Continuous protection to reduce risk and maintain production availability

Similar documents
Protecting productivity with Industrial Security Services

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Industrial Security - Protecting productivity. Industrial Security in Pharmaanlagen

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Symantec Security Monitoring Services

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure

Cyber Security Program

Best Practices in ICS Security for System Operators

Global Security Consulting Services, compliancy and risk asessment services

Continuous Monitoring and Incident Response

ABB Process Automation, September 2014

align security instill confidence

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

CYBER RESILIENCE & INCIDENT RESPONSE

Industrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets

locuz.com SOC Services

CA Security Management

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

Plant Security Services Protecting productivity in the digital era October

Managed Endpoint Defense

How AlienVault ICS SIEM Supports Compliance with CFATS

Industrial Security Co-Sourcing: Shifting from CapEx to OpEx Presented by Vinicius Strey Manufacturing in America 03/22-23/2017

Secure Development Lifecycle

Securing Your Digital Transformation

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

Run the business. Not the risks.

SOLUTION BRIEF Virtual CISO

Cyber Security For Business

SIEM: Five Requirements that Solve the Bigger Business Issues

Ensuring System Protection throughout the Operational Lifecycle

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

Digital Wind Cyber Security from GE Renewable Energy

Department of Management Services REQUEST FOR INFORMATION

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

Are we breached? Deloitte's Cyber Threat Hunting

Why you should adopt the NIST Cybersecurity Framework

Security Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response

to Enhance Your Cyber Security Needs

Certified Information Security Manager (CISM) Course Overview

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

Security and Privacy Governance Program Guidelines

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

BROCHURE. Coromatic Maintenance We provide 24/7/365 maintenance of your mission critical sites

Mastering The Endpoint

Canada Life Cyber Security Statement 2018

INTELLIGENCE DRIVEN GRC FOR SECURITY

From the eyes of a customer

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

The Connected Water Plant. Immediate Value. Long-Term Flexibility.

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Industrial Defender ASM. for Automation Systems Management

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

A company built on security

What is Penetration Testing?

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions

NW NATURAL CYBER SECURITY 2016.JUNE.16

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

TRUE SECURITY-AS-A-SERVICE

Sustainable Security Operations

Nebraska CERT Conference

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

SECURITY SERVICES SECURITY

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

Securing Industrial Control Systems

HP Fortify Software Security Center

Medical Devices and Cyber Issues JANUARY 23, American Hospital Association and BDO USA, LLP. All rights reserved.

MITIGATE CYBER ATTACK RISK

White Paper. How to Write an MSSP RFP

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Aon Service Corporation Law Global Privacy Office. Aon Client Data Privacy Summary

Cyber Incident Response. Prepare for the inevitable. Respond to evolving threats. Recover rapidly. Cyber Incident Response

SECURITY & PRIVACY DOCUMENTATION

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

Symantec Data Center Transformation

Cyber Espionage A proactive approach to cyber security

NCSF Foundation Certification

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

Security Incident Management in Microsoft Dynamics 365

Risk Advisory Academy Training Brochure

Oracle Data Cloud ( ODC ) Inbound Security Policies

CCISO Blueprint v1. EC-Council

BHConsulting. Your trusted cybersecurity partner

MATURE YOUR CYBER DEFENSE OPERATIONS with Accenture s SIEM Transformation Services

Best Practices in Securing a Multicloud World

White Paper. View cyber and mission-critical data in one dashboard

Enhance Your Cyber Risk Awareness and Readiness. Singtel Business

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

Angela McKay Director, Government Security Policy and Strategy Microsoft

VERTIV SERVICE CAPABILITY

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006

Carbon Black PCI Compliance Mapping Checklist

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Transcription:

Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry.

Managing your industrial cyber security risk requires world-leading automation expertise Siemens Managed Security Service uses a comprehensive approach focused on securing ICS, including SCADA, DCS, PLC, HMI, drives, and motion control. The specific requirements for security of an Industrial Control System (ICS) differ significantly from the enterprise requirements of corporate IT In a production environment, availability is a key security goal. To ensure uninterrupted production and maximized uptime requires comprehensive protection for people, equipment, and intellectual property (IP). Further, the consequences of successful attacks and infections can be serious and damaging. Health, safety, environmental impact, business sustainability, and other factors are all constantly at risk. A comprehensive security approach to protect your ICS Selecting the right mix of security measures and products is a complex task that requires highly skilled personnel. Add to this, the struggle of keeping up with ever-changing security threats and new regulations. Siemens Managed Security Service helps meet the challenges of protecting your industrial environment so that you can stay focused on your business ensuring reliable, consistent production. Get the peace of mind that comes with our Managed Security Service Meet all of your industrial security needs through a single reliable service provider Siemens the global leader in automation technology and ICS. We will apply our expertise holistically across your entire operational environment, providing a comprehensive solution that is customized to your specific needs. Our Managed Security Service follows a formal process which will include assessment of your current security; identification and implementation of recommended security improvement measures; and continuous monitoring of your ICS operation. America s service partner for industry With more than 1,200 dedicated U.S. service engineers, technicians, and professionals across the country, we can support you where you need us, when you need us, 24/7 We have an uncompromising commitment to safety, environmental, and regulatory compliance at all levels of our business We take ownership of your problems, are committed to the success of your operations, and go out of our way to deliver the best solutions We are a reliable partner and earn trust through our actions Your success is our success 2

With Siemens Managed Security Service your operation will benefit from: Continuous protection through our Cyber Security Operation Center Reduced risk of production loss and equipment damage Ensured predictable and transparent budgeting for cyber security Leverage Siemens industrial cyber security talent and expertise Protection for equipment across the entire operational lifecycle Proactive defense based on global threat intelligence 3

A phased approach to long-term protection for your ICS ICS assets have long lifecycles, up to 20 years. Our Managed Security Service applies a formal three-step approach to address specific aspects of industrial security regardless of whether you are operating a legacy control system with upgraded connectivity or a recently installed ICS. Following implementation of the recommended security measures, we will provide the ongoing service to protect your ICS environment across its lifecycle, allowing you to stay focused on your business. Global threat monitoring Incident detection and notification Design and deploy adjustments to changing threat landscape Step 1: Assess We begin by evaluating the current security posture of your ICS. Potential sources of vulnerabilities are identified through technical evaluation and analysis, forming the basis for recommended security actions. Based on risk analysis conducted by Siemens, you will be able to make informed decisions on the direction of your security architecture. Step 2: Implement Siemens partners with you to systematically put in place all identified measures to mitigate risk in your ICS. Based on the recommendations from Step 1, we deliver comprehensive employee training and certification, deploy new technology, enhance security processes, and establish new security guidelines for the ICS operation. Step 3: Operate & Manage We provide ongoing services for managing and maintaining your security posture against current and potential cyber threats. Our Cyber Security Operation Center continuously monitors global threat activity and translates gained intelligence into the real-time actions necessary to maintainyour ICS security and keep your production running. Architecture assessment Threat modeling Analysis of vulnerabilities and their impact Employee training Process improvement Implement security technology 4

A security architecture tailored to fit your operation Cyber security threats are rapidly evolving and effective defense must provide continuous and comprehensive protection. Siemens Managed Security Service employs a defense-in-depth strategy and focuses on securing the three levels of your operational environment: people, processes, and technology. Risk and Vulnerability Assessment Siemens will help you identify and weigh the impact of potential security breaches in your ICS environment. Using rigorous methodology, we will collect and analyze information concerning your people, processes, technologies, and current security architecture. The assessment will result in an actionable report prioritizing the mitigations and a strategic roadmap for implementation. Training and Competence Management Siemens will increase the awareness and knowledge of the production employees operating and securing your ICS environment. Operator training focuses on industrial security topics, including avoiding unintentional breaches and detecting possible attacks on the ICS. Advanced training for security staff addresses the details of the implemented security measures. We will regularly review your personnel s knowledge level and provide additional training to keep their skill levels up to date. Process Optimization and Compliance Management Working with you, we will design and implement process improvements to optimize your operational environment s security posture, applying industry standards and best practices. Also, Siemens will help you ensure compliance with existing and emerging government regulations. Your overall ICS security program will include documentation of policies, procedures, guidelines and administrative controls. As part of our long-term Managed Security Service, we will periodically re-assess your processes and make the necessary adjustments. Deployment of Security Technologies Successfully protecting your ICS environment requires a defense-in-depth approach which covers all aspects of potential intrusion and unauthorized access. This includes creation of network segmentation and hardening your assets. Further, Siemens will deploy both hardware and software security technologies to protect your assets against the risks and vulnerabilities discovered in the initial assessment. These technologies, along with other technical compensating controls, will provide behavior-based analysis and anomaly detection for network and host-based critical assets. Finally, proactive security measures based on situational awareness models that utilize threat intelligence will be deployed. Regardless of who manufactured your equipment, our service can protect your entire production. 5

Your industrial cyber security needs will be met by a single provider Siemens Partnering with Siemens, an industrial automation leader, to address your ICS cyber security needs will allow you to stay focused on your business, while ensuring predictable and transparent costs for protecting your industrial environment. People Continuous monitoring of security and system status Proactive threat notification based on real-time global intelligence Implementation of security updates to address changing threat landscape MANAGED SECURITY SERVICE P r o c e s s e s T e ch n ol og y Security incident response and resolution guidance Onsite re-assessment of security posture, personnel training and process enhancement Core aspects of the Managed Security Service Continuous protection through monitoring and analysis of security and system status, thereby reducing risk of production loss, equipment damage, and industrial espionage Proactive threat notification based on real-time global intelligence from our Cyber Security Operation Center to protect your reputation and brand image Implementation of security updates to address the rapidly changing threat landscape in order to protect equipment across the entire operational lifecycle of your heterogeneous ICS environment Leverage Siemens industrial cyber security talent and expertise to provide security incident response, resolution, guidance, and execution Onsite re-assessment of security posture; personnel training and enhancement of the security program, thereby complying with current and upcoming industry regulations; as well as reducing the risks of health, safety, and environmental incidents 6

Siemens Cyber Security Operation Center delivers continuous cyber security protection Our analysts proactively monitor vulnerability and cyber threat activity globally, to deliver real-time communication alerts and advisories. When global threat intelligence indicates an elevated risk, the Siemens Cyber Security Operation Center defines and delivers the appropriate proactive defensive measures. If an incident is detected in your ICS environment, Siemens will coordinate the incident response consisting of investigation, forensic analysis, and remediation. Depending on the nature of the incident, remediation will be either automated or performed by a security engineer at your facility. 7

Security information Siemens provides products and solutions with industrial security functions that support the secure operation of plants, solutions, machines, equipment and/or networks. They are important components in a holistic industrial security concept. With this in mind, Siemens products and solutions undergo continuous development. Siemens recommends strongly that you regularly check for product updates. For the secure operation of Siemens products and solutions, it is necessary to take suitable preventive action (e.g., cell protection concept) and integrate each component into a holistic, state-of-the-art industrial security concept. Third-party products that may be in use should also be considered. For more information about industrial security, visit http://www.siemens.com/industrialsecurity. To stay informed about product updates as they occur, sign up for a product-specific newsletter. For more information, visit http://support.automation.siemens.com. Siemens Industry, Inc. 3333 Old Milton Parkway Alpharetta, GA 30005 1-800-333-7421 info.us@siemens.com Order No. CSISS-MSS1-0214 2014 Siemens Industry, Inc. This brochure contains only general descriptions or performance features, which do not always apply in the manner described in concrete application situations or may change as the products undergo further development. Performance features are valid only if they are formally agreed upon when the contract is closed. Siemens is a registered trademark of Siemens AG. Product names mentioned may be trademarks or registered trademarks of their respective companies. Specifications are subject to change without notice.