Building cyber security

Similar documents
THE LEADER IN SMART BUILDING SERVICES CONSULTING ON OVER $2 BILLION IN NEW DEVELOPMENT CUSTOMERS WITH OVER 2 BILLION SQUARE FEET

THE LEADER IN SMART BUILDING SERVICES CONSULTING ON OVER $2B IN NEW DEVELOPMENT CUSTOMERS WITH OVER 2 BILLION SQUARE FEET

IT Consulting and Implementation Services

Department of Management Services REQUEST FOR INFORMATION

Accelerate Your Enterprise Private Cloud Initiative

Intelligent Building and Cybersecurity 2016

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

PROFESSIONAL SERVICES (Solution Brief)

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)

Managed Hosting Services

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATACENTER SERVICES DATACENTER

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

Automating the Top 20 CIS Critical Security Controls

Continuous protection to reduce risk and maintain production availability

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Securing Your Digital Transformation

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

How Boards use the NIST Cybersecurity Framework as a Roadmap to oversee cybersecurity

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Background FAST FACTS

RSA NetWitness Suite Respond in Minutes, Not Months

a publication of the health care compliance association MARCH 2018

CYBERSECURITY MATURITY ASSESSMENT

Jane s Defence Industry & Markets Intelligence Centre. Develop Advantage. Mitigate Risk. Capture Opportunity.

To Audit Your IAM Program

Perfect Balance of Public and Private Cloud

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Internet of Things Toolkit for Small and Medium Businesses

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

VANGUARD WHITE PAPER VANGUARD INSURANCE INDUSTRY WHITEPAPER

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

WHITE PAPERS. INSURANCE INDUSTRY (White Paper)

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions

Symantec Data Center Migration Service

BHConsulting. Your trusted cybersecurity partner

Measurement Challenges and Opportunities for Developing Smart Grid Testbeds

From the Trenches: Lessons learned from using the NIST Cybersecurity Framework

Top Reasons To Audit An IAM Program. Bryan Cook Focal Point Data Risk

OVERVIEW BROCHURE GRC. When you have to be right

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

Smart Data Center Solutions

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

New Zealand Government IBM Infrastructure as a Service

BUILT FOR THE STORM. AND THE NORM.

Symantec Data Center Transformation

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Six Sigma in the datacenter drives a zero-defects culture

7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager

Smart Islands, Intelligent Nations. Carlyle Roberts, Bahamas Telecommunications Company August 1 st, 2016

ALIENVAULT USM FOR AWS SOLUTION GUIDE

VANGUARD WHITE PAPER VANGUARD GOVERNMENT INDUSTRY WHITEPAPER

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

For providing decision support on climate stressors to infrastructure and assets for federal, state, local, and private clients...

White Paper. View cyber and mission-critical data in one dashboard

McAfee Total Protection for Data Loss Prevention

2018 HIPAA One All Rights Reserved. Beyond HIPAA Compliance to Certification

Achieving effective risk management and continuous compliance with Deloitte and SAP

Evolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha

Technology Roadmap for Managed IT and Security. Michael Kirby II, Scott Yoshimura 04/12/2017

Global Security Operation Center GSOC

The Problem with Privileged Users

CISO as Change Agent: Getting to Yes

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Real-Time Health Monitoring of Civil Works to Enhance Emergency Action

CAPABILITY STATEMENT

Technology Roadmap for Managed IT and Security. Michael Kirby II, Scott Yoshimura 05/24/2017

Dell helps you simplify IT

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America

EMC ACADEMIC ALLIANCE

FACILITY SERVICES UILDINBUILDG

CenturyLink for Microsoft

Cloud & Managed Server Hosting for Healthcare Professionals

Why you should adopt the NIST Cybersecurity Framework

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

Gaps in Resources, Risk and Visibility Weaken Cybersecurity Posture

CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS

Cognizant Cloud Security Solution

Institute of Internal Auditors 2018 IIA CHICAGO CHAPTER JOIN NTAC:4UC-11

TABLE OF CONTENTS ONLY IT Resiliency Benchmarking Report

Defensible and Beyond

THE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

Cisco Payment Card Industry Compliance Services

AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs

2018 Trends in Hosting & Cloud Managed Services

Mitigating Branch Office Risks with SD-WAN

Security-as-a-Service: The Future of Security Management

Create a sustainable, high-performance university campus.

Improve the User Experience on Your Website

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

locuz.com SOC Services

STRATEGY STATEMENT OF QUALIFICATIONS

Transcription:

THE LEADER IN SMART BUILDING SERVICES CONSULTING ON OVER $2 BILLION IN NEW DEVELOPMENT CUSTOMERS WITH OVER 2 BILLION SQUARE FEET Building cyber security

Content 05 06 09 10 11 our company who is intelligent buildings, llc. What makes us different the unique blend of expertise cyber security Securing Building monitoring & control systems Cyber Compass how we help prioritize areas of focus cyber safe service our Cyber building monitoring service

OUR COMPANY Intelligent Buildings, LLC is a Smart Real Estate professional services company. We provide planning and implementation management of our next generation strategy for new building projects, existing portfolio optimization and smart community development. We are a recognized thought leader with numerous industry firsts, including consultation on the awardwinning Smartest Building in America, conception and development of a Clinton Global Initiative publicprivate partnership, program management for the largest energy analytics project in North America and development of national smart building standards for the US, Canadian and Singapore federal governments. We have developed a consistent and proven technology approach for new projects and optimizing existing portfolios that respects the stakeholders and traditional process, while not compromising on the realities of today s building technology and opportunities of the information age. Intelligent Buildings has worked extensively throughout the US and Canada in over 85 different cities, along with select international work and market research in The Middle East, Asia and Central America. Headquartered in Charlotte, NC and with staff in Atlanta, Birmingham, Chicago, Dallas, New York, Milwaukee, and Washington, DC, our firm has advised on some of the world s most intelligent buildings and realestate projects since 2004. 3

What makes us different We stand alone in the marketplace because we are the only company that was founded to focus solely on smart building technology consulting and services. Since 2004 we have been a thought leader because we understood there are three legs to the smart building stool which include: 1) buildings and their operational technologies such as control systems, middleware, and protocols, 2) people and processes that includes workflow, management and measurements and 3) information technologies, such as, networking, servers, cloud, and cyber. BUILDING SYSTEMS Control systems including: HVAC, Lighting, Elevator and Metering We leverage a range of engineering skill sets including mechanical, electrical, civil, and industrial. With extensive experience on multiple controls systems, middleware, analytics, and other facility technologies, we can evaluate something as narrow as a specific controls system replacement or as broad as developing a destination architecture for long-term integration and interoperability. PEOPLE & PROCESSES Organizational alignment, workflow, management and vendor policy No technology is effective without organizational alignment. It is necessary to evaluate the changing marketplace and the variety of new technology opportunities in light of the organizational impact. This can impact budget buckets, roles and responsibilities and general workflow. We have a deep understanding of the cultural environment in real estate and the various stakeholders experiences and sensitivities. INFORMATION TECHNOLOGY Cloud, analytics, cyber and networks Today s controls systems and solutions are based on information technology (IT), including local and wide area networking for interoperability, remote access, and real estate operations centers. Additionally, the rapidly emerging solutions for cloud, big data and analytics require IT experience and credibility. There is, however, a significant skills gap between the realities of the today s real estate IT and the capability of the traditional support organizations such as architects, engineers, facility and property managers. It is critical for your organization to be equipped with the IT skill sets and resources to properly design, install and manage a modern controls network. 4

cyber security BUILDING CYBER SCORECARD We have developed the industry s first cyber security assessment methodology specifically for building controls systems. This approach is based on the NIST (National Institute of Science and Technology) cyber security framework that has been widely accepted and includes the categories of identify, detect, protect, respond and recover. Beyond the NIST cyber framework, we found there were no subsequent methods or procedures for building controls systems (BCS), only for industrial controls systems (ICS). Hence the creation of Building Controls Systems - Cyber Assessment Methods & Procedures (BCS-CAMP sm ). BCS-CAMP sm will give you an objective score on each key category in the NIST framework and, more specifically, for each of the building control system sub-categories which will tell you exactly what you need to shore up to improve your score and reduce your risks. 5

Cyber Compass BUILDING CYBER COMPASS Similar to our strategy compass, our building cyber security compass will identify where you are now as an organization and guide you on which areas you want to prioritize for budget, resources, and timing. Organization Focus Areas 0 0 NIST Framework Categories BCS-CAMP Categories 0 6

CyberSafe Servi ce cyber safe service CYBERSAFE BUILDING MONITORING After assessing, prioritizing, and remediating your building cyber security risks, ongoing management is essential. There are three key functional areas the Intelligent Buildings CyberSafe service addresses: 1. IB Gate (Remote Access) Both vendors and staff should access building controls systems through a purpose-built, secure-access cloud. This will authenticate users before allowing them to access the building systems through a virtual private network (VPN). The connection point at the building can only communicate with the authentication cloud, and no other entry method is allowed. 2. IB scan (System Inventory & Configuration) Even authenticated users must adhere to policies and best practices after they have accessed the control system(s) remotely. Password change frequency, password custody, authorized user lists, connected device inventory, and other critical policy can be monitored and automatically flagged when out of compliance. 3. IB watch (Network Traffic) Even when remote access is properly managed, organizations are at risk from internal or in-building breaches. This can be the result of network-hopping, physical connections onsite or other back door methods. Unlike traditional IT networks, these networks include building automation and control system field devices. We will establish and document the normal network traffic patterns and automatically flag any unauthorized connections. 7

6201 Fairview Road, STE 310 charlotte, NC 28210 www.intelligentbuildings.com Ph. 704.759.2700 Fax. 704.759.2710