SlideShare a Scribd company logo
1 of 20
1
Cyber Security:
A Roadmap to Secure Solutions
Mike Pyle
VP Cyber Security
Tweet Live!
#SchneiderXE
2
Why Pay Attention to Cybersecurity
●Protecting assets against computer or network threats (CIA triad)
● Confidentiality: protect against unauthorised data disclosure
● Integrity: Ensure data and routines has not been modified or tampered
● Availability: Promote system uptime and operational capability
●Cyber attacks have “jumped the gap” from virtual to physical
world resulting in real physical damage to critical assets
●Cyber attacks can now put people at risk, cause production
downtime, create financial loss and can ex-filtrate sensitive data
3
Why Schneider Electric cares
Focus of attacks has shifted from the IT world towards critical
infrastructure. Schneider Electric’s customers may be in the cross hairs of
many groups looking to harm infrastructure
● Cyber warfare
● Criminal activities
● Revenge
● Maliciousness
● Send a political message or
build street creds in the hacker
community
IT Security
Confidentiality &
Integrity first
Availability important
Thousands of
devices
Cross industry
regulations
Transaction model
OT Security
Human Safety &
Reliability first
Integrity important
Millions of devices
Industry-specific
regulations
Real-time model
4
Key benefits
Key Trends & Drivers
Terrorism
Extortion
650% increase in cyber threats
during the last year
Successfully attacking best guarded
organizations
Terrorism
Extortion
Espionage
IT – Information Technology
OT – Operations Technology
Regulatory compliance is in a constant state of flux
Increasing budgetary pressures & fewer resources
Rapid pace of technology evolution – IT/OT convergence
5
DamageMethod
Source: TrendMicro – 12 Security Predictions for 2012
To: Control Room Operators
From: Help Desk
Please apply the latest
patches to ensure safety of
computer systems, click here
for the updates.
Shamoon
Stuxnet
Duqu
Scan the Internet
Spear phishing
Inject Malware
Motive
Rapid Evolution of Threat
Threat Landscape
6
Case in Point – The Shamoon Virus
Goal: Cyber Espionage and Damage.
Initially targeted oil and gas operations
in the Middle East
● Currently considered the most destructive
attack in the business sector
● More than 30,000 computers at an oil
company replaced
● Used to attacked a natural gas firm a few
days later
● Included a routine coded to self-execute,
replacing crucial system files with an
image of a burning U.S. flag
● Overwrote all real data on the machines
with garbage data
7
- Restrict access
- Comply with
regulations
- Assess Threat systems
- Protect equipment
- Secure local
and hosted sites
- Harden products
and architectures
- Comply with
regulations & standards
- Define regulations
- Mandate security
- Drive collaboration
Industry Suppliers
ICT, energy, transportation &
service providers
Planners & Developers
Real estate developers &
urban planners
Governments
National, regional and local
city officials
Utilities
City and private electric,
water & gas utilities
NGO’s & Associations
Local organizations:
citizens, businesses & NGOs
Other Infrastructure
Internet & MAN
providers, banks and
transportation
Smart Cities Require Comprehensive Security
People & Communities
Responsible stakeholder action & collaboration is a must
8
Compliance & Reporting Architecture
Information sharing Monitoring
Increasing Resiliency - Key Focus Areas
Connectivity
Third Party/Agnostic
• Compliant with current
standards
• Assessing upcoming
regulations
• Follow internal policies & best
practices
• Uniform security across
products
• Reinforce weakest link
• Tackle security at core of
product
• Secure communications
among products
• Use strong authentication to
access critical systems
• Vendors to disclose security
vulnerabilities to utilities
• Utilities to disclose critical
breaches to US Government
• Prevent, detect and react to
breaches in real-time
• Automatic monitoring tools &
human-driven solutions
• Vendors cannot create all
technology layers
• Fully test third party modules
to be safe from breaches
9
Value Proposition
• Threats surged 17x in 2 years due to devices interconnectivity, IT networks convergence &
heterogeneous architectures
• Operational networks with many unpatched legacy systems, making them as resilient as weakest link
• High levels of awareness and scrutiny by regulators and general public
Problem - Cyber Security & Change Management
• Schneider Electric to provide a secure & reliable core offering with additional security products & services
• Allow customers to have control over security and compliance, while enhancing operational
effectiveness, through an extended set of integrated solutions
Positioning
Schneider Electric – Our Differentiation
Best of Breed Certified Solutions
IT/OT Expertise &-
Domain Knowledge
10
Key Benefits
• Protect human life
• Avoid loss of service
• Avoid loss of productivity
• Avoid brand damage
• Mitigate and reduce impact on assets
• Limit damage on image and society
11
Listen to customer expectations,
analyze regulatory mandates and
translate into documented security
requirements and implement within
our offers
Develop using proper
security principles:
• Secure by design
• Threat model and risk
analysis
• Security features are
implemented properly
• Secure coding principles
applied
• Mature SDL program with
metrics
Secure Product Testing
• Robustness & Fuzz testing
• Vulnerability Scanning
• Penetration Testing
• Security feature validation
Document how to securely
install, commission, maintain,
decommission products to
manage a secure system
Security: Built in, not Bolted on..
Building secure products and solutions
12
Most Resilient SCADA Solution in the Market
• Last 15 years, invested ~$20M on security on OASyS
• Currently, investing around $1M yearly on security activities
• Dedicated security team
● Throughout the years, Schneider Electric has committed to security, by investing over
$20 million dollars, to provide safe, resilient and compliant products
● We are recognized within the industry as a real-time and secure solutions company
• Only firm providing solutions with secure & rapid escalation
• Best in class 3rd party integration model (SCADA)
• Ability to access external data in a secure manner
• World class security technology throughout all our products
• Anti-virus support
• Separation of Duties support
• Multi-factor authentication
• We meet and exceed main security standards in the market
• NERC Critical Infrastructure Protection (CIP)
• NIST Industrial Control Systems Security (SP 800-82)
Commitment
Capabilities
Key Technologies
Standards
Partnerships
13
Incident Response Plan is Crucial
●Objectives:
● Respond to events & customer’s concerns
● Rapidly & effectively address disclosures
●Types of Incidents:
● Intentional - deliberate attack on a customer’s
system
●Steal customer’s sensitive information
●Disrupt customer’s operations
● Unintentional - misuse of a customer
operation using the system
● Vulnerability disclosure; only reported as a
vulnerability; no evidence of disruption of a
customer operation
IRP Simplified Conceptual Flow
Vulnerability/ Incident
Reported
Analyze & Report
Action Plan &
Contain
Communicate &
Publish
Mitigate & Resolve
Communicate
Resolution & Close
14
DIACAP Lifecycle
DIACAP:: DoD Information Assurance Certification & Accreditation Process
Required for all DoD projects
Meeting Customer Requirements
15
Comprehensive Approach to Security
Consulting, Integration and Managed Security Services
Monitoring, Compliance, Change Management, Whitelisting, Big Data Security, Firewalls
Oil & Gas Electric WWW Transportation MMM
Schneider Electric’s Core OfferingSecure coding, Encryption, Access, Authorization & Authentication, etc.
Security
Services
Security
Products
Schneider Electric stands by a safe, reliable and secure core offering
Cyber security products & services, increasing prevention, detection & response
Providing portfolio of services through recognized Schneider Electric’s consulting arm & local players
A Defense in-Depth approach offering a combination of physical controls, monitoring and analytics
Built-in
Security
16
Industrial DMZ
Boundaries Control Room
Operation
Business Systems
Control Network
Operation Network
Enterprise Network
Device Network
MES, WMS, DMS, LMS…
SCADA, DCS, Controllers, Local & Remote
Communications Network Devices…
Instruments and Controls, Distributed IO, …
Enterprise
Performance
Systems
Field Devices
Core Offering
Cyber Security Products & Services
Security Products – Partnership Ecosystem
Monitoring
Compliance
Management
Change
Management
Application
Whitelisting
Intrusion
Detection
System
Firewalls
Outsourcing:ManagedServices,Maintenance&Cloud
Cyber Security Services
Integration
Consulting:Assessment&Design
17
For More Information
http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page
Schneider Electric 18- Infrastructure Business – Rodrigo Kaschny – March 2012
Make the most of
your energy
business
Appendix
Schneider Electric 20- Infrastructure Business – Rodrigo Kaschny – March 2012
Key Terms
DIACAP:
DoD Information
Assurance Certification &
Accreditation Process
CoN:
Certificate of
Networthiness
DISA:
Defense Information
Systems Agency
ICS-CERT:
Industrial Control System
Cyber Emergency
Response Team; A part of
the U.S. Dept. of
Homeland Security US-
CERT Organization
IA:
Information Assurance
DAA:
Designated Approval
Authority
STIG’s:
Security Technical
Implementation Guides
IRP:
Incident Response Plan

More Related Content

What's hot

Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Information Security Management Systems(ISMS) By Dr Wafula
Information Security Management Systems(ISMS) By Dr  WafulaInformation Security Management Systems(ISMS) By Dr  Wafula
Information Security Management Systems(ISMS) By Dr WafulaDiscover JKUAT
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتReZa AdineH
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewNaresh Rao
 
Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Anshu Gupta
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1Tanmay Shinde
 
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardQuick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardPECB
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehReZa AdineH
 
NQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation GuideNQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation GuideNA Putra
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSFDigital Bond
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Priyanka Aash
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 

What's hot (20)

Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR Roundtable
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Information Security Management Systems(ISMS) By Dr Wafula
Information Security Management Systems(ISMS) By Dr  WafulaInformation Security Management Systems(ISMS) By Dr  Wafula
Information Security Management Systems(ISMS) By Dr Wafula
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
 
Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1
 
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardQuick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
NQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation GuideNQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation Guide
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 

Similar to Cyber security: A roadmap to secure solutions

Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareCloudera, Inc.
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance EnergyTech2015
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionDale Butler
 
Zero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeZero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeArnold Antoo
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
 
Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools SolarWinds
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DaySymantec
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxS .Ali Raza
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsSolarWinds
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Software
 

Similar to Cyber security: A roadmap to secure solutions (20)

Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
 
Zero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeZero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital Age
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWinds
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, Entreda
 

More from Schneider Electric

Secure Power Design Considerations
Secure Power Design ConsiderationsSecure Power Design Considerations
Secure Power Design ConsiderationsSchneider Electric
 
Digital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting InvestorsDigital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting InvestorsSchneider Electric
 
32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing 32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing Schneider Electric
 
Key Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation TrendsKey Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation TrendsSchneider Electric
 
EcoStruxure™ for Cloud & Service Providers
 EcoStruxure™ for Cloud & Service Providers EcoStruxure™ for Cloud & Service Providers
EcoStruxure™ for Cloud & Service ProvidersSchneider Electric
 
Zelio Time Electronic Relay Briefing
Zelio Time Electronic Relay BriefingZelio Time Electronic Relay Briefing
Zelio Time Electronic Relay BriefingSchneider Electric
 
Spacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures BriefingSpacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures BriefingSchneider Electric
 
Relay Control Zelio SSR Briefing
Relay Control Zelio SSR BriefingRelay Control Zelio SSR Briefing
Relay Control Zelio SSR BriefingSchneider Electric
 
Magelis HMI, iPC and software Briefing
Magelis HMI, iPC and software BriefingMagelis HMI, iPC and software Briefing
Magelis HMI, iPC and software BriefingSchneider Electric
 
Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?Schneider Electric
 
EcoStruxure for Intuitive Industries
EcoStruxure for Intuitive IndustriesEcoStruxure for Intuitive Industries
EcoStruxure for Intuitive IndustriesSchneider Electric
 
Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017Schneider Electric
 
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.Schneider Electric
 
It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580Schneider Electric
 
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...Schneider Electric
 
Connected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoTConnected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoTSchneider Electric
 
Telemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories BriefingTelemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories BriefingSchneider Electric
 
Telemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors BriefingTelemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors BriefingSchneider Electric
 
Telemecanique Limit Switches Briefing
Telemecanique Limit Switches BriefingTelemecanique Limit Switches Briefing
Telemecanique Limit Switches BriefingSchneider Electric
 

More from Schneider Electric (20)

Secure Power Design Considerations
Secure Power Design ConsiderationsSecure Power Design Considerations
Secure Power Design Considerations
 
Digital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting InvestorsDigital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting Investors
 
32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing 32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing
 
Key Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation TrendsKey Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation Trends
 
EcoStruxure™ for Cloud & Service Providers
 EcoStruxure™ for Cloud & Service Providers EcoStruxure™ for Cloud & Service Providers
EcoStruxure™ for Cloud & Service Providers
 
Magelis Basic HMI Briefing
Magelis Basic HMI Briefing Magelis Basic HMI Briefing
Magelis Basic HMI Briefing
 
Zelio Time Electronic Relay Briefing
Zelio Time Electronic Relay BriefingZelio Time Electronic Relay Briefing
Zelio Time Electronic Relay Briefing
 
Spacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures BriefingSpacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures Briefing
 
Relay Control Zelio SSR Briefing
Relay Control Zelio SSR BriefingRelay Control Zelio SSR Briefing
Relay Control Zelio SSR Briefing
 
Magelis HMI, iPC and software Briefing
Magelis HMI, iPC and software BriefingMagelis HMI, iPC and software Briefing
Magelis HMI, iPC and software Briefing
 
Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?
 
EcoStruxure for Intuitive Industries
EcoStruxure for Intuitive IndustriesEcoStruxure for Intuitive Industries
EcoStruxure for Intuitive Industries
 
Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017
 
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
 
It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580
 
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
 
Connected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoTConnected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoT
 
Telemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories BriefingTelemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories Briefing
 
Telemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors BriefingTelemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors Briefing
 
Telemecanique Limit Switches Briefing
Telemecanique Limit Switches BriefingTelemecanique Limit Switches Briefing
Telemecanique Limit Switches Briefing
 

Recently uploaded

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Recently uploaded (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Cyber security: A roadmap to secure solutions

  • 1. 1 Cyber Security: A Roadmap to Secure Solutions Mike Pyle VP Cyber Security Tweet Live! #SchneiderXE
  • 2. 2 Why Pay Attention to Cybersecurity ●Protecting assets against computer or network threats (CIA triad) ● Confidentiality: protect against unauthorised data disclosure ● Integrity: Ensure data and routines has not been modified or tampered ● Availability: Promote system uptime and operational capability ●Cyber attacks have “jumped the gap” from virtual to physical world resulting in real physical damage to critical assets ●Cyber attacks can now put people at risk, cause production downtime, create financial loss and can ex-filtrate sensitive data
  • 3. 3 Why Schneider Electric cares Focus of attacks has shifted from the IT world towards critical infrastructure. Schneider Electric’s customers may be in the cross hairs of many groups looking to harm infrastructure ● Cyber warfare ● Criminal activities ● Revenge ● Maliciousness ● Send a political message or build street creds in the hacker community IT Security Confidentiality & Integrity first Availability important Thousands of devices Cross industry regulations Transaction model OT Security Human Safety & Reliability first Integrity important Millions of devices Industry-specific regulations Real-time model
  • 4. 4 Key benefits Key Trends & Drivers Terrorism Extortion 650% increase in cyber threats during the last year Successfully attacking best guarded organizations Terrorism Extortion Espionage IT – Information Technology OT – Operations Technology Regulatory compliance is in a constant state of flux Increasing budgetary pressures & fewer resources Rapid pace of technology evolution – IT/OT convergence
  • 5. 5 DamageMethod Source: TrendMicro – 12 Security Predictions for 2012 To: Control Room Operators From: Help Desk Please apply the latest patches to ensure safety of computer systems, click here for the updates. Shamoon Stuxnet Duqu Scan the Internet Spear phishing Inject Malware Motive Rapid Evolution of Threat Threat Landscape
  • 6. 6 Case in Point – The Shamoon Virus Goal: Cyber Espionage and Damage. Initially targeted oil and gas operations in the Middle East ● Currently considered the most destructive attack in the business sector ● More than 30,000 computers at an oil company replaced ● Used to attacked a natural gas firm a few days later ● Included a routine coded to self-execute, replacing crucial system files with an image of a burning U.S. flag ● Overwrote all real data on the machines with garbage data
  • 7. 7 - Restrict access - Comply with regulations - Assess Threat systems - Protect equipment - Secure local and hosted sites - Harden products and architectures - Comply with regulations & standards - Define regulations - Mandate security - Drive collaboration Industry Suppliers ICT, energy, transportation & service providers Planners & Developers Real estate developers & urban planners Governments National, regional and local city officials Utilities City and private electric, water & gas utilities NGO’s & Associations Local organizations: citizens, businesses & NGOs Other Infrastructure Internet & MAN providers, banks and transportation Smart Cities Require Comprehensive Security People & Communities Responsible stakeholder action & collaboration is a must
  • 8. 8 Compliance & Reporting Architecture Information sharing Monitoring Increasing Resiliency - Key Focus Areas Connectivity Third Party/Agnostic • Compliant with current standards • Assessing upcoming regulations • Follow internal policies & best practices • Uniform security across products • Reinforce weakest link • Tackle security at core of product • Secure communications among products • Use strong authentication to access critical systems • Vendors to disclose security vulnerabilities to utilities • Utilities to disclose critical breaches to US Government • Prevent, detect and react to breaches in real-time • Automatic monitoring tools & human-driven solutions • Vendors cannot create all technology layers • Fully test third party modules to be safe from breaches
  • 9. 9 Value Proposition • Threats surged 17x in 2 years due to devices interconnectivity, IT networks convergence & heterogeneous architectures • Operational networks with many unpatched legacy systems, making them as resilient as weakest link • High levels of awareness and scrutiny by regulators and general public Problem - Cyber Security & Change Management • Schneider Electric to provide a secure & reliable core offering with additional security products & services • Allow customers to have control over security and compliance, while enhancing operational effectiveness, through an extended set of integrated solutions Positioning Schneider Electric – Our Differentiation Best of Breed Certified Solutions IT/OT Expertise &- Domain Knowledge
  • 10. 10 Key Benefits • Protect human life • Avoid loss of service • Avoid loss of productivity • Avoid brand damage • Mitigate and reduce impact on assets • Limit damage on image and society
  • 11. 11 Listen to customer expectations, analyze regulatory mandates and translate into documented security requirements and implement within our offers Develop using proper security principles: • Secure by design • Threat model and risk analysis • Security features are implemented properly • Secure coding principles applied • Mature SDL program with metrics Secure Product Testing • Robustness & Fuzz testing • Vulnerability Scanning • Penetration Testing • Security feature validation Document how to securely install, commission, maintain, decommission products to manage a secure system Security: Built in, not Bolted on.. Building secure products and solutions
  • 12. 12 Most Resilient SCADA Solution in the Market • Last 15 years, invested ~$20M on security on OASyS • Currently, investing around $1M yearly on security activities • Dedicated security team ● Throughout the years, Schneider Electric has committed to security, by investing over $20 million dollars, to provide safe, resilient and compliant products ● We are recognized within the industry as a real-time and secure solutions company • Only firm providing solutions with secure & rapid escalation • Best in class 3rd party integration model (SCADA) • Ability to access external data in a secure manner • World class security technology throughout all our products • Anti-virus support • Separation of Duties support • Multi-factor authentication • We meet and exceed main security standards in the market • NERC Critical Infrastructure Protection (CIP) • NIST Industrial Control Systems Security (SP 800-82) Commitment Capabilities Key Technologies Standards Partnerships
  • 13. 13 Incident Response Plan is Crucial ●Objectives: ● Respond to events & customer’s concerns ● Rapidly & effectively address disclosures ●Types of Incidents: ● Intentional - deliberate attack on a customer’s system ●Steal customer’s sensitive information ●Disrupt customer’s operations ● Unintentional - misuse of a customer operation using the system ● Vulnerability disclosure; only reported as a vulnerability; no evidence of disruption of a customer operation IRP Simplified Conceptual Flow Vulnerability/ Incident Reported Analyze & Report Action Plan & Contain Communicate & Publish Mitigate & Resolve Communicate Resolution & Close
  • 14. 14 DIACAP Lifecycle DIACAP:: DoD Information Assurance Certification & Accreditation Process Required for all DoD projects Meeting Customer Requirements
  • 15. 15 Comprehensive Approach to Security Consulting, Integration and Managed Security Services Monitoring, Compliance, Change Management, Whitelisting, Big Data Security, Firewalls Oil & Gas Electric WWW Transportation MMM Schneider Electric’s Core OfferingSecure coding, Encryption, Access, Authorization & Authentication, etc. Security Services Security Products Schneider Electric stands by a safe, reliable and secure core offering Cyber security products & services, increasing prevention, detection & response Providing portfolio of services through recognized Schneider Electric’s consulting arm & local players A Defense in-Depth approach offering a combination of physical controls, monitoring and analytics Built-in Security
  • 16. 16 Industrial DMZ Boundaries Control Room Operation Business Systems Control Network Operation Network Enterprise Network Device Network MES, WMS, DMS, LMS… SCADA, DCS, Controllers, Local & Remote Communications Network Devices… Instruments and Controls, Distributed IO, … Enterprise Performance Systems Field Devices Core Offering Cyber Security Products & Services Security Products – Partnership Ecosystem Monitoring Compliance Management Change Management Application Whitelisting Intrusion Detection System Firewalls Outsourcing:ManagedServices,Maintenance&Cloud Cyber Security Services Integration Consulting:Assessment&Design
  • 18. Schneider Electric 18- Infrastructure Business – Rodrigo Kaschny – March 2012 Make the most of your energy business
  • 20. Schneider Electric 20- Infrastructure Business – Rodrigo Kaschny – March 2012 Key Terms DIACAP: DoD Information Assurance Certification & Accreditation Process CoN: Certificate of Networthiness DISA: Defense Information Systems Agency ICS-CERT: Industrial Control System Cyber Emergency Response Team; A part of the U.S. Dept. of Homeland Security US- CERT Organization IA: Information Assurance DAA: Designated Approval Authority STIG’s: Security Technical Implementation Guides IRP: Incident Response Plan

Editor's Notes

  1. What is Cybersecurity:Threats attack vulnerabilities and caninclude: Internal threats External threatsPotential risks: Safety of personnel (injury, fatality) Production and financial loss Loss of sensitive dataKey Security Principles:Confidentiality – Prevent disclosure of private information. Integrity – Data cannot be modified without authorization. Availability – The information must be available when it is needed.
  2. Hackers are not sitting still, as new mitigations are put in place, hacker find a new pathway inPeople/Employees can be a vulnerability soft spot – a trained and aware person is a less vulnerable person
  3. Effective Cybersecurity cannot be addressed as an afterthought
  4. Schneider Electric’s IRP is defined as a Corporate Directive and ProcedureIRP Tools: 8 Disciplines (8D) used to determine root cause Common Vulnerability Scoring System (CVSS) is used to prioritize the vulnerabilitiesIRP Tracking of activities:Issue to Prevention (I2P)Incorporates the 8D process