Triconex Safety System Platforms
|
|
- Rafe Boyd
- 6 years ago
- Views:
Transcription
1
2 Triconex Safety System Platforms Presented to OpsManage 13 ANZ User Conference Presented by Al Fung May 6, Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks of Invensys or its subsidiaries. All third party trademarks and service marks are the proprietary marks of their respective owners. Slide 2 Invensys 00/00/00 Invensys proprietary & confidential
3 PEOPLE PROCESS Certified People: +650 Safety Engineers +270 Certified Functional Safety Engineers +15 Certified Functional Safety Experts Certified Products: IEC61508:2010 Tricon SIS Trident SIS Tri-GP SIS Tristation software SafetyView software 30 years of Safety Certified Procedures: IEC61511 certified Certified Delivery centres: UK Singapore India Egypt Etc... Service & Support: Global Customer Support Customer First program Global support, delivered locally Safety Lifecycle Services Service Level Agreements TECHNOLOGY SUPPORT Continuously Safe, Reliable Production Think Safe Available Secure
4 1 Product Updates and Roadmap Security Overview and Roadmap Alarm and Bypass Management for Safety Systems Slide 4
5 Continuously Safe, Reliable Production pplications Process Safety Management APerformance visibility, reporting, KPIs and decision support Software Unified Control and Safety Configuration Tools Simplify configuration, maintenance and change management Controller Common Enhanced Main Processors Superior performance and on-line functionality Device & Sys Int. I/O subsystem. Triconex on the Control Network Simplify network implementation, reduce infrastructure costs Harmonize I/O & Reduced Footprint Optimize Total Cost of Ownership Think Safe Available Secure Invensys Proprietary & Confidential
6 Continuously Safe, Reliable Production pplications Continuously Safe, Reliable Production A Lower o e safety incident probability. Software Fewer personnel needed to engineer and maintain SIS operation. Controller Extend SIS lifecycle. Increase plant duty cycles for greater continuous operation and production Device & Sys Int. Faster SIS start-up schedules. Lower network infrastructure & maintenance costs. Faster post Trip Analysis I/O subsystem. Lower Total Cost of Ownership. Think Safe Available Secure Invensys Proprietary & Confidential
7 Trident / Tri-GP v3.0 Release Application New Communications Integration Module (CIM) Adds OPC-UA (Unified Architecture) communications Features Enhanced security features e.g. digital signature and authentication Improved performance of safety peer to peer communications Auto discovery on Enhanced Diagnostic Monitor application Benefits Freedom of choice - Open connectivity Safe and Secure Defense in depth Broad industry support Flexible integration with other systems Think Safe Available Secure Invensys Proprietary & Confidential
8 Trident / Tri-GP v3.0 New Communications Integration Module Media support for both Copper and Fiber Optic New Peer to Peer functionality Enhanced encryption algorithms New function blocks Supports both existing (for tie into existing systems) and new function blocks Performance improvements Certified by TUV for SIL3 applications Embedded OPC-UA functionality Embedded OPC-UA Server Supports up to 10 concurrent OPC UA clients Slide 8 Invensys Proprietary & Confidential
9 Trident / Tri-GP v3.0 Tristation V4.10 Support for Trident / Tri-GP 3.0 controllers and Communications Module Secure communication with Trident / Tri-GP 3.0 through windows security certificates New function blocks for alarms (safety view) and peer to peer 2 new I/O reports :- I/O utilization, Disabled points Verify download operation via comparison of control program elements in the Triconex controller with those in Tristation 1131 project Enhanced Diagnostic Monitor V2.7 Support for Trident / Tri-GP 3.0 systems Secure communication with Trident / Tri-GP 3.0 through windows security certificates Automatic discovery of Trident / Tri-GP 3.0 controllers (with CIM installed) on the network, eliminating the need to manually configure the network connection to the controllers. Slide 9 Invensys Proprietary & Confidential
10 Trident / Tri-GP Wireless Peer to Peer Application Wireless media for peer to peer communications between Trident / Tri-GP systems (e.g. Well head, Tank Farm) Features COTS equipment, dual frequency radio (2.4 GHz, 5.8 GHz) Wireless MESH configuration for resilience Equivalent performance to wired solutions Secured wireless network (proprietary wireless frame) Benefits Estimated 50-70% less cost than wired solution Flexible and easily adapted to future needs Easy to deploy and manage Safety for stranded assets Think Safe Available Secure Invensys Proprietary & Confidential
11 Wireless Peer to Peer Tools for Wireless Configuration Virtual Switch (wireless mesh) Invensys Proprietary & Confidential
12 Triconex I/A Series Integration Application Triconex I/A Series Hardware Integration Features Direct integration of Triconex onto control network Triconex appears as a control station Exchange Interlock data with control stations Maintain Separation Benefits Lower Total Cost of Ownership Reduced physical space Faster installation & commissioning Tricon Trident Tri-GP Integrated and Separate you can have both! Think Safe Available Secure Invensys Proprietary & Confidential
13 Integrated Control & Safety Operator Workstations Engineering / Maintenance Workstation Real Time Data Historian Alarms / SOE Engineering Galaxy Repository Control Network Dedicated Safety Peer to Peer Process Controllers Safety Controllers Slide 13 Invensys Proprietary & Confidential
14 Virtualization Application Safety system software run in a virtual environment Safety visualization on Thin Clients Features Consistent and compatible with I/A Series DCS Qualified & operational on standard hardware Benefits Less cost, space, energy consumption Reduction in workstation maintenance activities Support multiple Triconex software versions from a single server Simplify software configurations Think Safe Available Secure Invensys Proprietary & Confidential
15 Virtualization Triconex Software & OS Tristation TS1131 v4.10 (or later) Enhanced Diagnostic Monitor v4.7 (or later) Excluded: TriLogger and SOE Windows 7 and Windows Server 2008 r2 Thin Client Support Remote Desktop Protocol (RDP) HP Thin Client Stations Specification to qualify other TC Hardware Architecture Guidelines Sizing Guidelines Performance Recommendations Virtualization Server HP DL380 Rack Mount Server Thin Client HP t610 Flexible Thin Client Slide 15 Invensys Proprietary & Confidential
16 2 Product Updates and Roadmap Security Overview and Roadmap Alarm and Bypass Management for Safety Systems Slide 16
17 Slide 17
18 Industry & Technology Trends Defense e Economic Liberalization Industrialization in Asia and Middle East Trend towards open communication Rise of networked solutions Corporate, IT, Automation Confusion between IT and Automation departments Continuous push to lower cost Human Element in Security Breach Certification becoming mandatory E.g. Achilles Level I and II, WIB, ISA Secure Speed of Change at IT level = Fast, at Automation level = Slow Standards continue to evolve E.g. ISA 99, NERC, ISA Secure Thr reat Cyber Attacks cost business an average of $2 Million per year Attacks are more hostile, frequent, and impact is greater Threats are more complex E.g. latest malware penetrated Firewalls Malicious Attacks increased by 81% in 2011 Slide 18
19 Where is Triconex today? Achilles Certification Secure Access Model Tofino Firewall Enhanced Security Slide 19
20 Security Application Continuous security hardening for Safety System and engineering workstation Features Consistent with standard practice for I/A Series DCS Operating System Patch and Anti Virus validation White listing TriStation engineering g workstation Benefits Continuous security updates mitigate external security threats to safety system assets Slide 20
21 Triconex Software Security Patch Management Scope Software: TriStation 1131 and Enhanced Diagnostic Monitor Versions Tested: current plus (2) prior Windows 7 Operating System Security Patch updates Anti Virus.dat virus signature file updates Process Monthly test of Triconex software against standard test procedure on standard PC (I/A Series workstation) ti Publish appropriate Sales Alert and Customer Notifications
22 Cyber Security Roadmap Product Secure tional Security Assessment Funct Ac chilles Test Kit.dat TEST TCX Achilles II Compliance TCX& IA ISA Secure TCX ISA Secure IA TCX OS & AV patch = IA Anti Virus on IA / TCX.dat TEST Strategic TCX ISA Secure SCADA ISA Secure PAC ISA Secure SYSTEM Secure e Service Secure Delivery ity Assessment TriStation 1131 White Listing Secure Tricon TCM ewib Compliance Functional Secur Global Windows Server Update Service Best Practices & Procedures Hardening TriStation 1131 & Enhanced Diagnostic Monitor International Docs ISO LEGEND: BLUE under development; YELLOW planned Continuous Validation Invensys Proprietary & Confidential
23 3 Product Updates and Roadmap Security Overview and Roadmap Alarm and Bypass Management for Safety Systems Slide 23
24 Refinery Safety BP Refinery, Texas City 2005 refinery explosion 15 killed, 180 injured, $21 million fines, $1.5 billion loss Two of the four key hazard contributors: Failed management of instrumentation and alarm systems Allowing of non essential personnel in high risk areas Slide 24 Invensys Proprietary
25 Refinery Safety After BP Texas City Chemical Safety Board recommends Safety Metrics Results of survey, 51 of 159 U.S. refineries 90% at least one of the key contributor 43% had 3 of the key hazard contributor Slide 25 Invensys Proprietary
26 Current Issues with Safety Management in a Plant How safe is my plant running or operating? Is it safe at this point in time? Are there leading and lagging safety metrics? Safety impact of a device alert/failure/bypass What is the impact of a device alert/failure on a SIF? Are SIF assumptions valid? E.g. Proof testing is performed as per SIF design? Slide 26 Invensys Proprietary
27 Safety View Online tool to help clients run their plant safely: Operator tool for Priority Level 1 alarms Maintenance tool for bypass management Manage Operational Risk with Confidence Provides: Situational awareness and visibility of the risks being managed Contextual information to facilitate decision support Slide 27
28 Certification World s First TÜV Certified software based Alarm & Bypass HMI system: TÜV Certifiedto to IEC61508:2010 For use in applications up to SIL3 Systematic Capability Level 3 (SC3) Note: Systematic capability is the measure (expressed on a scale of 1 (low) to 4 (high)) of the confidence that equipment will not fail due to relevant systematic failure mechanisms when the equipment tis applied in accordance with the instructions specified in its safety manual. Slide 28
29 Priority 1 Alarms ISA 18.1 Annunciator Sequence and Specifications: Sequence Code M: Manual Reset Sequence Code A: Automatic Reset Sequence Code R: Ring Back Safety View allows you to: Acknowledge individual / group alarms Re activate alarms acknowledged by an operator during previous shift Clear first out alarms Silence Audible alarms Reset alarms in ring back state Slide 29
30 Features Independent from DCS Supports Redundancy for increased availability Records all operator actions Provides audit trail Configurable displays Grouped by Lines Of Equipment Detailed description for each alarm for greater context and understanding Effective Operator Response Slide 30
31 Bypass Bypass safety critical devices for: Maintenance Calibration During start up, shutdown etc. Clear indication of devices in Bypass Records all operator actions Provides audit trail Slide 31
32 Benefits Maximize Return on Assets: Lower equipment costs Lower installation costs Minimize footprint, power consumption, HVAC etc. Increase Overall Equipment Efficiency ReduceUnscheduled Downtime: Minimize production downtime due to operator error Provide contextual information Increase visibility of risks Reduce Maintenance Costs: Rd Reduce spares holding No LED / Lamp replacement No servicing required Slide 32
33 Safety View - Today Alarm zone, displays all configured alarms Bypass zone, displays all active bypasses Control zone, Information provides zone, displays controls for information acknowledging g about selected and bypassing alarm alarms Provides audit trail for operator actions Invensys Proprietary & Confidential Slide 33 Invensys Proprietary
34 Safety View Application Alarm and Bypass Management in compliance with ISA Annunciator Sequences and Specifications Standard Features Dedicated Operator view of Priority Level 1 (P1) alarms Maintenance tool for bypass management Provides audit trail of operator actions Easy to configure - Dedicated alarm function blocks available in TS1131 library for Tricon, Trident, Tri-GP Benefits IEC61508:2010TUV approved to SC3 Minimize production downtime due to operator error Easy for clients to standardize Manage operational risk with confidence Think Safe Available Secure Invensys Proprietary & Confidential
35 Operational Integrity (Process Safety Management) Functional Safety Process Safety Occupational Safety DCS Operations Trips, slips, falls Safety Systems Maintenance Working at heights Alarms Procedures Handling materials Performance and Reporting Slide 35
36
Industrial Security - Protecting productivity. Industrial Security in Pharmaanlagen
- Protecting productivity Industrial Security in Pharmaanlagen siemens.com/industrialsecurity Security Trends Globally we are seeing more network connections than ever before Trends Impacting Security
More informationFoxboro DCS beyond 2013
Foxboro DCS beyond 2013 Future Directions I/A Series DCS Roadmap Grant Le Sueur, Portfolio Director April 2013 2010 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products
More informationCyber Security for Process Control Systems ABB's view
Kaspersky ICS Cybersecurity 2017, 2017-09-28 Cyber Security for Process Control Systems ABB's view Tomas Lindström, Cyber Security Manager, ABB Control Technologies Agenda Cyber security for process control
More informationSummary. Business Value
Summary Feedwater control systems Tricon Triple Modular Redundant (TMR) Digital System for Feedwater Control and Safety Application in Nuclear Power Plants are critical to the safe and efficient operation
More informationPresenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks.
Presenter Jakob Drescher Industry Cyber Security 1 Cyber Security? Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks. Malware or network traffic
More informationMark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services
Mark Littlejohn June 23, 2016 DON T GO IT ALONE Achieving Cyber Security using Managed Services Speaker: Mark Littlejohn 1 Mark is an industrial technology professional with over 30 years of experience
More informationFunctional. Safety and. Cyber Security. Pete Brown Safety & Security Officer PI-UK
Functional Safety and Cyber Security Pete Brown Safety & Security Officer PI-UK Setting the Scene 2 Functional Safety requires Security Consider just Cyber Security for FS Therefore Industrial Control
More informationWireless Field Data Backhaul
Service Data Sheet Wireless Field Data Backhaul Scalable Reduced cost Safer deployment Secure and reliable communications Full support service An Emerson Smart Wireless Field Data Backhaul Solution integrates
More informationRemoval of Hardware ESD, Independent of Safety Logic Solver
Removal of Hardware ESD, Independent of Safety Logic Solver by Sam Roy Executive summary This is a discussion to remove independent hardware based Emergency Shutdown for Logic Solver as identified in ANSI/ISA-84.00.01-2004,
More informationEnsuring Your Plant is Secure Tim Johnson, Cyber Security Consultant
Ensuring Your Plant is Secure Tim Johnson, Cyber Security Consultant 1 The Foxboro Evo TM Process Automation System Addressing the needs across your operation today and tomorrow. 2 Industrial Control Systems
More informationMaarten Oosterink for PPA 2010 Delft, Vendor Requirements. Process Control Domain - Security Requirements for Vendors
Maarten Oosterink for PPA 2010 Delft, 11-03-2010 Vendor Requirements Process Control Domain - Security Requirements for Vendors Contents Purpose, Scope and Audience Development process Contents of WIB
More informationIndustrial Network Trends & Technologies
Industrial Network Trends & Technologies EtherNet/IP on the Plant Floor PUBLIC INFORMATION 5058-CO900F IHS Technology Industrial Internet of Things 2014, April 2014 PUBLIC INFORMATION Forecasts tremendous
More informationPractical SCADA Cyber Security Lifecycle Steps
Practical SCADA Cyber Security Lifecycle Steps Standards Certification Jim McGlone CMO, Kenexis Education & Training Publishing Conferences & Exhibits Bio Jim McGlone, CMO, Kenexis GICSP ISA Safety & Security
More informationDeltaV Remote Client. Introduction. Remote engineering and operator consoles. View Multiple DeltaV Systems from a single workstation
DeltaV Distributed Control System Product Data Sheet December 2017 DeltaV Remote Client Remote Client Remote Client Firewall Emerson Smart Firewall L2.5 Network Remote Desktop Server (Professional Plus
More informationAn Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist
An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist Standards Certification Education & Training Publishing Conferences & Exhibits Speakers: Bryan L. Singer, CISM, CISSP, CAP
More informationWhite Paper. The Tricon Turbine Control System
White Paper The Tricon Turbine Control System Author: Naresh Desai, Sr. Technical Consultant, Invensys What s Inside: 1. Abstract 2. Introduction 3. Major Requirements 4. Tricon Architecture 5. Critical
More informationSecurity analysis and assessment of threats in European signalling systems?
Security analysis and assessment of threats in European signalling systems? New Challenges in Railway Operations Dr. Thomas Störtkuhl, Dr. Kai Wollenweber TÜV SÜD Rail Copenhagen, 20 November 2014 Slide
More informationДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT
ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT ENERGY AUTOMATION - SMART GRID Restricted Siemens AG 20XX All rights reserved. siemens.com/answers Frederic Buchi, Energy Management Division, Siemens AG Cyber
More informationIndustrial Defender ASM. for Automation Systems Management
Industrial Defender ASM for Automation Systems Management INDUSTRIAL DEFENDER ASM FOR AUTOMATION SYSTEMS MANAGEMENT Industrial Defender ASM is a management platform designed to address the overlapping
More informationGDPR Update and ENISA guidelines
GDPR Update and ENISA guidelines 2016 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how to ensure
More informationISA99 - Industrial Automation and Controls Systems Security
ISA99 - Industrial Automation and Controls Systems Security Committee Summary and Activity Update Standards Certification Education & Training Publishing Conferences & Exhibits September 2016 Copyright
More informationDeltaV SIS Standalone
DeltaV SIS Process Safety System White Paper January 2018 DeltaV SIS Standalone This whitepaper provides an overview of Emerson s DeltaV TM SIS standalone solution. To 3rd Party BPCS DeltaV SIS Standalone
More informationLESSONS LEARNED IN SMART GRID CYBER SECURITY
LESSONS LEARNED IN SMART GRID CYBER SECURITY Lynda McGhie CISSP, CISM, CGEIT Quanta Technology Executive Advisor Smart Grid Cyber Security and Critical Infrastructure Protection lmcghie@quanta-technology.com
More informationARC VIEW. Honeywell s New PLC Brings Digital Transformation to the ControlEdge. Keywords. Summary. The Edge and IIoT.
ARC VIEW AUGUST 3, 2017 Honeywell s New PLC Brings Digital Transformation to the ControlEdge By Craig Resnick Keywords IIoT, PLC, DCS, Digital Transformation, Mobility, OPC UA, Cybersecurity Summary IIoT
More informationK12 Cybersecurity Roadmap
K12 Cybersecurity Roadmap Introduction Jason Brown, CISSP Chief Information Security Officer Merit Network, Inc jbrown@merit.edu @jasonbrown17 https://linkedin.com/in/jasonbrown17 2 Agenda 3 Why Use the
More informationCyber Security Solutions Mitigating risk and enhancing plant reliability
P OW E R G E N E R AT I O N Cyber Security Solutions Mitigating risk and enhancing plant reliability 2 CYBER SECURITY SOLUTIONS MITIGATING RISK AND ENHANCING PLANT RELIABILITY Providing a roadmap to achieve
More informationInternet of Things. The Digital Oilfield: Security in SCADA and Process Control. Mahyar Khosravi
Internet of Things The Digital Oilfield: Security in SCADA and Process Control Mahyar Khosravi makhosra@cisco.com Critical infrastructures worldwide not ready to battle cyber attacks, claims new study.
More informationSafety Instrumented Systems: Can They Be Integrated But Separate?
Safety Instrumented Systems: Can They Be Integrated But Separate? Written by Merry Kuchle and Trevor MacDougall of Spartan Controls. For questions, please contact Robert Smith. Keywords Safety Instrumented
More informationBUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE
BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationDeltaV Remote Client. Introduction. Remote engineering and operator consoles. View Multiple DeltaV Systems from a single workstation
DeltaV Distributed Control System Product Data Sheet July 2018 DeltaV Remote Client Remote Client Remote Client Firewall Emerson Smart Firewall L2.5 Network Remote Desktop Server (Professional Plus or
More informationARC VIEW. Leveraging New Automation Approaches Across the Plant Lifecycle. Keywords. Summary. By Larry O Brien
ARC VIEW JUNE 22, 2017 Leveraging New Automation Approaches Across the Plant Lifecycle By Larry O Brien Keywords Operational Excellence, Cloud, Virtualization, Operations Management, Field Commissioning,
More informationDigital Wind Cyber Security from GE Renewable Energy
Digital Wind Cyber Security from GE Renewable Energy BUSINESS CHALLENGES The impact of a cyber attack to power generation operations has the potential to be catastrophic to the renewables industry as well
More informationRIPE RIPE-17. Table of Contents. The Langner Group. Washington Hamburg Munich
RIPE RIPE-17 Table of Contents The Langner Group Washington Hamburg Munich RIPE Operations Technology Management Plan (MP-17) 0.1 Purpose... 4 0.2 Process Overview... 4 0.3 Implementation Scope... 5 0.4
More informationJust How Vulnerable is Your Safety System?
Theme 3: Cyber Security Just How Vulnerable is Your Safety System? Colin Easton MSc, CEng, FInstMC, MIET, ISA Senior Member TUV Rhienland FS Senior Expert PHRA & SIS 6 th July 2017 1 Safety System Security
More informationISASecure. Securing the Supply Chain
ISASecure Securing the Supply Chain for Commercial off the Shelf (COTS) Industrial Automation and Control Devices and Systems Using IEC 62443 Standards www.isasecure.org July 13, 2016 Andre Ristaino Managing
More informationSecuring Industrial Control Systems
L OCKHEED MARTIN Whitepaper Securing Industrial Control Systems The Basics Abstract Critical infrastructure industries such as electrical power, oil and gas, chemical, and transportation face a daunting
More informationIndustrial Security Getting Started
Industrial Security Getting Started Unrestricted Siemens A/S siemens.com/industrial-security Agenda 09:00 - Getting started. The Framework 10:00 - Coffee break 10:15 - Patch Management, Asset and Network
More informationCarbon Black PCI Compliance Mapping Checklist
Carbon Black PCI Compliance Mapping Checklist The following table identifies selected PCI 3.0 requirements, the test definition per the PCI validation plan and how Carbon Black Enterprise Protection and
More informationLindström Tomas Cyber security from ABB System 800xA PA-SE-XA
Lindström Tomas 2013-09-02 Cyber security from ABB System 800xA PA-SE-XA-015963 Cyber Security solutions from ABB Agenda Cyber Security in ABB: general view, activities, organization How we work with Cyber
More informationEndpoint Security for DeltaV Systems
Endpoint Security for DeltaV Systems Decrease risk with intelligent, adaptive scanning Utilize advanced anti-malware protection Identify, remediate and secure your DeltaV system from cybersecurity risks
More information1 Data Center Requirements
1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider
More informationModicon M580 MUCH MORE than a PLC. the first epac!
Modicon M580 MUCH MORE than a PLC the first epac! The new Modicon M580 is MUCH MORE than a simple PAC it is the epac with Ethernet built right into its core. Developed on the back of our latest innovations
More informationWireless Mobile Workforce
DeltaV Distributed Control System Service Data Sheet Wireless Mobile Workforce Increased worker productivity and accuracy Mobile operations management Scalable, secure and reliable communications Full
More informationSustain.Ability. Soroush Amidi and Andrew Nolan Advantages of a Plant-wide Wireless Network with Experion Integration
Sustain.Ability. 2012 Honeywell Users Group Americas Soroush Amidi and Andrew Nolan Advantages of a Plant-wide Wireless Network with Experion Integration 1 Agenda Today s Challenges Why Choose a Plant-wide
More informationIC32E - Pre-Instructional Survey
Name: Date: 1. What is the primary function of a firewall? a. Block all internet traffic b. Detect network intrusions c. Filter network traffic d. Authenticate users 2. A system that monitors traffic into
More informationIndustrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets
Industrial Cyber Security ICS SHIELD Top-down security for multi-vendor OT assets OT SECURITY NEED Industrial organizations are increasingly integrating their OT and IT infrastructures. The huge benefits
More informationDr. Johan Åkerberg, ABB Corporate Research, Sweden, Communication in Industrial Automation
Dr. Johan Åkerberg, ABB Corporate Research, Sweden, 2014-11-20 Communication in Industrial Automation Outline Industrial Applications Industrial Automation Safety vs. Security Safety Critical Communication
More informationSECURE SYSTEMS, NETWORKS AND DEVICES SAFEGUARDING CRITICAL INFRASTRUCTURE OPERATIONS
SECURE SYSTEMS, NETWORKS AND DEVICES SAFEGUARDING CRITICAL INFRASTRUCTURE OPERATIONS PROTECT YOUR DAILY OPERATIONS FROM BEING COMPROMISED In today s data-driven society, connectivity comes with a cost.
More informationCyber security for digital substations. IEC Europe Conference 2017
Cyber security for digital substations IEC 61850 Europe Conference 2017 Unrestricted Siemens 2017 siemens.com/gridsecurity Substation Digitalization process From security via simplicity 1st generation:
More informationContinuous protection to reduce risk and maintain production availability
Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading
More informationISA Security Compliance Institute
ISA Security Compliance Institute ISASecure from an Asset Owner s perspective ISA Automation Week 2013 1 ISA Security Compliance Institute Presentation objectives Introduction to ISA/IEC 62443 Standards
More informationISASecure. Securing the Supply Chain
ISASecure Securing the Supply Chain for Commercial off the Shelf (COTS) Industrial Automation and Control Devices and Systems Using IEC 62443 Standards www.isasecure.org May 26, 2016 Andre Ristaino Managing
More informationICS Security. Trends, Issues, and New Standards. Speaker: David Mattes CTO, Asguard Networks
ICS Security Trends, Issues, and New Standards Standards Certification Education & Training Publishing Conferences & Exhibits Speaker: David Mattes CTO, Asguard Networks 2013 ISA Water / Wastewater and
More informationSecure Development Lifecycle
Secure Development Lifecycle Strengthening Cisco Products The Cisco Secure Development Lifecycle (SDL) is a repeatable and measurable process designed to increase Cisco product resiliency and trustworthiness.
More informationOVERVIEW. Invensys Operations Management
Invensys Operations Management OVERVIEW 2009 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks of Invensys or its subsidiaries.
More informationSECURITY PRACTICES OVERVIEW
SECURITY PRACTICES OVERVIEW 2018 Helcim Inc. Copyright 2006-2018 Helcim Inc. All Rights Reserved. The Helcim name and logo are trademarks of Helcim Inc. P a g e 1 Our Security at a Glance About Helcim
More informationSANS SCADA and Process Control Europe Rome 2011
SANS SCADA and Process Control Europe Rome 2011 Ian Buffey Director International Services Industrial Defender ibuffey@industrialdefender.com A Holistic Approach Planning, training and governance Cybersecurity
More informationthe SWIFT Customer Security
TECH BRIEF Mapping BeyondTrust Solutions to the SWIFT Customer Security Controls Framework Privileged Access Management and Vulnerability Management Table of ContentsTable of Contents... 2 Purpose of This
More informationSecurity Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:
Position: Reports to: Location: Security Monitoring Engineer / (NY or NC) Director, Information Security New York, NY or Winston-Salem, NC Position Summary: The Clearing House (TCH) Information Security
More informationInnovation for system integration
Innovation for system integration PERFORMANCE MADE SMARTER PR backplane A user-friendly and reliable mounting solution between the DCS/PLC/SIS system and isolators/i.s. interfaces TEMPERATURE I.S. INTERFACES
More informationLanguage for Control Systems
Cyber Security Procurement e Language for Control Systems Rita Wells Idaho National Laboratory Program Sponsor: National Cyber Security Division Control Systems Security Program Agenda Background Foundation
More informationTHE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE
THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE International Maritime Organization Regulations IMO has given shipowners and managers until 2021 to incorporate cyber risk management into
More informationAltius IT Policy Collection Compliance and Standards Matrix
Governance Context and Alignment Policy 4.1 4.4 800-26 164.308 12.4 EDM01 IT Governance Policy 5.1 800-30 12.5 EDM02 Leadership Mergers and Acquisitions Policy A.6.1.1 800-33 EDM03 Context Terms and Definitions
More informationT22 - Industrial Control System Security
T22 - Industrial Control System Security PUBLIC Copyright 2017 Rockwell Automation, Inc. All Rights Reserved. 1 Holistic Approach A secure application depends on multiple layers of protection and industrial
More informationAddressing Cyber Threats in Power Generation and Distribution
Addressing Cyber Threats in Power Generation and Distribution VEO, Asko Tuomela o Bachelor of Science in Electrical Power Engineering o Over 6 years experience in power projects, PLCs and supervision systems
More informationCyber Security Solutions for Industrial Controls
Cyber Security Solutions for Industrial Controls bhge.com OVERVIEW In a complex world of ever-changing technologies, Baker Hughes, a GE company realizes the importance of having an experienced partner
More informationISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002
ISO 27002 COMPLIANCE GUIDE How Rapid7 Can Help You Achieve Compliance with ISO 27002 A CONTENTS Introduction 2 Detailed Controls Mapping 3 About Rapid7 8 rapid7.com ISO 27002 Compliance Guide 1 INTRODUCTION
More informationT103 PlantPAx System Fundamentals
T103 PlantPAx System Fundamentals PUBLIC INFORMATION Rev 5058-CO900E Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. PUBLIC INFORMATION Copyright 2014 Rockwell Automation, Inc. All Rights
More informationProcess System Security. Process System Security
Roel C. Mulder Business Consultant Emerson Process Management Sophistication of hacker tools, May 2006, Slide 2 Risk Assessment A system risk assessment is required to determine security level Security
More informationNo compromises for secure SCADA Communications even over 3rd Party Networks
No compromises for secure SCADA Communications even over 3rd Party Networks The Gamble of Using ISP Private Networks How to Stack the Odds in Your Favor Standards Certification Education & Training Publishing
More informationH1 + HSE FFB Integrated Architecture Demonstration
WHITE PAPER FOUNDATION Fieldbus H1 + HSE FFB Integrated Architecture Demonstration International Specialty Products (ISP) Lima, Ohio Abstract What End Users have asked for The challenge facing industry
More informationStandard CIP Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-1 3. Purpose: Standard CIP-007 requires Responsible Entities to define methods, processes, and procedures for securing
More information10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS
10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND
More informationSecure Access & SWIFT Customer Security Controls Framework
Secure Access & SWIFT Customer Security Controls Framework SWIFT Financial Messaging Services SWIFT is the world s leading provider of secure financial messaging services. Their services are used and trusted
More informationAltius IT Policy Collection Compliance and Standards Matrix
Governance Context and Alignment Policy 4.1 4.4 800-26 164.308 12.4 EDM01 IT Governance Policy 5.1 800-30 12.5 EDM02 Leadership Mergers and Acquisitions Policy A.6.1.1 800-33 EDM03 Context Terms and Definitions
More informationExperion LX Purpose-built DCS. Honeywell Proprietary
Experion LX Purpose-built DCS Honeywell s New DCS Experion LX Purpose- Built On Honeywell s Reliable DCS Platform Delivered Through Authorized Partners Experion LX: Proven Technology Purpose Built DCS
More informationISASecure SSA Certification for DeltaV and DeltaV SIS
ISASecure SSA Certification for DeltaV and DeltaV SIS Frequently Asked Questions This FAQ addresses questions around the scope and relevance of the ISASecure System Security Assurance certification applied
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationPeter Kreutzer, PSSAM/Automation Power World 2011 New Delhi, Secure and reliable Redundant communication network and cyber security
Peter Kreutzer, PSSAM/Automation Power World 2011 New Delhi, 2011-09-20 Secure and reliable Redundant communication network and cyber security Content Reliable Substation communication networks Introduction
More informationCyber security - why and how
Cyber security - why and how Frankfurt, 14 June 2018 ACHEMA Cyber Attack Continuum Prevent, Detect and Respond Pierre Paterni Rockwell Automation, Connected Services EMEA Business Development Manager PUBLIC
More informationSafety Expert Council Day 2 Business Strategy t Review
Safety Expert Council Day 2 Business Strategy t Review ABB Control Technologies October 11, 2012 Slide 1 Product Group Safety Growth Strategy Business Plan Execution Focus Areas October 11, 2012 Slide
More informationMeeting PCI DSS 3.2 Compliance with RiskSense Solutions
Meeting PCI DSS 3.2 Compliance with Solutions Platform the industry s most comprehensive, intelligent platform for managing cyber risk. 2018, Inc. What s Changing with PCI DSS? Summary of PCI Business
More informationPROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY
PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY OUR MISSION Make the digital world a sustainable and trustworthy environment
More informationCyber Security of Industrial Control Systems (ICSs)
Cyber Security of Industrial Control Systems (ICSs) February 23, 2016 Joe Weiss PE, CISM, CRISC, ISA Fellow Managing Partner Applied Control Solutions, LLC (408) 253-7934 joe.weiss@realtimeacs.com Applied
More informationDesigning and Building a Cybersecurity Program
Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (CSF) Larry Wilson lwilson@umassp.edu ISACA Breakfast Meeting January, 2016 Designing & Building a Cybersecurity
More informationA Brief Profile 2017
A Brief Profile 2017 Future Netwings Solutions India s leading ISO 9001:2008 Certified IT Services Organization Over 18 Years experience in IT Infrastructure Design, Build & Support Sales & Support locations
More informationCybersecurity Session IIA Conference 2018
www.pwc.com/me Cybersecurity Session IIA Conference 2018 Wael Fattouh Partner PwC Cybersecurity and Technology Risk PwC 2 There are only two types of companies: Those that have been hacked, and those that
More informationCisco Secure Ops Solution
Brochure Cisco Secure Ops Solution Cisco Secure Ops Solution supports cyber-security risk management and compliance for industrial automation environments. It is a combination of on premise technology,
More informationISA99 - Industrial Automation and Controls Systems Security
ISA99 - Industrial Automation and Controls Systems Security Committee Summary and Activity Update Standards Certification Education & Training Publishing Conferences & Exhibits February 2018 Copyright
More informationCyber Security Technologies
1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales
More informationIntroducing the 9202-ETS MTL Tofino industrial Ethernet security appliance
Introducing the 9202-ETS MTL Tofino industrial Ethernet security appliance HAKIM- Sales Engineer 1 Cybersecurity of valuable assets and processes in a wide range of industry verticals, such as: Oil & Gas
More informationICS Cybersecurity: You Cannot Secure What You Cannot See. David Zahn CMO and General Manager, Cybersecurity Business Unit
ICS Cybersecurity: You Cannot Secure What You Cannot See David Zahn CMO and General Manager, Cybersecurity Business Unit ICS Cybersecurity: You Cannot Secure What You Cannot See Cover Table of Contents
More informationLifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
More informationInformation Security Controls Policy
Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January
More informationIndustry Best Practices for Securing Critical Infrastructure
Industry Best Practices for Securing Critical Infrastructure Cyber Security and Critical Infrastructure AGENDA - Difference between IT and OT - Real World Examples of Cyber Attacks Across the IT/OT Boundary
More informationProfessionalPLUS Station Software Suite
DeltaV Distributed Control System Product Data Sheet February 2018 ProfessionalPLUS Station Software Suite Global database, architected for flexibility and scalability Powerful, graphical engineering capabilities
More informationDEMONSTRATION OF INDEPENDENCE
Version 2 03.12.2015 COMBINED BASIC PROCESS CONTROL SYSTEM (BPCS) AND SAFETY INSTRUMENTED SYSTEM (SIS) This assessment system is based upon both IEC61508 2 nd edition and IEC61511 1 st edition CASS Document
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More informationCybersecurity and Communications Based Train Control
Cybersecurity and Communications Based Train Control RAHEEL QURESHI CYBERSECURITY AUTHORITY URBAN RAIL SIGNALLING (URS) 2016 Thales Canada, Transportation Solutions. All rights reserved. Passing on or
More information