Charter of Trust. on Cybersecurity. charter-of-trust.com #Charter of Trust

Similar documents
Charter of Trust on Cybersecurity

Siemens view and approach on critical infrastructure resilience against cyberthreats Joint OECD-JRC Workshop, Paris September 2018

New Partners Join Charter of Trust to Protect Critical Infrastructure

SECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust

The UK s National Cyber Security Strategy

Back to the Future Cyber Security

Unlock the potential Digitalize your building and plant infrastructure Hannover Fair Hannover, April 2018

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations

Written Statement of. Timothy J. Scott Chief Security Officer The Dow Chemical Company

Innovation policy for Industry 4.0

IEC A cybersecurity standard approaching the Rail IoT

Implementing security has never been easier. Infineon Security Partner Network.

Continuous protection to reduce risk and maintain production availability

Plant Security Services Protecting productivity in the digital era October

2 The IBM Data Governance Unified Process

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE

Accelerate Your Enterprise Private Cloud Initiative

Cybersecurity. Securely enabling transformation and change

Agile and 360 Digital: Path to the Future of Energy. Michael Carlson

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

Cyber Security and Cyber Fraud

Angela McKay Director, Government Security Policy and Strategy Microsoft

ENISA EU Threat Landscape

Software & Supply Chain Assurance: Enabling Enterprise Resilience through Security Automation, Software Assurance and Supply Chain Risk Management

REPUBLIC OF KENYA MINISTRY OF INFORMATION, COMMUNICATIONS AND TECHNOLOGY

Overview of PBI-blockchain cooperation technology

Smart thinking, clever working

Protecting productivity with Industrial Security Services

BRING EXPERT TRAINING TO YOUR WORKPLACE.

Securing Your Digital Transformation

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Building a Threat Intelligence Program

Industrial Security Co-Sourcing: Shifting from CapEx to OpEx Presented by Vinicius Strey Manufacturing in America 03/22-23/2017

Commonwealth Cyber Declaration

Simple and Secure Micro-Segmentation for Internet of Things (IoT)

The State of Cybersecurity and Digital Trust 2016

Research Institute in Secure Hardware & Embedded Systems (RISE) Professor Máire O Neill

Strengthen your network security with Industrial Security Appliances SCALANCE S siemens.com/scalance-s

Conquering Complexity: Addressing Security Challenges of the Connected Vehicle

Security in India: Enabling a New Connected Era

Israel and ICS Cyber Security

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Itu regional workshop

Cyber Security for Process Control Systems ABB's view

Position Title: IT Security Specialist

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

Disaster Management and Security Solutions to Usher in the IoT Era

Grid BT. The evolution toward grid services. EU Grid event, Brussels May Piet Bel Grid Action Team

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

Cyber Security Program

First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh.

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

align security instill confidence

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

SMART. Investing in urban innovation

Verizon announces CEO succession plan

Package of initiatives on Cybersecurity

Cyber Security Issues and Responses. Andrew Rogoyski Head of Cyber Security Services CGI UK

Control Systems Cyber Security Awareness

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

CHAIR S SUMMARY: G7 ENERGY MINISTERS MEETING

Executive Insights. Protecting data, securing systems

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

Cisco Start. IT solutions designed to propel your business

Future-Proof Security & Privacy in IoT

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014

KISH REMARKS APEC CBPR NOV 1 CYBER CONFERENCE KEIO Page 1 of 5 Revised 11/10/2016

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Provisional Translation

Clarity on Cyber Security. Media conference 29 May 2018

BEST PRACTICE GUIDELINES ON POLICY AND REGULATORY INCENTIVE FOR AFFORDABLE ACCESS TO DIGITAL SERVICES

Strategy for information security in Sweden

PEOPLE INNOVATION CAPITAL INFRASTRUCTURE AGILITY. New Brunswick Growth Opportunity. Cybersecurity

DAPhNE Danube Ports Network Motivation & Project Status Q4 / 2018

Security

Hitachi s Social Infrastructure Defenses for Safety and Security through Collaborative Creation with Customers

ENDPOINT SECURITY STORMSHIELD PROTECTION FOR WORKSTATIONS. Protection for workstations, servers, and terminal devices

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

Cybersecurity & Digital Privacy in the Energy sector

Intelligent Buildings and Cybersecurity

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

Infrastructure PA Stephen Lecce

Cyber Security in Europe

Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure

The Information Age has brought enormous

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

Mapping to the National Broadband Plan

ANATOMY OF AN ATTACK!

ICS Security Innovation Asia Pacific ICS Security Summit. Singapore 2013

THE ACCENTURE CYBER DEFENSE SOLUTION

NETWORK SECURITY STORMSHIELD. Unified Threat Management Solutions and Next- Generation Firewalls

Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank

2017 Company Profile

Transcription:

Charter of Trust on Cybersecurity charter-of-trust.com #Charter of Trust

Digitalization creates opportunities and risks Page 2

Digitalization creates Opportunities Billions of devices are being connected by the Internet of Things, and are the backbone of our infrastructure and economy Connected Systems Connected Facilities/Plant/Site Billion of Devices 50.1B (2020) 34.8B (2018) Connected Products 0.5B (2003) IoT Inception (2009) 22.9B (2016) 42.1B (2019) 14.2B (2014) 8.7B (2012) 28.4B (2017) 18.2B (2015) 11.2B (2013) 1988 1992 1996 2000 2004 2008 2012 2016 2020 and risks Exposure to malicious cyber attacks is also growing dramatically, putting our lives and the stability of our society at risk AT&T Hack Morris Worm Melissa Worm ILOVEYOU Blue Boxing AOHell Cryptovirology Denial-of-service attacks Level Seven Crew hack Heartbleed Industroyer/Chrashoverride Stuxnet WannaCry Cloudbleed sl1nk SCADA hacks Meltdown/Spectre NotPetya Infineon/TPM Page 3

And it s common truth We can t expect people to actively support the digital transformation if we cannot TRUST in the security of data and networked systems. Page 4

That s why together with strong partners we have signed a Charter of Trust aiming at three important objectives 1. Protect the data of individuals and companies 2. Prevent damage to people, companies and infrastructures 3. Create a reliable foundation on which confidence in a networked, digital world can take root and grow Page 5

And we came up with ten key principles 01 Ownership of cyber and IT security 06 Education 02 Responsibility throughout the digital supply chain 07 Certification for critical infrastructure and solutions 03 Security by default 04 User-centricity 08 Transparency and response 09 Regulatory framework 05 Innovation and co-creation 10 Joint initiatives Page 6

01 And we bring them to life as Principle 1 Ownership of cyber and IT security Our Siemens approach for a new Cybersecurity organization Our Vision Our Holistic approach For our society, customers and Siemens, we are the trusted partner in the digital world by providing industry leading cybersecurity Together we make cybersecurity real because it matters Protection of our IT and OT Infrastructure Protection of our products, solutions and services Enable cyber solutions for our business Concrete implementation steps at Siemens In January 2018 we established a new Cybersecurity unit headed by Natalia Oropeza, our new Chief Cybersecurity Officer (CCSO). In this function, she reports directly to the Managing Board of Siemens AG. With this new position we re fulfilling one of our requirements in the Charter of Trust. Cybersecurity is more than a challenge. It s a huge opportunity. By setting standards with a dedicated and global team to make the digital world more secure, we are investing in the world's most valuable resource: TRUST. Our concrete answers to today s upcoming Cybersecurity issues and our proposals for more advanced Cybersecurity rules and standards are invaluable to our partners, stakeholders and societies around the world. That is what we call ingenuity at work. Natalia Oropeza, Chief Cybersecurity Officer, Siemens AG Page 7

02 And we bring them to life as Principle 2 Responsibility throughout the digital supply chain The Siemens security concept defense-in-depth Concrete implementation steps at Siemens Siemens provides a multi-layer concept that gives plants both all-round and in-depth protection Know-how and copy protection Authentication and user management Firewall and VPN (Virtual Privat Network) System hardening and continuous monitoring Concrete implementation steps with the CoT partners With our partners, we are defining a list of minimum security requirements for all players in the supply chain, and effective mechanisms that can support their implementation Page 8

Nevertheless We can t do it alone. It's high time we act together with strong partners who are leaders in their markets. Joe Kaeser Initiator of the Charter of Trust Page 9

charter-of-trust.com Together we strongly believe Effective cybersecurity is a precondition for an open, fair and successful digital future By adhering to and promoting our principles, we are creating a foundation of trust for all As a credible and reliable voice, we collaborate with key stakeholders to achieve trust in cybersecurity for global citizens. Page 10

Be part of a network that does not only sign, but collaborates on Cybersecurity! Let us be your trusted partners for cybersecurity and digitalization Together we will improve our technology, people and processes Join us by following our principles and making the digital world more secure Page 11

If you have questions on our Charter of Trust on Cybersecurity please contact us Chief Cybersecurity Officer (CCSO) of Siemens AG Natalia Gutierrez Oropeza natalia.oropeza@siemens.com Charter of Trust initiative Eva Schulz-Kamm eva.schulz-kamm@siemens.com Global coordinator of the Charter of Trust initiative Kai Hermsen kai.hermsen@siemens.com Contact on CoT communications Johannes von Karczewski johannes.karczewski@siemens.com Page 12