Siemens Research Cyber Security

Similar documents
Protection Levels, Holistic Approach. ISA-99 WG 3 TG 3 Protection Levels

CSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT

Security analysis and assessment of threats in European signalling systems?

Siemens view and approach on critical infrastructure resilience against cyberthreats Joint OECD-JRC Workshop, Paris September 2018

Functional. Safety and. Cyber Security. Pete Brown Safety & Security Officer PI-UK

INDUSTRIAL SECURITY STORMSHIELD PROTECTION FOR OPERATIONAL NETWORKS. Unified Threat Management and Next-Generation Firewalls Solutions

Achilles System Certification (ASC) from GE Digital

Industrial Security - Protecting productivity IEC INDA

CYBERSECURITY IN THE INDUSTRIAL INTERNET OF THINGS

Cyber-Physical Chain (CPChain) Light Paper

How digitalization is shaping the future of mobility

Innovation policy for Industry 4.0

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT

MASP Chapter on Safety and Security

Morgan Stanley Digital Day. London, March

IOT FLAGSHIP PROJECT. Dr. Mario Drobics, AIT

MindSphere meets energy

Charter of Trust on Cybersecurity

Centralized Control System Architecture

MindConnect IoT 2040 Product Sheet

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology

The GenCyber Program. By Chris Ralph

COMPASS FOR THE COMPLIANCE WORLD. Asia Pacific ICS Security Summit 3 December 2013

No Industry 4.0 without Security

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Tradition meets modernity

Why Should You Care About Control System Cybersecurity. Tim Conway ICS.SANS.ORG

System and Practice of Information Security Certification for IT products in China

The Future of Industrial Control Systems Security

Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure

Strategies for a Successful Security and Digital Transformation

Defending Against Unkown Automation is the Key. Rajesh Kumar Juniper Networks

Securing Network Devices with the IEC Standard What You Should Know. Vance Chen Product Manager

Identity-Based Cyber Defense. March 2017

Cyber security of automated vehicles

Towards Trustworthy Internet of Things for Mission-Critical Applications. Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things

The Road to Industry 4.0

Security in a Converging IT/OT World

Securing Digital Transformation

The threat landscape is constantly

Connecting a Laser Level Transmitter to the Cloud

Using Cisco security services for IoT open platform development

Securing Industrial Control Systems in the Age of IoT

Control System Security for Social Infrastructure

HORIZON 2020 WORK PROGRAMME I: INFORMATION AND COMMUNICATION TECHNOLOGIES

Hannover Declaration

Microsoft Finland. Microsoft in Finland is a strong millennial, born ,000+ partners generating 8 $ revenue per each $ by MSFT

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

Real-time Communications Security and SDN

MindConnect Nano Product Sheet

ARTIFICIAL INTELLIGENCE POWERED AUTOMATED THREAT HUNTING AND NETWORK SELF-DEFENSE

National Strategies. Key Domain Primary Direction

Security in Cloud Environments

ENISA EU Threat Landscape

CCNA Cybersecurity Operations 1.1 Scope and Sequence

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

CCNA Cybersecurity Operations. Program Overview

Vectra Cognito. Brochure HIGHLIGHTS. Security analyst in software

Security Standardization and Regulation An Industry Perspective

Platform Economy and Trustworthiness Standardization

Answers for energy. SIPROTEC 5 the new benchmark for protection, automation, and monitoring of transmission grids

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

Protecting productivity with Industrial Security Services

Industrial Security Getting Started

Building an Integrated Security Platform for the Future

IEC A cybersecurity standard approaching the Rail IoT

Managed Endpoint Defense

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

The Factory of the future : Collaboration and Digitalization to deliver smarter packaging solutions Hispack 2018

Security Vendor Line Card

Allot Corporate Presentation

Security for Industry 4.0 Trends -- Challenges -- Opportunities

Dr. Johan Åkerberg, ABB Corporate Research, Sweden, Communication in Industrial Automation

Hitachi s Social Infrastructure Defenses for Safety and Security through Collaborative Creation with Customers

GDPR Update and ENISA guidelines

Breaking the Blockchain: Real-World Use Cases, Opportunities and Challenges

Introduction Privacy, Security and Risk Management. What Healthcare Organizations Need to Know

The Perfect Storm Cyber RDT&E

Security: The Key to Affordable Unmanned Aircraft Systems

Build a Software-Defined Network to Defend your Business

IoT Security Policy and Regulation Initiatives in China. Fan Dongyang, Huawei

How Industrial Communication paves the way to Digitalization and what benefits coming along with it

Cyber Defense Operations Center

Industrial Security - Protecting productivity. Industrial Security in Pharmaanlagen

2 nd Year. Module Basket of Courses Duration Credit Offered Status. 12 Weeks 4 NPTEL Programming in Java

The Cognito automated threat detection and response platform

National Cybersecurity Challenges and NIST. Matthew Scholl Chief Computer Security Division

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

IoT Market: Three Classes of Devices

The SPARKS Project Motivation, Objectives and Results

CyberFence Protection for DNP3

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

Who s Protecting Your Keys? August 2018

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

New Partners Join Charter of Trust to Protect Critical Infrastructure

falanx Cyber ISO 27001: How and why your organisation should get certified

Transcription:

Siemens Research Cyber Security Rainer Falk, Uwe Blöcher November 26 th, 2018 Siemens Corporate Technology

Cyber Security is the most important enabler for Digitalization Design & Engineering Automation & Operation Maintenance & Utilization Siemens Software Siemens Digital Services MindSphere The cloud-based, open IoT operating system Platform as a Service Enabler: Infrastructure as a Service (storage, processing power, provider agnostic) Digitally enhanced Electrification and Automation Page 2 Holistic IT security concept

The challenges to Cyber Security require new approaches to technologies Digitalization Increasingly connected Industrial Control Systems offer new levels of efficiency and productivity However: Connected critical Infrastructures offer new possibilities to attack Business Units What Cyber Security technology to use for my future products/solutions? Is there technology to secure my existing installations? How can I securely use and connect to the cloud for digital services? How do I scale my effort for CyberSecurity? What is the technology to generate security business? Standards and regulations e.g. IEC 62443 Security Levels SL1 SL2 SL3 SL4 Protection against casual or coincidental violation Protection against intentional violation using simple means, low resources, generic skills, low motivation Protection against intentional violation using sophisticated means, moderate resources, ICS specific skills, moderate motivation Protection against intentional violation using sophisticated means, extended resources, ICS specific skills, high motivation Need for Cyber Security Technologies ICS: Industrial Control System IEC: International Electrotechnical Commission Page 3

Cyber Security at Siemens builds on innovation during production and testing along lifecycle and for databased business models during operation and service IoT Public Key Infrastructure Penetration Test Automation Access Management for public clouds Secure data connectors Security Analytics Platform Artificial Intelligence for Security DCU SiESTA Small footprint IoT Cryptography Zero touch security Automatic response - Malware containment Industrial firewall deep packet inspection Page 4

Cyber Security at Siemens builds on innovation during production and testing along lifecycle and for databased business models during operation and service IoT Public Key Infrastructure Penetration Test Automation Access Management for public clouds Secure data connectors Security Analytics Platform Artificial Intelligence for Security DCU SiESTA Small footprint IoT Cryptography Zero touch security Automatic response - Malware containment Industrial firewall deep packet inspection Page 5

Secure Data Connector DCU Protecting our installed base and enabling cloud connectivity Secure Data Connector Challenge Legacy systems were designed and built as isolated from other networks (for security reasons) Digitalization will get everything connected, incl. legacy systems Availability Released in 2018 OPC-UA support, IEC 62443-4-2 SL3 Business Benefit/USPs Cost-effective (compared to competitor diode solutions) Safety certification: No inferences of critical safety networks Safe, secure and easy enabling cloud connect (MindSphere) Technical Solution HW design to guarantee one-way data connection only 100% resistant against a break into a protected network Maintains safety and integrity for all connectivity scenarios Edge computing enabled for 3 rd party applications Joint development by Mobility and Corporate Technology https://www.siemens.com/dcu DCU: Data Capture Unit OPC-UA: Open Platform Communications Unified Architecture IEC: International Electrotechnical Commission Page 6

DCU enables business to address opportunities of digitalization with their existing infrastructures Businesses need to address digitalization Existing infrastructures are not ready for digitalization approaches DCU enables new digital business models through secure connectivity DCU provides unidirectional connectivity enabling Connectivity via DCU ensures freedom of interference DCU is accredited and thus applicable for retrofits MindConnect DCU Page 7

CCT Cyber Security Radar long term research topics Self-Securing Systems Design Security Validation on Digital Twin NextGen Patching Security for Cooperative Autonomous Systems Post Quantum Crypto Homomorphic Encryption Automated Forensics and Malware Analysis Secure Cloud based Realtime Control Supply Chain Security Page 8