INDUSTRIAL CYBER SECURITY E INDUSTRIE4.0: OT DALLA FABBRICA CABLATA AI SISTEMI IN CLOUD

Similar documents
Nuove Soluzioni Intelligenti OT per la Protezione dei Network Industriali

SCADA and Smart Grid Security Tests

High performance monitoring & Control ACE3600 Remote Terminal Unit

Network Architectural Design for Cybersecurity in a Virtual World

Smart Manufacturing Enterprise

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

PROFINET The leading communication system

POWER-ONE ITALY, 5 TH JUNE 2018 Cloud, Big Data & Cyber Security. Business, Opportunities and Risks

Cyber Security for Renewable Energy Systems

Skybox Security Vulnerability Management Survey 2012

SGS CYBER SECURITY GROWTH OPPORTUNITIES

User-to-Data-Center Access Control Using TrustSec Design Guide

Solution Overview Cisco Tetration Analytics and AlgoSec: Business Application Connectivity Visibility, Policy Enforcement, and Business-Based Risk and

Is Your Compliance Strategy Putting Your Business at Risk?

Indegy. Industrial Cyber Security. The Anatomy of an Industrial Cyber Attack

The Problem with Privileged Users

GE Enterprise Solutions. Digital Energy

Cyber Risk and Networked Medical Devices

Best Practices to Modernize and Simplify SCADA Systems

Addressing Cyber Threats in Power Generation and Distribution

ARTO LIND ABB Ability Datacenter Automation. The way to monitor & control your DC infrastructure (DCIM) Datacenter Infrastructure Management

Indegy. Industrial Cyber Security. Matt Petrauskas Regional Director.

Ensuring Your Plant is Secure Tim Johnson, Cyber Security Consultant

Expand Synchrophasor Capabilities With the Substation Phasor Data Concentrator

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network

Introducing the 9202-ETS MTL Tofino industrial Ethernet security appliance

S3C Smart Consumer, Smart Customer, Smart Citizen : The Digital 3C Transformation

Digital Substation Unrestricted Siemens AG 2017 siemens.com/digital-substation

Beyond the F.U.D. How to start securing your DCS network today.

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure

The Industrial Internet of Things

Indegy. Industrial Cyber Security. ISA New Orleans Section. Applying the NIST Framework February 6, 2018

Thrive in today's digital economy

Thrive in today's digital economy

ICS/SCADA Cybersecurity and IT Cybersecurity: Comparing Apples and Oranges

Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Industrial Controls. Motor management and control devices SIMOCODE pro - Application examples. Introduction 1. Application example

ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT

IIoT cyber security simulation

Chris Peters 26 September 2017 EXPERION UNIT OPERATIONS SUITE INTRODUCTION AND ROAD MAP

Lawrence Youngblood, Vice President of Corporate Development. Monitoring Remote Operations with Rational SCADA

Disruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Why the Threat of Downtime Should Be Keeping You Up at Night

MarketsandMarkets. Publisher Sample

THE OPEN & SHUT CASE FOR ENHANCING SECURITY IN HAZARDOUS AREAS SECURITY IN HAZARDOUS AREAS. By Doug Woodbridge PRODUCT PHOTO

MarketsandMarkets. Publisher Sample

OSIsoft PI System Usage For Academia

IEEE PES Initiatives and Industry Role in Standards

April 2010 Power Systems division A brief introduction. ABB Group August 25, 2011 Slide 1

solar

SECURING AN INTEGRATED SCADA SYSTEM WHITEPAPER

Iowa State University

ICS VENDOR. Friend or Foe

Let Energy Monitoring Solutions Do the Heavy Lifting

STANDARD ELECTRIC UNIVERSITY

SCADA System Specification. Vantage Pipeline Project # May 2013

SurvalentONE Distribution Management System

Securely Deliver Remote Monitoring and Service to Critical Systems. A White Paper from the Experts in Business-Critical Continuity TM

Unlock the potential Digitalize your building and plant infrastructure Hannover Fair Hannover, April 2018

SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Digital Wind Cyber Security from GE Renewable Energy

APRIL 2018 ABB Division Fact Sheets

Securing Industrial Control Systems

For more information. Go to Settings > About phone > Legal information to read the legal information.

Industrial control system (ICS) security

PJM Interconnection Smart Grid Investment Grant Update

Managing the Journey Through the Clouds

Cyber Diligence. EY Deals Forum Ian McCaw EY Transaction Advisory Services

DefendX Software Control-Audit

How can I use ISA/IEC (Formally ISA 99) to minimize risk? Standards Certification Education & Training Publishing Conferences & Exhibits

Rugged communications for the digital substation usa.siemens.com/ruggedcom

PJM Interconnection Smart Grid Investment Grant Update

How Security Policy Orchestration Extends to Hybrid Cloud Platforms

North American SynchroPhasor Initiative (NASPI) Overview

Company Profile 2017

HIPAA Regulatory Compliance

Open Security Controller - Security Orchestration for OpenStack

VIRTUALIZATION IN INDUSTRIAL PLANTS

Presenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks.

Using Defense in Depth to Safely Present SCADA Data for Read-Only and Corporate Reporting. Rick Bryson

INDUSTRIAL NETWORK RESILIENCE. Davide Crispino Salvatore Brandonisio

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

New concept in automation: epac. November 2015

DefendX Software QFS Installation Requirements

Automation Services and Solutions

DATA CENTER IT/OT SECURITY FOR DATA CENTERS FOXGUARD SOLUTIONS 2285 PROSPECT DRIVE CHRISTIANSBURG, VA FOXGUARDSOLUTIONS.COM

Remote networks. Easy remote access to machines and plants. Industrial Remote Communication. Edition 03/2017. Brochure. siemens.com/remote-networks

TRENDS IN ACCELERATING PERFORMANCE IMPROVEMENTS

Table of Contents. Page 1 of 6 (Last updated 27 April 2017)

Industrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets

Information Security in Corporation

Fax: +30 (210) Tel Fax

Network Configuration Document Selection for New Substations Framework

ISO/IEC INTERNATIONAL STANDARD

SEL Real-Time Automation Controller (RTAC)

Transcription:

INDUSTRIAL CYBER SECURITY E INDUSTRIE4.0: OT DALLA FABBRICA CABLATA AI SISTEMI IN CLOUD Enzo M. Tieghi etieghi@servitecno.it ServiTecno www.servitecno.it

TECNOLOGIA + CONNECTIVITA = EFFICIENZA E VALORE Siamo pronti per questa iper-connessione?

I IT WHAT S THE BIG DIFFERENCE? OT O

IT Security = al sicuro i dati OT Security = proteggiamo critical assets RISCHIO e SAFETY Persone Ambiente Assets/Impianti UPTIME Qualità e Performance

IL CONTESTO E UNA SFIDA DIFFICILE ASPETTATIVE: produrre sempre 24x7 Vulnerabilità e Minacce non facilmente identificabili, e non vengono solo dai Sistemi Non si può sempre controllare l ambiente ed il contesto Impatti: Qualsiasi singolo incidente può essere un intoppo per l intero impianto e la produzione

La soluzione ideale di Cyber Security Industriale? Proteggere i CONTROL SYSTEMS per proteggere i CRITICAL ASSETS RESULT Protect critical assets without disruption INSPECT communications and commands ENFORCE policy for all processes PROTECT control systems and assets

INTERCONNECTIVITY RISK 7

Oil & Gas Manufacturing Healthcare Clinical Food & Beverage Chemical Power 8

Oil & Gas Food & Beverage Manufacturing Power Healthcare Clinical Chemical Enterprise Services Business Units Real Time Service Bus Outage Mgmnt Internet IT Priorities 1. Confidentiality 2. Integrity 3. Availability Technicians Vendors Real Time Service Bus Header Box IT Next Gen Firewall Internet Data Center Security Ops Center 9

Oil & Gas Food & Beverage Manufacturing Power Healthcare Clinical Chemical Enterprise Services Business Units Real Time Service Bus Outage Mgmnt Internet IT Priorities 1. Confidentiality 2. Integrity 3. Availability Loop Loop SCADA Data Core OT Priorities 1. Availability 2. Integrity 3. Confidentiality Technicians Vendors Real Time Service Bus Header Box IT Next Gen Firewall Internet Loop IT Next Gen Firewall PLC Data Center Security Ops Center Wind Control Microwave Engineering Work Stations Synchro- Phasor Microwave Protection Relay Modem Controller Controller Modem Network #1 Substation Network #2 Protection Network Controller OEM Pump Back Door 3 rd Party To: Business Enterprise Services 10

LEGEND Manufacturing Healthcare Clinical Oil & Gas IT Data Internet [ Identified OT Command] Unidentified OT Command Suspicious OT Command Chemical Food & Beverage Business Units Power Enterprise Services Real Time Service Bus SCADA Outage Mgmnt Yaw CCW Technicians Vendors IT Next Gen Firewall Real Time Service Bus Internet Loop Loop IT Next Gen Firewall Header Box Automatic Data Center Data Core Loop PLC Engineering Work Stations Wind Control Security Ops Center Microwave Controller Modem Brake Substation Modem Network #2 Protection Network Local Control Controller Status Pump OEM Protection Relay Network #1 Controller Microwave SynchroPhasor Acknowledge / Clear Back Door 3rd Party To: Business Enterprise Services 11

ATTACK SURFACE IT Proteggere i dati OT Proteggere critical assets Enterprise Network DMZ Primary control center SCADA Network Remote stations Internet DCS Local production

PLUG IT IN TODAY. SLEEP WELL TONIGHT. Wow, I didn t realize that all these things were talking on the network. Why is CRM3 constantly pinging S1? Scott, Technician Activating the white list is going to give them a lot more security. David, 3rd party Auditor We can t believe how painless that was. VP Engineering What are all those IP addresses and what are they doing on my network? Lead IEC Engineer Can you quote us 20 more sites? David, 3rd party Auditor

WURLDTECH ACHILLES TEST Achilles Test Platform Monitor key operating parameters Network parameters Operational parameters Characterize device faults Drive repeatable results Achilles Test Software Has capabilities similar to ATP Enables easy provisioning to developers via VMs Enables testing earlier in the product life cycle for time and money savings Page 14

OPERATIONS AND PRODUCTION. SECURED. Wurldtech Security Technologies Inc. reserves the right to make changes in specifications and features, or discontinue the product or service described at any time, without notice or obligation. These materials do not constitute a representation, warranty or documentation regarding the product or service featured. Illustrations are provided for informational purposes, and your configuration may differ. This information does not constitute legal, financial, coding, or regulatory advice in connection with your use of the product or service. Please consult your professional advisors for any such advice. Wurldtech is a trademark of General Electric Company. Other trademarks and logos are the property of their respective owners. Copyright 2016 Wurldtech Security Technologies Inc. All rights reserved.

Enzo M. Tieghi etieghi@servitecno.it ServiTecno www.servitecno.it