The Road to Industry 4.0

Similar documents
Scalable Security solutions to enable Cyber Security and to manage Digital Identities

The Road to Industry 4.0. Secure Industrial Visibility

Securing Your Most Sensitive Data

Expanding Cyber Security Management for Critical Infrastructure

Cisco Connected Factory Accelerator Bundles

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Industry Best Practices for Securing Critical Infrastructure

In the wrong hands it s an open invitation

Understanding the Changing Cybersecurity Problem

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Personal Cybersecurity

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

Intelligent and Secure Network

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1

Transforming Security Part 2: From the Device to the Data Center

3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Innovation policy for Industry 4.0

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

Sales Presentation Case 2018 Dell EMC

CYBERSECURITY IN THE INDUSTRIAL INTERNET OF THINGS

CSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT

Giesecke+Devrient. Company Presentation

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Breaking the Blockchain: Real-World Use Cases, Opportunities and Challenges

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Cybersecurity Session IIA Conference 2018

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

2017 Annual Meeting of Members and Board of Directors Meeting

LESSONS LEARNED IN SMART GRID CYBER SECURITY

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

MASP Chapter on Safety and Security

AT&T Endpoint Security

S1.1: RESEARCH AND DEVELOPMENT IN EUROPE FOR COMPETITIVE MANUFACTURING. Competitiveness of Industry by means of Cross Fertilisation

DIGITAL TRUST Making digital work by making digital secure

How Secure is Blockchain? June 6 th, 2017

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

The Future of Industrial Control Systems Security

locuz.com SOC Services

Cyber Security Brian Bostwick OSIsoft Market Principal for Cyber Security

Cyber Security Update. Bennett L. Gaines Senior Vice President, Corporate Services, CIO, FirstEnergy 2012 Summer Seminar August 5-7, 2012

Cybersecurity. Overview. Define Cyber Security Importance of Cyber Security 2017 Cyber Trends Top 10 Cyber Security Controls

Identity Management as a Service

Cyber Resilience Solution for Smart Buildings

Getting over Ransomware - Plan your Strategy for more Advanced Threats

Ransomware piercing the anti-virus bubble

Real estate predictions 2017 What changes lie ahead?

Securing Industrial Control Systems

Use Cases. E-Commerce. Enterprise

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

Endpoint Protection : Last line of defense?

SPAM Malware s Super Highway. How To Protect Yourself Against Malicious s 1

Security by Default: Enabling Transformation Through Cyber Resilience

Cyber-Threats and Countermeasures in Financial Sector

Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity

Threat Control and Containment in Intelligent Networks. Philippe Roggeband - Product Manager, Security, Emerging Markets

Dell EMC Isolated Recovery

Defending Our Digital Density.

Building Resilience in a Digital Enterprise

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Cybersecurity and Hospitals: A Board Perspective

Cyber Security: Threat and Prevention

Statement for the Record

Information Governance, the Next Evolution of Privacy and Security

Unisys Security. Enabling Business Growth with Advanced Security Solutions. Tom Patterson, Vice President, Security Solutions, Unisys

IBM BigFix Compliance

Guide to Cyber Security Compliance with GDPR

Cyber Security For Utilities Risks, Trends & Standards. IEEE Toronto March 22, Doug Westlund Senior VP, AESI Inc.

Service Provider View of Cyber Security. July 2017

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Introduction to Device Trust Architecture

Industry 4.0 = Security 4.0?

TAN Jenny Partner PwC Singapore

Trend Micro Cybersecurity Reference Architecture for Operational Technology

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Understanding Holistic Effects of Cyber Events on Critical Infrastructure

June 2 nd, 2016 Security Awareness

What It Takes to be a CISO in 2017

Cyber fraud and its impact on the NHS: How organisations can manage the risk

World Broadcasting Unions Cyber Security Recommendations

GlobalPlatform Trusted Execution Environment (TEE) for Mobile

Plant Security Services Protecting productivity in the digital era October

Power Grid Resilience, Reliability and Security Research at Idaho National Laboratory

Gladiator Incident Alert

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Jens Thonke, EVP, Cyber Security Services Jyrki Rosenberg, EVP, Corporate Cyber Security CORPORATE SECURITY

GDPR Update and ENISA guidelines

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

Bitdefender GravityZone. Supreme protection against active threats for the SMB market

Cisco ASA 5500 Series IPS Edition for the Enterprise

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface

Disruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise

Altius IT Policy Collection Compliance and Standards Matrix

Digital Healthcare. Yordan Iliev Director R&D Healthcare. Regional Cybersecurity Forum, November 2016, Grand Hotel Sofia, Bulgaria

INFINIT Y TOTAL PROTECTION

Transcription:

The Road to Industry 4.0 Secure remote access and active cyber protection for industrial machinery Hamburg, May 22, 2017 Fabian Bahr

G+D Group Business Units and Divisions G+D Mobile Security Financial Institutions Payment cards Mobile payment services Telecommunications Industries SIM cards Connectivity and VAS management Mobile identity End-to-end security Endpoint security Enterprise Security/ OEM ese / secure OS Connectivity and VAS management ID management Cyber security Software security Secure remote services Security solutions for internat. Governments and their agencies ID documents Passports Security printing Product and brand protection G+D Currency Technology Banknote Security Solutions Substrates for banknotes Security foils Security features Banknote design Banknote printing Sensor technology Cash Center Solutions Cash management software Banknote processing systems Cash center automation (Remote) services Plant engineering Cash cycle technologies IT security solutions Automotive Critical infrastructures Defence Homeland security Public authorities May 2017 2

Industrial digitization Industry 4.0 / Industrial IoT / China 2025 Motivation for Digitization Benefits with Digitization Support Challenges Competitive Advantage Customer Satisfaction Availability Revenue Cost Pressure 1,5 cm1,5 cm Digitization Technology Leadership Performance Optimization New Work / Business Models Reduce Service Time and Cost Risk for Cyber Attack May 2017 3

Industry 4.0 Big opportunities but also high risk 28Mio. 50Mrd. 3-5*% 30-50% PRODUCTION DOWNTIME RISK Costs in the automotive industry per day weigh risks of introduction of new technology against process reliability CYBERSECURITY RISK Annual damage to the German manufacturing industry caused by cyberattacks 60Mio. 51% 1,5 cm1,5 cm PRODUCTIVITY increased Reduction of MACHINE DOWNTIME 20-50% 45-55% Decreased costs for INVENTORY HOLDING Increase of PRODUCTIVITY in TECHNICAL PROFESSIONS due to automatization QUALITY LOSS RISK DATA MISUSE Number of cars that were Most German executives recalled in 2014 throughout identify data misuse by the US hackers or partners as the - 2 recalls per day greatest concern Source:McKinsey Industry 4.0 How to navigate digitization of the manufacturing sector PWC Industry 4.0 Building the digital enterprise 20-50% Reduction of TIME-TO-MARKET *) up to 22% (Bosch Blaichach) 10-40% Reduction of MAINTENANCE COST May 2017 4

Risk through Cyber-Attacks Allianz Risk Barometer Cyber-Attacks against the industry Malicious computer worm (stuxnet) destroys a fifth of Iran s nuclear centrifuges Hack attack causes massive damage at German steel works Top 10 Global Business Risks 2017 Encrypted malware (ransomware) found in German nuclear power plant Cyber incidents 2010 Canadian biscuit factory blackmailed 2015 2014 Cyber attack on US power grid causes black out 2015 2015 German hospital blackmailed after 1,5 cm1,5 ransomware based cm attack 2015 17% (5) 2016 28% (3) 2017 30% (3) 2016 The dark figure is big Many attacks are detected late or not at all The risk for Cyber-Attacks is growing fast, this requires effective countermeasures or higher capital surplus May 2017 5

Security risks in Industrial Control Systems ICS Nr Top 10 risks in 2016 (2014) BSI-CS-005 1(3) Social engineering and Phishing 2(2) Injection of malicious software on removable media and external HW 3(1) Infection with viruses / trojans over intranet and internet 4(5) Attack via remote maintenance access 5(4) Human error and sabotage 6(6) Internet connected control components 7(7) Technical misconduct and force majeure 8(9) Compromised extranet and cloud components 1,5 cm1,5 cm 9(10) (D)DoS attacks 10(8) Compromised smartphones in the production environment May 2017 6

IT-Security versus OT-Security Security Topic IT-Security (Office) OT-Security (ICS) Anti-Virus & mobile code countermeasures Support technology lifecycle 3-5 years Common; widely used Outsourcing Common; widely used Rarely used Uncommon; difficult to deploy Up to 20 years (or even longer) Application of patches Regular / scheduled Irregular / slow (vendor specific) Equipment refresh Regular / scheduled Legacy based; unsuitable for modern security Time critical content Delays are generally accepted Critical due to safety Availability Delays are generally accepted 24x7 (continuously) Security awareness Good in both private and public sectors Generally poor regarding cyber security Security testing / audit Scheduled or mandated Occasional testing for outages Physical security Secure Varies, but often remote and unmanned May 2017 7

The Road to Industry 4.0 AUTONOMUS OPTIMIZATION OPTIMIZED CONSTUCTION USAGE BASED PAYMENT MASCHINE OPTIMIZATION OPTIMIZED MACHINE USAGE Smart Machine SYSTEM UPDATE PERFORMANCE MANAGEMENT PERFORMANCE REPORTS 1,5 cm1,5 cm EFFEKTIVE MAINTENANCE INTERAKTIVE PRODUCTION Smart Machine SMART FACTORY Smart Machine DATA ANALYTICS REMOTE- DIAGNOSIS Smart Security SECURE INDUSTRIAL VISIBILITY MACHINE PROTECTION TRUSTED IDENTIFICATION USER / POLICY MANAGEMENT May 2017 8

G+D Mobile Security Industrial Security Portfolio Secure Industrial Visibility CPS Protect CPS Remote CPS Anomaly Detection Awarded solution for active cyber protection and secure remote access to industrial machines Supports industry IT with high-end security as well as future-proven machine service and maintenance for existing and upcoming machinery Meets the high security requirements for remote management in industrial environments (BSI CS-108) of the German Federal Office for Information Technology (BSI) Top end industrial grade, managed firewall Latest security solution and network security, designed for industrial systems and environments Security without side effects and without impacting machines, systems, or production processes Supports micro segmentation or full stealth (100% transparent) mode Integrated into a machine it decouples security and machine lifecycle Industrial IoT connector clientless and without side-effects Allows near real-time answer to support requests Problem analysis and often resolution without service engineer being on-site System monitoring allows condition triggered or predictive maintenance Customer has full control over any remote access activities Self learning Anomaly Detection System ADS made for industry Allows local, machine / data specific or server / site level anomaly detection Network behavior based learning and detection Includes compliance and policy verification as well as Bot-net and hidden command detection Fully controlled by the customer May 2017 9

www.gi-de.com twitter.com/gi_de_com www.gi-de.com/youtube www.linkedin.com/company/giesecke-&-devrient Securing connected things