• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Cyber security: A roadmap to secure solutions
 

Cyber security: A roadmap to secure solutions

on

  • 741 views

For many companies, Cyber Security is achieved solely through the application of technological solutions to software and hardware challenges. Schneider-Electric takes a more holistic approach with a ...

For many companies, Cyber Security is achieved solely through the application of technological solutions to software and hardware challenges. Schneider-Electric takes a more holistic approach with a program built around complete product lifecycles and encompassing safety, maintenance and security. Discover Schneider-Electric's cyber security vision, from understanding how secure functionality is engineered into products through the tools and support available to manage updates and patches, plus specific procedures for handling potential vulnerabilities. A software and hardware ecosystem is only as strong as its weakest component, and Schneider-Electric is working to strengthen this through StruXureware and the evolution of platforms.

Statistics

Views

Total Views
741
Views on SlideShare
737
Embed Views
4

Actions

Likes
4
Downloads
0
Comments
0

1 Embed 4

http://www.linkedin.com 4

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • What is Cybersecurity:Threats attack vulnerabilities and caninclude: Internal threats External threatsPotential risks: Safety of personnel (injury, fatality) Production and financial loss Loss of sensitive dataKey Security Principles:Confidentiality – Prevent disclosure of private information. Integrity – Data cannot be modified without authorization. Availability – The information must be available when it is needed.
  • Hackers are not sitting still, as new mitigations are put in place, hacker find a new pathway inPeople/Employees can be a vulnerability soft spot – a trained and aware person is a less vulnerable person
  • Effective Cybersecurity cannot be addressed as an afterthought
  • Schneider Electric’s IRP is defined as a Corporate Directive and ProcedureIRP Tools: 8 Disciplines (8D) used to determine root cause Common Vulnerability Scoring System (CVSS) is used to prioritize the vulnerabilitiesIRP Tracking of activities:Issue to Prevention (I2P)Incorporates the 8D process