Introducing the 9202-ETS MTL Tofino industrial Ethernet security appliance

Similar documents
Presenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks.

Securing Industrial Control Systems

Securing Industrial Control Systems in the Age of IoT

Using ANSI/ISA-99 Standards to Improve Control System Security

Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS

An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist

Functional. Safety and. Cyber Security. Pete Brown Safety & Security Officer PI-UK

Practical SCADA Cyber Security Lifecycle Steps

IC32E - Pre-Instructional Survey

Cisco ASA 5500 Series IPS Edition for the Enterprise

Continuous protection to reduce risk and maintain production availability

Mission Critical Industrial Ethernet Network Design Seminar

COMPUTER SECURITY DESIGN METHODOLOGY FOR NUCLEAR FACILITY & PHYSICAL PROTECTION SYSTEMS

ANATOMY OF AN ATTACK!

Just How Vulnerable is Your Safety System?

Cyber Security for Process Control Systems ABB's view

ABB Ability Cyber Security Services Protection against cyber threats takes ability

SANS SCADA and Process Control Europe Rome 2011

Cybersecurity Training

Copyright ECSC Group plc 2017 ECSC - UNRESTRICTED

ABB Process Automation, September 2014

LESSONS LEARNED IN SMART GRID CYBER SECURITY

Protecting productivity with Industrial Security Services

Building Intrinsically Secure Control and Safety Systems

The Information Age has brought enormous

Industrial Defender ASM. for Automation Systems Management

Industrial Security - Protecting productivity. Industrial Security in Pharmaanlagen

Cisco Cyber Range. Paul Qiu Senior Solutions Architect June 2016

In the wrong hands it s an open invitation

Safdar Akhtar, Cyber Director Sema Tutucu, Ops Leader 27 September CYBER SECURITY PROGRAM: Policies to Controls

Cybersecurity for IoT to Nuclear

ISA99 - Industrial Automation and Controls Systems Security

INDUSTRIAL NETWORK RESILIENCE. Davide Crispino Salvatore Brandonisio

How can I use ISA/IEC (Formally ISA 99) to minimize risk? Standards Certification Education & Training Publishing Conferences & Exhibits

Chris Peters 26 September 2017 EXPERION UNIT OPERATIONS SUITE INTRODUCTION AND ROAD MAP

Vulnerabilities in Process Control Networks: What Are We Protecting Against?

Securing Network Devices with the IEC Standard What You Should Know. Vance Chen Product Manager

Alternatives to Patching for more Secure and Reliable Control Systems

Use Case: Data Diode Cybersecurity Implementation Protects Water Utility OT Network

Cyber Risk in the Marine Transportation System

IE156: ICS410: ICS/SCADA Security Essentials

Process System Security. Process System Security

Industrial Security Co-Sourcing: Shifting from CapEx to OpEx Presented by Vinicius Strey Manufacturing in America 03/22-23/2017

WHITE PAPER. Vericlave The Kemuri Water Company Hack

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

AT&T Endpoint Security

Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management

Port Facility Cyber Security

DEFENCE IN DEPTH HOW ANTIVIRUS, TRADITIONAL FIREWALLS, AND DNS FIREWALLS WORK TOGETHER

The Eight Components of a Strong Cyber Security Defense System

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

ICS Security. Trends, Issues, and New Standards. Speaker: David Mattes CTO, Asguard Networks

ARC VIEW. Honeywell s New PLC Brings Digital Transformation to the ControlEdge. Keywords. Summary. The Edge and IIoT.

STANDARD ELECTRIC UNIVERSITY

Addressing Cyber Threats in Power Generation and Distribution

PROCESS SAFETY from POINT A to POINT Zed

CYBER SECURITY AWARENESS IN THE MARITIME INDUSTRY

ARC VIEW. Critical Industries Need Active Defense and Intelligence-driven Cybersecurity. Keywords. Summary. By Sid Snitkin

Who Goes There? Access Control in Water/Wastewater Siemens AG All Rights Reserved. siemens.com/ruggedcom

Wireless Ethernet: Technologies and Security for the Water Industries

M-series MQ Controller

CA Host-Based Intrusion Prevention System r8

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

How Can I Reduce Vulnerability to Cyber Attacks? V2.2

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

What We Can Learn from Other s Cybersecurity Failures. Keith Price BBus, MSc, CGEIT, CISM, CISSP

Securing Plant Operation The Important Steps

Indegy. Industrial Cyber Security. Matt Petrauskas Regional Director.

Defending Against Unkown Automation is the Key. Rajesh Kumar Juniper Networks

Industry Best Practices for Securing Critical Infrastructure

Indegy. Industrial Cyber Security. ISA New Orleans Section. Applying the NIST Framework February 6, 2018

Securing IEDs against Cyber Threats in Critical Substation Automation and Industrial Control Systems

ICS/SCADA Cybersecurity and IT Cybersecurity: Comparing Apples and Oranges

SECURITY FOR SMALL BUSINESSES

Cyber Security Policy

Modbus Serial Communication Device Type Manager User Manual

DeltaV SIS and Cybersecurity

Cybersecurity. Good Practices Guide. HA Issue 1 July 2017

Vehicle & Transportation Infrastructure Cyber Security Discussions. IQMRI

Cisco Secure Ops Solution

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

Control System Security for Social Infrastructure

Security analysis and assessment of threats in European signalling systems?

Cyber security - why and how

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Triconex Safety System Platforms

Plant Security Services Protecting productivity in the digital era October

The emerging battle between Cyber Defense and Cybercrime: How Technology is changing to keep Company and HR data safe

Cisco Connected Factory Accelerator Bundles

Ensuring Your Plant is Secure Tim Johnson, Cyber Security Consultant

Defence services. Independent systems and technology advice that delivers real value. Systems and Engineering Technology

Evolution Of Cyber Threats & Defense Approaches

INTELLIGENT CYBER THREAT DEFENSE. Fight tomorrow s cyber threats in real time with cutting edge machine learning

Architecting a More Effective Enterprise Security Program

Computer Visions Course Outline

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Cyber Security Panel Discussion Gary Hayes, SVP & CIO Technology Operations. Arkansas Joint Committee on Energy March 16, 2016

Transcription:

Introducing the 9202-ETS MTL Tofino industrial Ethernet security appliance HAKIM- Sales Engineer 1

Cybersecurity of valuable assets and processes in a wide range of industry verticals, such as: Oil & Gas Process Power Chemical Utilities Pipeline Marine Pharmaceutical 2

General Market Drivers Major cyber attacks on DCS networks over the last decade Requirement for minimum or zero interruption in manufacturing processes Growing use of ethernet in the plant floor with increasing points of vulnerability Plug & play solutions requiring minimum IT skill for configuration/maintenance Cybersecurity is now in the top 10 key concerns of decision making boards 3

4

Cyber security incident types Outsider 47% N/A 0% Insider 53% Intentional 20% Disgruntled Employee Software or device flaw N/A 48% Human error Insider 14% Outsider 38% Unintentional 80% External Hacker Malware infection 2011 Security Incidents Organization Networks are vulnerable to both malicious AND accidental threats 5

Why Tofino? Traditional Firewall vs Tofino Traditional Firewall Too complex for many expertise to configure correctly. Even harder to set up properly to the plant floor. Once break by virus or hacker, PLC or DCS is an easy target. Tofino Design for industrial needs with defence in depth solution. Suitable for new and legacy control system. Simple enough to install. No need IT expertise. Technician and electrician can do the installation. 6

NEW Existing 9211-ET New generation 9202-ETS Enhancing our already proven network security solution with new features 7

Bundled solution to meet your cybersecurity needs 1. MTL Tofino appliance (9202-ETS) 2. MTL Tofino configurator (9511- TC) 3. MTL Tofino loadable security modules (9522-xxx) Three simple steps to a complete network security solution 8

9202-ETS MTL Tofino industrial ethernet security solution What s new with our next generation solution? More ruggedised hardware All front accessible interfaces Built in Firewall and Event Logger LSMs with each 9202-ETS Free configuration software (TC) NetConnect LSM required for 9202-ETS for network configuration Built in firewall templates on Tofino Configurator New Ethernet/IP enforcer Increased warranty: now up to 5 years Adding further customer value to our existing Tofino solution 9

We can t just install a firewall at the edge of the network and forget about security. The bad guys will eventually get in Many problems originate inside the plant network We must harden the plant floor. We need Defense in Depth. Identify the IEC 62443 (ISA99) Zones and Conduits in the network Allow only minimum required network traffic to pass between zones Generate alarms when traffic blocked How Much Security Do I Need? Where Do I Put It? Perimeter defence is NOT enough 10

Typical control network 11

Recommended Tofino Deployment Cycle 12

Our solutions help you to 1 2 3 4 Minimise installation costs Competitive total equipment cost Maximise availability & reliability Meet or exceed performance requirements 13

s built to meet and exceed certifications around the world to ensure safety of employees and equipment. ATEX Zone 2 UL508, cul508, ISA12.12 (Class I Division 2 Hazardous Locations) CE, FCC, EN61131, EN60950 Designed for global specifications 14

15