Brief introduction of WG 3

Similar documents
Brief introduction of WG 3

Enterprise Architecture Views and Viewpoints in ArchiMate - Reference

Platform Economy and Trustworthiness Standardization

The Arab ICT Organization

DAPhNE Danube Ports Network Motivation & Project Status Q4 / 2018

Hannover Declaration

Innovation policy for Industry 4.0

Trust and Certification: the case for Trustworthy Digital Repositories. RDA Europe webinar, 14 February 2017 Ingrid Dillo, DANS, The Netherlands

Fundamental Concepts and Models

The PICTURE project, ICT R&I priorities in EaP, areas of cooperation

Design the Future by Setting Industry Standards

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

Enterprise Architecture Views and Viewpoints in ArchiMate

IT Governance Framework at KIT

TEL2813/IS2621 Security Management

General Framework for Secure IoT Systems

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

Siemens view and approach on critical infrastructure resilience against cyberthreats Joint OECD-JRC Workshop, Paris September 2018

We are also organizational home of the Internet Engineering Task Force (IETF), the premier Internet standards-setting body.

Security and resilience in Information Society: the European approach

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

Integrating Cyber Security and Safety Systems Engineering Disciplines with a common Code of Practice

Commission for Environmental Cooperation (CEC) Sponsored Workshop on Environmental Assistance Programs and Resources for Automotive OEMs and Suppliers

5-6 SILICON VALLEY World Cyberspace Cooperation Summit IV NOVEMBER. World Cyberspace Cooperation EXECUTIVE!SUMMARY!

ERCI cybersecurity seminar Guildford ERCI cybersecurity seminar Guildford

Horizon 2020 Security

Cloud solution consultant

The Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements

Professional Profile. Bodo Piening Die Alten Gärten Burgdorf

2009/7 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

TAN Jenny Partner PwC Singapore

Collaborative Working presentation for CIPS. Bob Meakes I C W Associate Director

PSICTSA (MAMPU) DGCCR (JPA) Public Sector ICT Strategic Plan (PSICTSA) outlines the strategic ICT development direction for Public Sector

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

End-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration

European Union Agency for Network and Information Security

MASTER OF INFORMATION TECHNOLOGY (Structure B)

Recommendations for Small and Medium Enterprises. Event Date Location

ISO/IEC JTC 1 N 13538

Stakeholder Participation Guidance

Some keynote messages on standardization and trade between US and EU

EU policy on Network and Information Security & Critical Information Infrastructures Protection

IT SECURITY IN CONTEXT OF INDUSTRIE 4.0 PROTECTION OF PRODUCTION DATA

EC Perspective on Connectivity and Smart Mobility and the Role of "Digital Co-production/Co-creation" in Transportation

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document

Support Project for the Implementation of the Paris Agreement (SPA)

The Federal Council s Basic Strategy. for Critical Infrastructure Protection

IBM SmartCloud Engage Security

National Science and Technology Council. Interagency Working Group on Digital Data

From Cloud adoption to Cloud first Enabling effective Cloud usage

Certification Efforts at Nestor Working Group and cooperation with Certification Efforts at RLG/OCLC to become an international ISO standard

The NIS Directive and Cybersecurity in

Cloud solution consultant

TEL2813/IS2820 Security Management

Description of the certification procedure MS - ISO 9001, MS - ISO 14001, MS - ISO/TS and MS BS OHSAS 18001, MS - ISO 45001, MS - ISO 50001

ISSUE OBJECTIVES FOR THE 2002 G8 KANANASKIS SUMMIT - DIGITAL OPPORTUNITIES TASK FORCE (DOT FORCE) -

Alignment of Business and IT - ArchiMate. Dr. Barbara Re

H2020-LEIT-ICT WP European Data Infrastructure ICT-13 Supporting the emergence of data markets and the data economy

ICT Policy Perspective for APEC. Ministry of Internal Affairs and Communications March 2015

Panel 1 Service Platform and Network Infrastructure for Ubiquitous Services

Cybersecurity eit. Software. Certification. Industrial Security Embedded System

A Smart New Cofely Dutch Data Summit Roland Schneiders

ESRIF & Working Group Innovation WG 9. Alois J. Sieber Chairman ESRIF WG # 9

EXIN BCS SIAM TM Foundation Certification Training - Brochure

Canadian Access Federation: Trust Assertion Document (TAD)

Conferenza GARR Moving Forward to deliver an «EOSC in Practice» by 2018

Kantara Identity Assurance Framework Catalyzing an Identity Services Marketplace

ITIL 2011 FOUNDATION. Training Program ACADEMY FOR PROFESSIONAL EXCELLENCE TRAINING EXCELLENCE. Skills. Performance. Real Life Experience

Call for submissions by the UN Special Rapporteur on Freedom of Expression

Data Governance in Mass upload processes Case KONE. Finnish Winshuttle User Group , Helsinki

An overview of the CERT/CC and CSIRT Community

KIC Added-value Manufacturing: Exploiting synergies and complementarities with EU policies and programmes

InnovationPartnership Talking Traffic

ArchiMate 2.0. Structural Concepts Behavioral Concepts Informational Concepts. Business. Application. Technology

e-infrastructures in FP7 INFO DAY - Paris

Organizational Readiness for Digital Transformation

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)]

AT FIRST VIEW C U R R I C U L U M V I T A E. Diplom-Betriebswirt (FH) Peter Konrad. Executive Partner Senior Consultant

UAE Nuclear Energy Program Overview

SERVICE TRANSITION ITIL INTERMEDIATE TRAINING & CERTIFICATION

Implementing security has never been easier. Infineon Security Partner Network.

GATE: Big Data for Smart Society Dessislava Petrova-Antonova Sofia University St. Kliment Ohridski Faculty of Mathematics and Informatics

National program of digital transformation

ISAO SO Product Outline

Improve testing for customer services and service management

Joint Agile Delivery Phase 3

EISAS Enhanced Roadmap 2012

TRAINING & CERTIFICATION. An Investment in Knowledge Increases Your Competitive Edge

A regulatory framework for connected and automated driving Towards a strengthened cooperation

The German IT Security Certification Scheme. Joachim Weber

Mobile IoT: The Ideal Fit for Smart Cities

Monetizing 5G the disruption of traditional telco business models

Kaspersky Industrial Cybersecurity Training Program

Cybersecurity for ALL

R&D to shape the networks and services of the future

Angela McKay Director, Government Security Policy and Strategy Microsoft

Cybersecurity & Digital Privacy in the Energy sector

Optimisation drives digital transformation

Transcription:

Platform Industrie 4.0 Brief introduction of WG 3 Security of networked systems Michael Jochem, Robert Bosch GmbH, Chair of WG3

Platform Industrie 4.0 Five things we do. 1 2 3 Focus on the needs of businesses and of end users Create a central point of contact (for international partnerships and alliances) Ensure acceptance through high transparency and participation 4 5 Develop a common language, objective and key messages Establish clear structures and reliable processes for the dayto-day work of the platform The Platform Industrie 4.0 is the moderator of and catalyst for the exchange amongst all societal actors in the pre-competitive phase 2

Arbeitsgruppe 3 Challenges of Industrie 4.0 Increasing flexibility and customerspecific production by ad-hoc networking to value creation networks across company boundaries direct data exchange of all entities (people, machines, processes etc.) Increasing of the attack area Boundary Conditions of Industrie 4.0 Data exchange between the entities bases on trust of the partners Legally relevant communication between machines entities will be necessary to realize ad-hoc networks Traditional machine suppliers rarely have core competences in the relevant technical and organizational fields of security

Working group 3 Identified key topics Secure communication for Industrie 4.0 What are the essential requirements for dynamic value creation networks across companies and how to build an infrastructure for this? Trustworthiness How to determine the trustworthiness of an I4.0 component, e.g. With a uniform metric, which level of trust is required within a value creation network. How to determine the real trust level along the value creation network? Identities and their protection / verification What is a secure identity? Why are secure identities important? How can you verify if an identity is secure? Integrity of data and systems What is the integrity of data and systems? How to ensure the integrity? Legal contracts Knowledge of the skills and possibilities (of trustworthiness) of the individual participants

Publications by WG 3 Title Publication Document type IT security in Industry 4.0 CeBit 2016 Guidelines Secure identities HMI 2016 Working paper Secure communications between companies HMI 2016 Working paper Security in RAMI HMI 2016 Guidelines IT security in Industry 4.0 Fields of action for operators IT Summit 2016 Guidelines

Publications by WG 3 Title Publication Document type Industrie 4.0 security in vocational and advanced training: New issues for business organisation and expertise IT Summit 2016 Working paper Security of the Asset Administration Shell (only available in German) HMI 2017 Discussion paper Application scenario in practice: order-controlled production of a customized bicycle handlebar HMI 2017 Working paper Secure Communication for Industrie 4.0 (only available in German) Digital Summit 2017 Discussion paper

Summary Core messages of WG 3 Security is the enabler of Industry 4.0 in the value creation networks! Industry 4.0 is only possible with adequate security Security by design Security must be a fundamental component of development, deployment and operation Security concerns all of us! It is a joint task that requires cooperation between departments and across company boundaries throughout the entire value creation network. Security becomes a cross-sectional task Security is a moving target We are never done. The core questions What should I expect? and Which measures must be taken? must be re-evaluated again and again 7

New Insight of Collaboration IOT Products bridges IT/OT Manufacturing is a common vertical that forms the basis for all the other industrial verticals Common understanding of trustworthiness is critical