Security of CyberPhysical systems, setting the scene. Are you ready for Cyber Security?

Similar documents
Click to edit Master title style. DIY vs. Managed SIEM

Les joies et les peines de la transformation numérique

Predstavenie štandardu ISO/IEC 27005

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT

Suma Soft s IT Risk & Security Management Solutions for Global Enterprises

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

SECURING YOUR ASSETS / company_presentation_en_v1.00 / RG-C0

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson

Application for Certification

Your Trusted Partner in Europe European Business Reliance Centre

TAN Jenny Partner PwC Singapore

POSITION DESCRIPTION

Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure

CISA Training.

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

Position Description IT Auditor

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

Management Update: Information Security Risk Best Practices

BHConsulting. Your trusted cybersecurity partner

Securing the cloud ISACA Korea. Han Ther, Lee CISA, CISM, CISSP, CRISC, ITILF, MCSA

Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS

PROFILE FRANCIS KAITANO. Francis Kaitano is a strategic, innovative, delivery focused Cyber Security professional.

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

Cymsoft Information Technologies

Business Context: Key for Successful Risk Management

Security Operations & Analytics Services

Training + Information Sharing: Pillars of enhancing cybersecurity posture

Helping you understand the impact of GDPR.

Certified Information Security Manager (CISM) Course Overview

CERT Development EFFECTIVE RESPONSE

Global Security Consulting Services, compliancy and risk asessment services

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World

Addressing Cyber Threats in Power Generation and Distribution

Ingram Micro Cyber Security Portfolio

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

Assessments Audits CERTIFICATION

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

REQUEST FOR EXPRESSIONS OF INTEREST

Sense of Security. Compliance, Protection and Business Confidence

Cybersecurity The Evolving Landscape

BHConsulting. Your trusted cybersecurity partner

ISACA Arizona May 2016 Chapter Meeting

Fintech District. The First Testing Cyber Security Platform. In collaboration with CISCO. Cloud or On Premise Platform

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

DUNS CAGE 5T5C3

Cyber Resilience. Think18. Felicity March IBM Corporation

Innovation policy for Industry 4.0

CYBER SECURITY TRAINING

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

Cybersecurity Panel: Cutting through Cybersecurity Hype with Practical Tips to Protect your Bank

Background FAST FACTS

Establishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security

NATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA (NITA-U) REGIONAL COMMUNICATIONS INFRASTRUCTURE PROGRAM (RCIP) INFORMATION SECURITY SPECIALIST

CESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK

Cyber Review Sample report

Career Paths In Cybersecurity

DFARS Compliance. SLAIT Consulting SECURITY SERVICES. Mike D Arezzo Director of Security Services. SLAITCONSULTING.com

Annexure 08 (Profile of the Project Team)

แนวทางการพ ฒนา Information Security Professional ในประเทศไทย

An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist

LESSONS LEARNED IN SMART GRID CYBER SECURITY

KEDAYAM A KAAPAGAM MANAGED SECURITY SERVICES. Kaapagam Technologies Sdn. Bhd. ( T)

Cyber Security Stress Test SUMMARY REPORT

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services

Cyber Security of Industrial Control Systems (ICSs)

Security by Default: Enabling Transformation Through Cyber Resilience

CYBER SECURITY AIR TRANSPORT IT SUMMIT

CIT 480: Securing Computer Systems. Putting It All Together

Cybersecurity Overview

Wolfpack Cyber Academy Training Catalogue

Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices

POSITION DESCRIPTION

Cyber Security Incident Response Fighting Fire with Fire

Certified Cyber Security Specialist

EU Cloud Computing Policy. Luis C. Busquets Pérez 26 September 2017

Hacker Academy UK. Black Suits, White Hats!

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

Industrial Security Co-Sourcing: Shifting from CapEx to OpEx Presented by Vinicius Strey Manufacturing in America 03/22-23/2017

Department of Management Services REQUEST FOR INFORMATION

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements

Job Specification & Recruiting Profile of Vacancy

Cybersecurity Auditing in an Unsecure World

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL

ROI for Your Enterprise Through ISACA A global IS association helping members achieve organisational success.

Annexure I: Contact Details:

Industrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets

DXC Security Training

Cybersecurity Employment SecureNinja

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

K12 Cybersecurity Roadmap

Security Challenges in Smart Distribution

Presentation to the ITU on the Q-CERT Incident Management Team. Ian M Dowdeswell Incident Manager, Q-CERT

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

Transcription:

Security of CyberPhysical systems, setting the scene Are you ready for Cyber Security?

Our Future

Our future G A F A

Our future

Hierarchy of needs

Hierarchy of needs

Society s dependence on IT Belangrijke maatschappelijke processen vallen stil als de bijbehorende ICT-systemen en analoge alternatieven niet beschikbaar zijn. Referentie: Cybersecuritybeeld Nederland 2015 CSBN 2015, Nationaal Cyber Security Centrum, 2015

Siemens Nederland N.V. Building Technologies Division Johan de Wit MSSM Solution Manager Enterprise Security Prinses Beatrixlaan 800, Den Haag Postbus 16068 2500 BB Den Haag, Nederland Mobiel: +31 6 55 76 60 29 johan.de.wit@siemens.com Johan de Wit PhD Candidate / Researcher Safety and Security Science Group j.j.dewit@tudelft.nl M +31 (0)6 55 76 60 29 Building 31 Jaffalaan 5 2628 BX Delft The Netherlands Faculty of Technology, Policy and Management

Digitalisering Fysieke wereld Siemens heeft 350.000 systemen geïnstalleerd Internet of Things Virtuele wereld Inzichten uit gemiddeld ruim 20 TB aan operationele data per maand 0101001010010110010101101101011001010 101101011001010 Autonoom foutenherstel CAx 10110010101101101011001010 Verkeersmanagement 010010110010101101101011001010 MES Analytics 11001010 Beeldvormende software 01010010110010101101101011001010 10101101101011001010 Fleet management Smart grids 0101010010100101 Elektronische tolwegen Digitale Fabriek 01101101011001010 Beeldbegeleide behandeling 01101011001010 Metergegevensmanagement 0101001010010110101000 Samenwerking in de cloud PLM 101011001010 Embedded software 010100101001011001010110 Efficiënte gebouwen 01101011001010 0101001010010110010101101101011001 Besluitondersteuning 010110010101101101011001010 Neurale netwerken

Awareness, key risks for organisations Referentie: Global CEO Survey, PWC, 2016

Awareness Referentie: Aandacht voor Business Continuity, Siemens 2017

Global Conference on CyberSpace GCCS 2015 Industrial Control Systems (ICS) and (office ) IT have historically been managed by seperate organisational units. Referentie: TNO for GCCS 2015, Cyber Security of Industrial Control Systems, 2015

Global Conference on CyberSpace GCCS 2015 ICS people do not consider their ICS to be IT. ICS People lack cyber security education. The IT department, on the other hand, is unfamiliar with the peculiarities and limitations of ICS technology. Referentie: TNO for GCCS 2015, Cyber Security of Industrial Control Systems, 2015

Protection Referentie: Aandacht voor Business Continuity, Siemens 2017

Siemens Corporate Technologies IT Security/CERT Qualification Experience Over 150 IT Security experts (all with academic degrees, 33% PhD) Certified capabilities e.g., CISSP, CISA, CISM, ISO 27x Lead Auditor, ISACA, EuroPriSe Key positions/senior staff with extensive business unit background Trend scouting at conferences and communities (e.g. SANS, BlackHat, OWASP) National, EU and international research projects and cooperation with international universities Running Siemens CERT since 1997, top-class security experts in incident handling, malware analysis and IT forensics Long-term experience in IT Security consulting and solution development for products across all Siemens sectors Over 1000 assessments of applications, products, and solutions Standardization driver e.g. anti-counterfeiting & security protocols; including ISO/IEC/IEEE Partner Service delivery through local teams in Germany, China, and the US with German, US, and Chinese security clearances Extensive knowledge of Siemens domains and products

Offering of Siemens Corporate Technologies IT Security/CERT We enable our customers to meet compliance requirements and standards. We build products and solutions to meet the security needs. We offer: Secure Communications and Applications Embedded Security Anchors Security Robustness Security Standardization (e.g. Protocols, Interfaces) We offer: Process Improvements Qualification and Training, Coaching Technical Guidelines (e.g. Hardening, Coding) Self-Assessments \ We integrate building blocks based on the requirements and architecture. We offer: Security Requirements Security Architecture Security Engineering We assess the current security level utilizing penetration tests and security guidance checks. We offer: Penetration Tests and Attestation Threat and Risk Analysis Security Test Tools Compliance Readiness Assessment (e.g. ISO2700x, IEC62443) We respond immediately with our incident and vulnerability management. We offer: Patch Management Threat Intelligence SIEM and Cyber Defense Intrusion Detection and Forensics

Vision 2020 E-A-D a complete system With our positioning along the electrification value chain, we have know-how that extends from power generation to power transmission, from power distribution and smart grids to the efficient application of electrical energy. With our outstanding strengths in automation, we re well equipped for the future and the age of digitalization.

Hartelijk bedankt voor uw aandacht! 30 years of IT-Security @ Siemens John Johan Doe de Wit Job Solution title Manager Group Enterprise / Region Security / Department XY Street Siemens 123 Building Technologies 12345 City Phone: +31 (70) 333 12 36 Phone: Mobile: +49 +31 123 (6) 55 45 76 67 60 89 29 Fax: +49 123 45 67 89 Mobile: E-mail: +49 123 45 67 89 0 johan.de.wit@siemens.com E-mail: john.doe@siemens.com www.siemens.nl/bcmonderzoek