2010 Delft, Vendor Requirements. Process Control Domain - Security Requirements for Vendors Maarten Oosterink for PPA 2010 Delft, 11-03-2010 Vendor Requirements Process Control Domain - Security Requirements for Vendors Contents Purpose, Scope and Audience Development process Contents of WIB

More information

Industrial Network Trends & Technologies

Industrial Network Trends & Technologies Industrial Network Trends & Technologies EtherNet/IP on the Plant Floor PUBLIC INFORMATION 5058-CO900F IHS Technology Industrial Internet of Things 2014, April 2014 PUBLIC INFORMATION Forecasts tremendous

More information

Practical SCADA Cyber Security Lifecycle Steps

Practical SCADA Cyber Security Lifecycle Steps Practical SCADA Cyber Security Lifecycle Steps Standards Certification Jim McGlone CMO, Kenexis Education & Training Publishing Conferences & Exhibits Bio Jim McGlone, CMO, Kenexis GICSP ISA Safety & Security

More information

DeltaV Remote Client. Introduction. Remote engineering and operator consoles. View Multiple DeltaV Systems from a single workstation

DeltaV Remote Client. Introduction. Remote engineering and operator consoles. View Multiple DeltaV Systems from a single workstation DeltaV Distributed Control System Product Data Sheet December 2017 DeltaV Remote Client Remote Client Remote Client Firewall Emerson Smart Firewall L2.5 Network Remote Desktop Server (Professional Plus

More information

An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist

An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist Standards Certification Education & Training Publishing Conferences & Exhibits Speakers: Bryan L. Singer, CISM, CISSP, CAP

More information

White Paper. The Tricon Turbine Control System

White Paper. The Tricon Turbine Control System White Paper The Tricon Turbine Control System Author: Naresh Desai, Sr. Technical Consultant, Invensys What s Inside: 1. Abstract 2. Introduction 3. Major Requirements 4. Tricon Architecture 5. Critical

More information

Security analysis and assessment of threats in European signalling systems?

Security analysis and assessment of threats in European signalling systems? Security analysis and assessment of threats in European signalling systems? New Challenges in Railway Operations Dr. Thomas Störtkuhl, Dr. Kai Wollenweber TÜV SÜD Rail Copenhagen, 20 November 2014 Slide

More information

ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT

ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT ENERGY AUTOMATION - SMART GRID Restricted Siemens AG 20XX All rights reserved. siemens.com/answers Frederic Buchi, Energy Management Division, Siemens AG Cyber

More information

Industrial Defender ASM. for Automation Systems Management

Industrial Defender ASM. for Automation Systems Management Industrial Defender ASM for Automation Systems Management INDUSTRIAL DEFENDER ASM FOR AUTOMATION SYSTEMS MANAGEMENT Industrial Defender ASM is a management platform designed to address the overlapping

More information

GDPR Update and ENISA guidelines

GDPR Update and ENISA guidelines GDPR Update and ENISA guidelines 2016 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how to ensure

More information

ISA99 - Industrial Automation and Controls Systems Security

ISA99 - Industrial Automation and Controls Systems Security ISA99 - Industrial Automation and Controls Systems Security Committee Summary and Activity Update Standards Certification Education & Training Publishing Conferences & Exhibits September 2016 Copyright

More information

DeltaV SIS Standalone

DeltaV SIS Standalone DeltaV SIS Process Safety System White Paper January 2018 DeltaV SIS Standalone This whitepaper provides an overview of Emerson s DeltaV TM SIS standalone solution. To 3rd Party BPCS DeltaV SIS Standalone

More information

LESSONS LEARNED IN SMART GRID CYBER SECURITY

LESSONS LEARNED IN SMART GRID CYBER SECURITY LESSONS LEARNED IN SMART GRID CYBER SECURITY Lynda McGhie CISSP, CISM, CGEIT Quanta Technology Executive Advisor Smart Grid Cyber Security and Critical Infrastructure Protection lmcghie@quanta-technology.com

More information

ARC VIEW. Honeywell s New PLC Brings Digital Transformation to the ControlEdge. Keywords. Summary. The Edge and IIoT.

ARC VIEW. Honeywell s New PLC Brings Digital Transformation to the ControlEdge. Keywords. Summary. The Edge and IIoT. ARC VIEW AUGUST 3, 2017 Honeywell s New PLC Brings Digital Transformation to the ControlEdge By Craig Resnick Keywords IIoT, PLC, DCS, Digital Transformation, Mobility, OPC UA, Cybersecurity Summary IIoT

More information

K12 Cybersecurity Roadmap

K12 Cybersecurity Roadmap K12 Cybersecurity Roadmap Introduction Jason Brown, CISSP Chief Information Security Officer Merit Network, Inc jbrown@merit.edu @jasonbrown17 https://linkedin.com/in/jasonbrown17 2 Agenda 3 Why Use the

More information

Cyber Security Solutions Mitigating risk and enhancing plant reliability

Cyber Security Solutions Mitigating risk and enhancing plant reliability P OW E R G E N E R AT I O N Cyber Security Solutions Mitigating risk and enhancing plant reliability 2 CYBER SECURITY SOLUTIONS MITIGATING RISK AND ENHANCING PLANT RELIABILITY Providing a roadmap to achieve

More information

Internet of Things. The Digital Oilfield: Security in SCADA and Process Control. Mahyar Khosravi

Internet of Things. The Digital Oilfield: Security in SCADA and Process Control. Mahyar Khosravi Internet of Things The Digital Oilfield: Security in SCADA and Process Control Mahyar Khosravi makhosra@cisco.com Critical infrastructures worldwide not ready to battle cyber attacks, claims new study.

More information

Safety Instrumented Systems: Can They Be Integrated But Separate?

Safety Instrumented Systems: Can They Be Integrated But Separate? Safety Instrumented Systems: Can They Be Integrated But Separate? Written by Merry Kuchle and Trevor MacDougall of Spartan Controls. For questions, please contact Robert Smith. Keywords Safety Instrumented

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

DeltaV Remote Client. Introduction. Remote engineering and operator consoles. View Multiple DeltaV Systems from a single workstation

DeltaV Remote Client. Introduction. Remote engineering and operator consoles. View Multiple DeltaV Systems from a single workstation DeltaV Distributed Control System Product Data Sheet July 2018 DeltaV Remote Client Remote Client Remote Client Firewall Emerson Smart Firewall L2.5 Network Remote Desktop Server (Professional Plus or

More information

ARC VIEW. Leveraging New Automation Approaches Across the Plant Lifecycle. Keywords. Summary. By Larry O Brien

ARC VIEW. Leveraging New Automation Approaches Across the Plant Lifecycle. Keywords. Summary. By Larry O Brien ARC VIEW JUNE 22, 2017 Leveraging New Automation Approaches Across the Plant Lifecycle By Larry O Brien Keywords Operational Excellence, Cloud, Virtualization, Operations Management, Field Commissioning,

More information

Digital Wind Cyber Security from GE Renewable Energy

Digital Wind Cyber Security from GE Renewable Energy Digital Wind Cyber Security from GE Renewable Energy BUSINESS CHALLENGES The impact of a cyber attack to power generation operations has the potential to be catastrophic to the renewables industry as well

More information

RIPE RIPE-17. Table of Contents. The Langner Group. Washington Hamburg Munich

RIPE RIPE-17. Table of Contents. The Langner Group. Washington Hamburg Munich RIPE RIPE-17 Table of Contents The Langner Group Washington Hamburg Munich RIPE Operations Technology Management Plan (MP-17) 0.1 Purpose... 4 0.2 Process Overview... 4 0.3 Implementation Scope... 5 0.4

More information

Just How Vulnerable is Your Safety System?

Just How Vulnerable is Your Safety System? Theme 3: Cyber Security Just How Vulnerable is Your Safety System? Colin Easton MSc, CEng, FInstMC, MIET, ISA Senior Member TUV Rhienland FS Senior Expert PHRA & SIS 6 th July 2017 1 Safety System Security

More information

ISASecure. Securing the Supply Chain

ISASecure. Securing the Supply Chain ISASecure Securing the Supply Chain for Commercial off the Shelf (COTS) Industrial Automation and Control Devices and Systems Using IEC 62443 Standards www.isasecure.org July 13, 2016 Andre Ristaino Managing

More information

Securing Industrial Control Systems

Securing Industrial Control Systems L OCKHEED MARTIN Whitepaper Securing Industrial Control Systems The Basics Abstract Critical infrastructure industries such as electrical power, oil and gas, chemical, and transportation face a daunting

More information

Industrial Security Getting Started

Industrial Security Getting Started Industrial Security Getting Started Unrestricted Siemens A/S siemens.com/industrial-security Agenda 09:00 - Getting started. The Framework 10:00 - Coffee break 10:15 - Patch Management, Asset and Network

More information

Carbon Black PCI Compliance Mapping Checklist

Carbon Black PCI Compliance Mapping Checklist Carbon Black PCI Compliance Mapping Checklist The following table identifies selected PCI 3.0 requirements, the test definition per the PCI validation plan and how Carbon Black Enterprise Protection and

More information

Lindström Tomas Cyber security from ABB System 800xA PA-SE-XA

Lindström Tomas Cyber security from ABB System 800xA PA-SE-XA Lindström Tomas 2013-09-02 Cyber security from ABB System 800xA PA-SE-XA-015963 Cyber Security solutions from ABB Agenda Cyber Security in ABB: general view, activities, organization How we work with Cyber

More information

Endpoint Security for DeltaV Systems

Endpoint Security for DeltaV Systems Endpoint Security for DeltaV Systems Decrease risk with intelligent, adaptive scanning Utilize advanced anti-malware protection Identify, remediate and secure your DeltaV system from cybersecurity risks

More information

1 Data Center Requirements

1 Data Center Requirements 1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider

More information

Modicon M580 MUCH MORE than a PLC. the first epac!

Modicon M580 MUCH MORE than a PLC. the first epac! Modicon M580 MUCH MORE than a PLC the first epac! The new Modicon M580 is MUCH MORE than a simple PAC it is the epac with Ethernet built right into its core. Developed on the back of our latest innovations

More information

Wireless Mobile Workforce

Wireless Mobile Workforce DeltaV Distributed Control System Service Data Sheet Wireless Mobile Workforce Increased worker productivity and accuracy Mobile operations management Scalable, secure and reliable communications Full

More information

Sustain.Ability. Soroush Amidi and Andrew Nolan Advantages of a Plant-wide Wireless Network with Experion Integration

Sustain.Ability. Soroush Amidi and Andrew Nolan Advantages of a Plant-wide Wireless Network with Experion Integration Sustain.Ability. 2012 Honeywell Users Group Americas Soroush Amidi and Andrew Nolan Advantages of a Plant-wide Wireless Network with Experion Integration 1 Agenda Today s Challenges Why Choose a Plant-wide

More information

IC32E - Pre-Instructional Survey

IC32E - Pre-Instructional Survey Name: Date: 1. What is the primary function of a firewall? a. Block all internet traffic b. Detect network intrusions c. Filter network traffic d. Authenticate users 2. A system that monitors traffic into

More information

Industrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets

Industrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets Industrial Cyber Security ICS SHIELD Top-down security for multi-vendor OT assets OT SECURITY NEED Industrial organizations are increasingly integrating their OT and IT infrastructures. The huge benefits

More information

Dr. Johan Åkerberg, ABB Corporate Research, Sweden, Communication in Industrial Automation

Dr. Johan Åkerberg, ABB Corporate Research, Sweden, Communication in Industrial Automation Dr. Johan Åkerberg, ABB Corporate Research, Sweden, 2014-11-20 Communication in Industrial Automation Outline Industrial Applications Industrial Automation Safety vs. Security Safety Critical Communication

More information

SECURE SYSTEMS, NETWORKS AND DEVICES SAFEGUARDING CRITICAL INFRASTRUCTURE OPERATIONS

SECURE SYSTEMS, NETWORKS AND DEVICES SAFEGUARDING CRITICAL INFRASTRUCTURE OPERATIONS SECURE SYSTEMS, NETWORKS AND DEVICES SAFEGUARDING CRITICAL INFRASTRUCTURE OPERATIONS PROTECT YOUR DAILY OPERATIONS FROM BEING COMPROMISED In today s data-driven society, connectivity comes with a cost.

More information

Cyber security for digital substations. IEC Europe Conference 2017

Cyber security for digital substations. IEC Europe Conference 2017 Cyber security for digital substations IEC 61850 Europe Conference 2017 Unrestricted Siemens 2017 siemens.com/gridsecurity Substation Digitalization process From security via simplicity 1st generation:

More information

Continuous protection to reduce risk and maintain production availability

Continuous protection to reduce risk and maintain production availability Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading

More information

ISA Security Compliance Institute

ISA Security Compliance Institute ISA Security Compliance Institute ISASecure from an Asset Owner s perspective ISA Automation Week 2013 1 ISA Security Compliance Institute Presentation objectives Introduction to ISA/IEC 62443 Standards

More information

ISASecure. Securing the Supply Chain

ISASecure. Securing the Supply Chain ISASecure Securing the Supply Chain for Commercial off the Shelf (COTS) Industrial Automation and Control Devices and Systems Using IEC 62443 Standards www.isasecure.org May 26, 2016 Andre Ristaino Managing

More information

ICS Security. Trends, Issues, and New Standards. Speaker: David Mattes CTO, Asguard Networks

ICS Security. Trends, Issues, and New Standards. Speaker: David Mattes CTO, Asguard Networks ICS Security Trends, Issues, and New Standards Standards Certification Education & Training Publishing Conferences & Exhibits Speaker: David Mattes CTO, Asguard Networks 2013 ISA Water / Wastewater and

More information

Secure Development Lifecycle

Secure Development Lifecycle Secure Development Lifecycle Strengthening Cisco Products The Cisco Secure Development Lifecycle (SDL) is a repeatable and measurable process designed to increase Cisco product resiliency and trustworthiness.

More information

OVERVIEW. Invensys Operations Management

OVERVIEW. Invensys Operations Management Invensys Operations Management OVERVIEW 2009 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks of Invensys or its subsidiaries.

More information

SECURITY PRACTICES OVERVIEW

SECURITY PRACTICES OVERVIEW SECURITY PRACTICES OVERVIEW 2018 Helcim Inc. Copyright 2006-2018 Helcim Inc. All Rights Reserved. The Helcim name and logo are trademarks of Helcim Inc. P a g e 1 Our Security at a Glance About Helcim

More information

SANS SCADA and Process Control Europe Rome 2011

SANS SCADA and Process Control Europe Rome 2011 SANS SCADA and Process Control Europe Rome 2011 Ian Buffey Director International Services Industrial Defender ibuffey@industrialdefender.com A Holistic Approach Planning, training and governance Cybersecurity

More information

the SWIFT Customer Security

the SWIFT Customer Security TECH BRIEF Mapping BeyondTrust Solutions to the SWIFT Customer Security Controls Framework Privileged Access Management and Vulnerability Management Table of ContentsTable of Contents... 2 Purpose of This

More information

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location: Position: Reports to: Location: Security Monitoring Engineer / (NY or NC) Director, Information Security New York, NY or Winston-Salem, NC Position Summary: The Clearing House (TCH) Information Security

More information

Innovation for system integration

Innovation for system integration Innovation for system integration PERFORMANCE MADE SMARTER PR backplane A user-friendly and reliable mounting solution between the DCS/PLC/SIS system and isolators/i.s. interfaces TEMPERATURE I.S. INTERFACES

More information

Language for Control Systems

Language for Control Systems Cyber Security Procurement e Language for Control Systems Rita Wells Idaho National Laboratory Program Sponsor: National Cyber Security Division Control Systems Security Program Agenda Background Foundation

More information

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE International Maritime Organization Regulations IMO has given shipowners and managers until 2021 to incorporate cyber risk management into

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance Context and Alignment Policy 4.1 4.4 800-26 164.308 12.4 EDM01 IT Governance Policy 5.1 800-30 12.5 EDM02 Leadership Mergers and Acquisitions Policy A.6.1.1 800-33 EDM03 Context Terms and Definitions

More information

T22 - Industrial Control System Security

T22 - Industrial Control System Security T22 - Industrial Control System Security PUBLIC Copyright 2017 Rockwell Automation, Inc. All Rights Reserved. 1 Holistic Approach A secure application depends on multiple layers of protection and industrial

More information

Addressing Cyber Threats in Power Generation and Distribution

Addressing Cyber Threats in Power Generation and Distribution Addressing Cyber Threats in Power Generation and Distribution VEO, Asko Tuomela o Bachelor of Science in Electrical Power Engineering o Over 6 years experience in power projects, PLCs and supervision systems

More information

Cyber Security Solutions for Industrial Controls

Cyber Security Solutions for Industrial Controls Cyber Security Solutions for Industrial Controls bhge.com OVERVIEW In a complex world of ever-changing technologies, Baker Hughes, a GE company realizes the importance of having an experienced partner

More information

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002 ISO 27002 COMPLIANCE GUIDE How Rapid7 Can Help You Achieve Compliance with ISO 27002 A CONTENTS Introduction 2 Detailed Controls Mapping 3 About Rapid7 8 rapid7.com ISO 27002 Compliance Guide 1 INTRODUCTION

More information

T103 PlantPAx System Fundamentals

T103 PlantPAx System Fundamentals T103 PlantPAx System Fundamentals PUBLIC INFORMATION Rev 5058-CO900E Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. PUBLIC INFORMATION Copyright 2014 Rockwell Automation, Inc. All Rights

More information

Process System Security. Process System Security

Process System Security. Process System Security Roel C. Mulder Business Consultant Emerson Process Management Sophistication of hacker tools, May 2006, Slide 2 Risk Assessment A system risk assessment is required to determine security level Security

More information

No compromises for secure SCADA Communications even over 3rd Party Networks

No compromises for secure SCADA Communications even over 3rd Party Networks No compromises for secure SCADA Communications even over 3rd Party Networks The Gamble of Using ISP Private Networks How to Stack the Odds in Your Favor Standards Certification Education & Training Publishing

More information

H1 + HSE FFB Integrated Architecture Demonstration

H1 + HSE FFB Integrated Architecture Demonstration WHITE PAPER FOUNDATION Fieldbus H1 + HSE FFB Integrated Architecture Demonstration International Specialty Products (ISP) Lima, Ohio Abstract What End Users have asked for The challenge facing industry

More information

Standard CIP Cyber Security Systems Security Management

Standard CIP Cyber Security Systems Security Management A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-1 3. Purpose: Standard CIP-007 requires Responsible Entities to define methods, processes, and procedures for securing

More information

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS 10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND

More information

Secure Access & SWIFT Customer Security Controls Framework

Secure Access & SWIFT Customer Security Controls Framework Secure Access & SWIFT Customer Security Controls Framework SWIFT Financial Messaging Services SWIFT is the world s leading provider of secure financial messaging services. Their services are used and trusted

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance Context and Alignment Policy 4.1 4.4 800-26 164.308 12.4 EDM01 IT Governance Policy 5.1 800-30 12.5 EDM02 Leadership Mergers and Acquisitions Policy A.6.1.1 800-33 EDM03 Context Terms and Definitions

More information

Experion LX Purpose-built DCS. Honeywell Proprietary

Experion LX Purpose-built DCS. Honeywell Proprietary Experion LX Purpose-built DCS Honeywell s New DCS Experion LX Purpose- Built On Honeywell s Reliable DCS Platform Delivered Through Authorized Partners Experion LX: Proven Technology Purpose Built DCS

More information

ISASecure SSA Certification for DeltaV and DeltaV SIS

ISASecure SSA Certification for DeltaV and DeltaV SIS ISASecure SSA Certification for DeltaV and DeltaV SIS Frequently Asked Questions This FAQ addresses questions around the scope and relevance of the ISASecure System Security Assurance certification applied

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

Peter Kreutzer, PSSAM/Automation Power World 2011 New Delhi, Secure and reliable Redundant communication network and cyber security

Peter Kreutzer, PSSAM/Automation Power World 2011 New Delhi, Secure and reliable Redundant communication network and cyber security Peter Kreutzer, PSSAM/Automation Power World 2011 New Delhi, 2011-09-20 Secure and reliable Redundant communication network and cyber security Content Reliable Substation communication networks Introduction

More information

Cyber security - why and how

Cyber security - why and how Cyber security - why and how Frankfurt, 14 June 2018 ACHEMA Cyber Attack Continuum Prevent, Detect and Respond Pierre Paterni Rockwell Automation, Connected Services EMEA Business Development Manager PUBLIC

More information

Safety Expert Council Day 2 Business Strategy t Review

Safety Expert Council Day 2 Business Strategy t Review Safety Expert Council Day 2 Business Strategy t Review ABB Control Technologies October 11, 2012 Slide 1 Product Group Safety Growth Strategy Business Plan Execution Focus Areas October 11, 2012 Slide

More information

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions Meeting PCI DSS 3.2 Compliance with Solutions Platform the industry s most comprehensive, intelligent platform for managing cyber risk. 2018, Inc. What s Changing with PCI DSS? Summary of PCI Business

More information

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY OUR MISSION Make the digital world a sustainable and trustworthy environment

More information

Cyber Security of Industrial Control Systems (ICSs)

Cyber Security of Industrial Control Systems (ICSs) Cyber Security of Industrial Control Systems (ICSs) February 23, 2016 Joe Weiss PE, CISM, CRISC, ISA Fellow Managing Partner Applied Control Solutions, LLC (408) 253-7934 joe.weiss@realtimeacs.com Applied

More information

Designing and Building a Cybersecurity Program

Designing and Building a Cybersecurity Program Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (CSF) Larry Wilson lwilson@umassp.edu ISACA Breakfast Meeting January, 2016 Designing & Building a Cybersecurity

More information

A Brief Profile 2017

A Brief Profile 2017 A Brief Profile 2017 Future Netwings Solutions India s leading ISO 9001:2008 Certified IT Services Organization Over 18 Years experience in IT Infrastructure Design, Build & Support Sales & Support locations

More information

Cybersecurity Session IIA Conference 2018

Cybersecurity Session IIA Conference 2018 www.pwc.com/me Cybersecurity Session IIA Conference 2018 Wael Fattouh Partner PwC Cybersecurity and Technology Risk PwC 2 There are only two types of companies: Those that have been hacked, and those that

More information

Cisco Secure Ops Solution

Cisco Secure Ops Solution Brochure Cisco Secure Ops Solution Cisco Secure Ops Solution supports cyber-security risk management and compliance for industrial automation environments. It is a combination of on premise technology,

More information

ISA99 - Industrial Automation and Controls Systems Security

ISA99 - Industrial Automation and Controls Systems Security ISA99 - Industrial Automation and Controls Systems Security Committee Summary and Activity Update Standards Certification Education & Training Publishing Conferences & Exhibits February 2018 Copyright

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

Introducing the 9202-ETS MTL Tofino industrial Ethernet security appliance

Introducing the 9202-ETS MTL Tofino industrial Ethernet security appliance Introducing the 9202-ETS MTL Tofino industrial Ethernet security appliance HAKIM- Sales Engineer 1 Cybersecurity of valuable assets and processes in a wide range of industry verticals, such as: Oil & Gas

More information

ICS Cybersecurity: You Cannot Secure What You Cannot See. David Zahn CMO and General Manager, Cybersecurity Business Unit

ICS Cybersecurity: You Cannot Secure What You Cannot See. David Zahn CMO and General Manager, Cybersecurity Business Unit ICS Cybersecurity: You Cannot Secure What You Cannot See David Zahn CMO and General Manager, Cybersecurity Business Unit ICS Cybersecurity: You Cannot Secure What You Cannot See Cover Table of Contents

More information

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

Industry Best Practices for Securing Critical Infrastructure

Industry Best Practices for Securing Critical Infrastructure Industry Best Practices for Securing Critical Infrastructure Cyber Security and Critical Infrastructure AGENDA - Difference between IT and OT - Real World Examples of Cyber Attacks Across the IT/OT Boundary

More information

ProfessionalPLUS Station Software Suite

ProfessionalPLUS Station Software Suite DeltaV Distributed Control System Product Data Sheet February 2018 ProfessionalPLUS Station Software Suite Global database, architected for flexibility and scalability Powerful, graphical engineering capabilities

More information

DEMONSTRATION OF INDEPENDENCE

DEMONSTRATION OF INDEPENDENCE Version 2 03.12.2015 COMBINED BASIC PROCESS CONTROL SYSTEM (BPCS) AND SAFETY INSTRUMENTED SYSTEM (SIS) This assessment system is based upon both IEC61508 2 nd edition and IEC61511 1 st edition CASS Document

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

Cybersecurity and Communications Based Train Control

Cybersecurity and Communications Based Train Control Cybersecurity and Communications Based Train Control RAHEEL QURESHI CYBERSECURITY AUTHORITY URBAN RAIL SIGNALLING (URS) 2016 Thales Canada, Transportation Solutions. All rights reserved. Passing on or

More information