Protecting Productivity with Industrial Security Services Go to Market V4.0

Protecting Productivity with Industrial Security Services Go to Market V4.0

Cybersecurity for OT © Siemens 2020 www.siemens.com/industrial-security-services Evolution of the cyber threat landscape Digital Information Processing Digital Connectivity Digital Automation and Intelligence 1950s – 1960s 1970s 1980s 1990s 1991 1999 2000s 2010s 2015 2020s Military, governments and other Computers make their way Internet of Things, Smart The World Wide Web becomes organizations implement into schools, homes, business Mobile flexibility and autonomous systems, publicly accessible computer systems and industry Artificial Intelligence, Big Data Digital enhancement of The globe is connected Cloud computing enters the Home computer is introduced Industry 4.0 electrification and automation by the internet mainstream Industroyer/Chrashoverride Cyberwar WannaCry Stuxnet Phishing Targeting Critical Morris Worm Infrastructure AT&T Hack Blue Boxing NotPetya The threat landscape keeps growing and AOHell Cryptovirology Cloudbleed changing and attackers are targeting industrial Level Seven Crew hack sl1nk SCADA hacks and critical infrastructures Denial of service attacks Meltdown/Spectre © Siemens 2020 Digital Enterprise Services Challenges are similar but reality is very different in IT and Industrial (OT) Security IT Security Industrial Security Confidentiality Availability and Safety 3-5 years Asset lifecycle 20-40 years Forced migration (e.g. PCs, smart phone) Software lifecycle Usage as long as spare parts available High (> 10 “agents” on office PCs) Options to add security SW Low (old systems w/o “free” performance) Low (mainly Windows 10) Heterogeneity High (from Windows 95 up to 10) Standards based (agents & forced patching) Main protection concept Case and risk based © Siemens 2020 Digital Enterprise Services Industrial Security concept Defense in depth – based on IEC 62443 based on IEC 62443 © Siemens 2020 Digital Enterprise Services Industrial Security concept The security concept – Products and systems offer integrated security “Defense in depth” Know-how and Authentication Firewall and VPN System hardening, copy protection and user continuous management monitoring and anomaly detection Siemens Industrial Security Services © Siemens 2020 Page 5 Digital Enterprise Services Industrial Security Services End-to-end approach Security Consulting (Planning) Security Implementation Security Optimization (Monitoring) Evaluation of the current security status of Risk mitigation through implementation of Comprehensive security through managed an industrial environment security measures services • Security Assessments • Security Awareness Training • Industrial Anomaly Detection • Scanning Services • Automation Firewall • Industrial Security Monitoring • Industrial Security Consulting • Endpoint Protection • Remote Incident Handling • Industrial Vulnerability Manager • Patch Management © Siemens 2020 Digital Enterprise Services Industrial Anomaly Detection Dashboard Dashboard Assets view Alerts view OT Audit view Policies & Zones Attack vector Insights view All reports Activities Configuration © Siemens 2020 June 2018 Digital Enterprise Services Industrial Anomaly Detection Assets view / Network Graph © Siemens 2020 June 2018 Digital Enterprise Services Industrial Anomaly Detection Alerts view © Siemens 2020 June 2018 Digital Enterprise Services Industrial Anomaly Detection Insights view © Siemens 2020 June 2018 Digital Enterprise Services Contact Information Carlos Campos Digital Portfolio Specialist RC-BR DI DES Industry Lifecycle Services [email protected] Phone: + 55 11 99653-6482 siemens.com/simatic-pcs7 © Siemens AG 2018 Page 11.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    11 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us