SlideShare a Scribd company logo
1 of 38
Download to read offline
+
Cyber Risk in Advanced
Manufacturing
Marco Armoni
Cyber Security Expert – A.I. Researcher
AIPSI – Italian Chapter of ISSA
AIPSI, Associazione Italiana Professionisti Sicurezza Informatica
 Capitolo italiano di ISSA, Information Systems Security Association, (www.issa.org)
• >>10.000 Soci, la più grande associazione non-profit di professionisti della Sicurezza ICT
 AIPSI è il punto di aggregazione sul territorio e di trasferimento di know-how per i professionisti della sicurezza
digitale, sia dipendenti sia liberi professionisti ed imprenditori del settore
 Primari obiettivi AIPSI
• Aiutare i propri Soci nella crescita professionale e quindi nella crescita del loro business
• offrire ai propri Soci servizi qualificati per tale crescita, che includono
• Convegni, workshop, webinar sia a livello nazionale che internazionale via ISSA
• Rapporti annuali e specifici OAD, Osservatorio attacchi Digitali in Italia
• Supporto nell’intero ciclo di vita professionale
• Formazione specializzata e supporto alle certificazioni, in particolare eCF Plus (EN 16234-1:2016, in Italia UNI
11506) Contribuire alla diffusione della cultura e la sensibilizzazione per la sicurezza informatica agli utenti
digitali
 Collaborazione con varie Associazioni ed Enti per eventi ed iniziative congiunte: AICA, Assintel, Assolombarda, Anorc,
CSA Italy, FidaInform, FTI, Inforav, Polizia Postale, Smau, i vari ClubTI sul territorio, ecc.
 Sede Centrale: Milano Sedi territoriali : Ancona-Macerata, Lecce, Torino, Verona-Venezia
 Contatti: aipsi@aipsi.org, segreteria@aipsi.org
Iniziativa OAD, Osservatorio Attacchi Digitali in Italia (ex OAI)
• Che cosa è
• Indagine via web sugli attacchi digitali intenzionali ai sistemi informatici in Italia
• Obiettivi iniziativa
• Fornire informazioni sulla reale situazione degli attacchi digitali in Italia
• Contribuire alla creazione di una cultura della sicurezza informatica in Italia, sensibilizzando in particolare i vertici delle
aziende/enti ed i decisori sulla sicurezza informatica
• Che cosa fa
• Indagine generale annuale e specifiche su argomenti caldi, condotte attraverso un questionario on-line indirizzato a CIO, CISO,
CSO, ai proprietari/CEO per le piccole aziende
• Come
• Rigore, trasparenza, correttezza, assoluta indipendenza (anche dagli Sponsor)
• Rigoroso anonimato per i rispondenti ai questionari
• Collaborazione con numerose Associazioni (Patrocinatori) per ampliare il bacino dei rispondenti e dei lettori
Tutti i Rapporti OAD ( e OAI) pubblicati dal 2008 ad oggi sono scaricabili gratuitamente da
https://www.aipsi.org/aree-tematiche/osservatorio-attacchi-digitali/precedenti-rapporti-oad-oai.html
AIPSI sta organizzando l’edizione OAD 2018: sul sito AIPSI troverete il Questionario chi vi invitiamo a compilare !!
Cyber Risk in Advanced Manufacturing
Manufacturers drive extensive innovation in products,
manufacturing process,
and industrial ecosystem relationships,
in order to compete in a changing global marketplace.
Cyber Risk in Advanced Manufacturing
Key cyber risk themes
 Executive and board level engagement
 Talent and human capital
 Industrial control systems (ICS)
 Connected products
 Industrial ecosystem
 Intellectual property
Cyber Risk in Advanced Manufacturing
Themes Evidences
 Engage the board to develop a business-driven cyber risk program
 Be purposeful in addressing talent-related challenges
 Remain vigilant in protecting critical IP investments
 Harden security, implement monitoring, and incident response for industrial control systems
 Design cyber risk management mechanisms into connected products before deployment
 Identify and address emerging cyber risks in the industrial ecosystem
 The changing nature of the cyberthreat landscape
Cyber Risk in Advanced Manufacturing
Threats
Normal Threats Consideration
Cyber Risk in Advanced Manufacturing
Cyber Risk in Advanced Manufacturing
Norse World
Cyber Attack Map
Cyber Risk in Advanced Manufacturing
Do You Have Considered
Manufacturing ?
Cyber Risk in Advanced Manufacturing
PLC / ICT Integration Layer
Threats
(Cyber Attack)
Threats
(Old Firmware
Default Option)
Cyber Risk in Advanced Manufacturing
Manufacturing
Security
Cyber Safety Maintenance
Cyber Risk in Advanced Manufacturing
Proposal for an A.I. Security and Maintenance
Monitoring System
Cyber Risk in Advanced Manufacturing
Project Reseach History
Earth Modeling (Parallel Computing for Large Data)
First Diagnostic Helper System (Decisional Matrix)
(Isabel Project)  Spinoff
Diagnostic Helper System I Release (Neural Network)
Diagnosis from real time data
Diagnostic Helper System II Release (Neural Network + Bayesian Network)
Diagnosis and Prediction from real time data
Cyber Risk in Advanced Manufacturing
 Manufacturing Sensor System
Cyber Risk in Advanced Manufacturing
 Manufacturing Sensor System
Cyber Risk in Advanced Manufacturing
Neuron
Neuron Replication
Neural Network
Neural Elaboration
Cyber Risk in Advanced Manufacturing
 Neuron Function
Cyber Risk in Advanced Manufacturing
 Neuronal Network
Cyber Risk in Advanced Manufacturing
 Simple Neural Network Learning (Perceptron)
Cyber Risk in Advanced Manufacturing
 Cyber Threat Detection Using Neural Network
Cyber Risk in Advanced Manufacturing
 First System Module (Data Acquisition  Analysis Module)
Automated
Manufacturing
System Lines
(Sensors)
Analysis Module
(Dataset Comparison 
Decision Matrix 
Regression Process)
Cyber Risk in Advanced Manufactoring
 Dataset Comparison  Decision Matrix
From Neural Processor
AlarmConsole
TriggerActions
Regression To Learn Data
Cyber Risk in Advanced Manufacturing
 Decision Tree Simulation
Cyber Risk in Advanced Manufacturing
 Decision Tree Pratical Example
Cyber Risk in Advanced Manufacturing
 Bayesian Network & Prediction Module
Analysis Module
(Dataset Comparison 
Decision Matrix 
Regression Process)
Prediction
Message
Bayesian
Network
Cyber Risk in Advanced Manufacturing
 Bayesian Probability Formula
Cyber Risk in Advanced Manufacturing
 Bayesian Network Distribution
Cyber Risk in Advanced Manufacturing
 Bayesian Network Example
Cyber Risk in Advanced Manufacturing
 BBN for System Health
Cyber Risk in Advanced Manufacturing
 BBN  NPT (Node Probability Table)
Cyber Risk in Advanced Manufacturing
 BBN  NPT Graphic Representation
Cyber Risk in Advanced Manufacturing
 Classification with Bayesian Network
Number to recognize
Percentage of recognition
Cyber Risk in Advanced Manufacturing
 Health and Cyber Threats Monitoring and Management System Structure
DataAcquisition
NeuralNetwork
Classification
IssueAnalysis
DecisionMatrix
Bayesian
Network
Prediction
Alarm Console
Triggered Action
Probability
Determination
Cyber Risk in Advanced Manufacturing
 Health and Cyber Threats Monitoring and Management System Structure
 Deterministic (Neuron) and Probabilistic (Bayes) Approach
 Simple to Understand  Logical Approach with Simple Logical
Mathematical Theories
 Simple to Compile  Python Language Oriented
 Simple to integrate with more PLC System through Data Gateway
 Simple to Organize for many Manufacturing System
Cyber Risk in Advanced Manufacturing
 Effect of Cyber Attack on PLC (Real Simulation from CNN)
First Effect after Hacking
Machine Crash after Hacking
Cyber Risk in Advanced Manufacturing
 Health and Cyber Threats Monitoring and Management System Structure
The Future ?
 Autogeneration Neurons + Autogeneration Synapsis to increase data
mining (classification & elaboration)
 Data Gathering direct from Signals (collect direct on sensors with IP
sensors)
Cyber Risk in Advanced Manufacturing
Thank You
For Information and Mathematical Paper email to: marco.armoni@studioarmoni.com
Marco Armoni
Cyber Security Expert – A.I. Researcher

More Related Content

What's hot

Enisa report guidelines for securing the internet of things
Enisa report   guidelines for securing the internet of thingsEnisa report   guidelines for securing the internet of things
Enisa report guidelines for securing the internet of things
najascj
 

What's hot (20)

Enisa report guidelines for securing the internet of things
Enisa report   guidelines for securing the internet of thingsEnisa report   guidelines for securing the internet of things
Enisa report guidelines for securing the internet of things
 
Itu ics-pii
Itu ics-piiItu ics-pii
Itu ics-pii
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 converted
 
ISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber SecurityISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber Security
 
European smart grid cyber and scada security
European smart grid cyber and scada securityEuropean smart grid cyber and scada security
European smart grid cyber and scada security
 
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
 
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
 
Securing the ‘Wild Wild West’: USM for Universities
Securing the ‘Wild Wild West’: USM for UniversitiesSecuring the ‘Wild Wild West’: USM for Universities
Securing the ‘Wild Wild West’: USM for Universities
 
Nist
NistNist
Nist
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoT
 
Cybersecurity Summit AHR20 NIST framework Cimetrics
Cybersecurity Summit AHR20 NIST framework CimetricsCybersecurity Summit AHR20 NIST framework Cimetrics
Cybersecurity Summit AHR20 NIST framework Cimetrics
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT Networks
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018
 
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrustRoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
 
Embracing Cybersecurity on Cloud Computing
Embracing Cybersecurity on Cloud ComputingEmbracing Cybersecurity on Cloud Computing
Embracing Cybersecurity on Cloud Computing
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultant
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 

Similar to Marco Armoni AIPSI - SMAU Milano 2017

Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
amiable_indian
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
LabSharegroup
 

Similar to Marco Armoni AIPSI - SMAU Milano 2017 (20)

How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
 
Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical Systems
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Ijasp
IjaspIjasp
Ijasp
 
Ijasp
IjaspIjasp
Ijasp
 
Ijasp
IjaspIjasp
Ijasp
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
 
Evolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEvolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architecture
 
Ijasp
IjaspIjasp
Ijasp
 

More from SMAU

More from SMAU (20)

L'intelligenza artificiale per il marketing automation: come automatizzare le...
L'intelligenza artificiale per il marketing automation: come automatizzare le...L'intelligenza artificiale per il marketing automation: come automatizzare le...
L'intelligenza artificiale per il marketing automation: come automatizzare le...
 
Il supporto IA nella Lead Generation con Linkedin e Sales Navigator
Il supporto IA nella Lead Generation con Linkedin e Sales NavigatorIl supporto IA nella Lead Generation con Linkedin e Sales Navigator
Il supporto IA nella Lead Generation con Linkedin e Sales Navigator
 
SMAU MILANO 2023 | Intrapreneurship: I dipendenti come driver dell'innovazione
SMAU MILANO 2023 | Intrapreneurship: I dipendenti come driver dell'innovazioneSMAU MILANO 2023 | Intrapreneurship: I dipendenti come driver dell'innovazione
SMAU MILANO 2023 | Intrapreneurship: I dipendenti come driver dell'innovazione
 
SMAU MILANO 2023 | TECNOLOGIE IMMERSIVE E METAVERSO: SOLUZIONI INNOVATIVE PER...
SMAU MILANO 2023 | TECNOLOGIE IMMERSIVE E METAVERSO: SOLUZIONI INNOVATIVE PER...SMAU MILANO 2023 | TECNOLOGIE IMMERSIVE E METAVERSO: SOLUZIONI INNOVATIVE PER...
SMAU MILANO 2023 | TECNOLOGIE IMMERSIVE E METAVERSO: SOLUZIONI INNOVATIVE PER...
 
SMAU MILANO 2023 | SMAU MILANO 2023 | Le nuove frontiere dell'ESGtech
SMAU MILANO 2023 | SMAU MILANO 2023 | Le nuove frontiere dell'ESGtechSMAU MILANO 2023 | SMAU MILANO 2023 | Le nuove frontiere dell'ESGtech
SMAU MILANO 2023 | SMAU MILANO 2023 | Le nuove frontiere dell'ESGtech
 
SMAU MILANO 2023 | AI: Un Alleato Innovativo per l'Omnichannel Customer Exper...
SMAU MILANO 2023 | AI: Un Alleato Innovativo per l'Omnichannel Customer Exper...SMAU MILANO 2023 | AI: Un Alleato Innovativo per l'Omnichannel Customer Exper...
SMAU MILANO 2023 | AI: Un Alleato Innovativo per l'Omnichannel Customer Exper...
 
SMAU MILANO 2023 | 𝐃𝐢𝐠𝐢𝐭𝐚𝐥 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠 𝐉𝐨𝐮𝐫𝐧𝐞𝐲 La nuova frontiera della formazio...
SMAU MILANO 2023 | 𝐃𝐢𝐠𝐢𝐭𝐚𝐥 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠 𝐉𝐨𝐮𝐫𝐧𝐞𝐲 La nuova frontiera della formazio...SMAU MILANO 2023 | 𝐃𝐢𝐠𝐢𝐭𝐚𝐥 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠 𝐉𝐨𝐮𝐫𝐧𝐞𝐲 La nuova frontiera della formazio...
SMAU MILANO 2023 | 𝐃𝐢𝐠𝐢𝐭𝐚𝐥 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠 𝐉𝐨𝐮𝐫𝐧𝐞𝐲 La nuova frontiera della formazio...
 
SMAU MILANO 2023 | COME PROGETTARE SOLUZIONI CIRCOLARI E MODELLI DI BUSINESS ...
SMAU MILANO 2023 | COME PROGETTARE SOLUZIONI CIRCOLARI E MODELLI DI BUSINESS ...SMAU MILANO 2023 | COME PROGETTARE SOLUZIONI CIRCOLARI E MODELLI DI BUSINESS ...
SMAU MILANO 2023 | COME PROGETTARE SOLUZIONI CIRCOLARI E MODELLI DI BUSINESS ...
 
SMAU MILANO 2023 | Google Business Profile tra SEO e Social Media
SMAU MILANO 2023 | Google Business Profile tra SEO e Social MediaSMAU MILANO 2023 | Google Business Profile tra SEO e Social Media
SMAU MILANO 2023 | Google Business Profile tra SEO e Social Media
 
SMAU MILANO 2023 | Il PM incontra la proprietà intellettuale: pianificare la ...
SMAU MILANO 2023 | Il PM incontra la proprietà intellettuale: pianificare la ...SMAU MILANO 2023 | Il PM incontra la proprietà intellettuale: pianificare la ...
SMAU MILANO 2023 | Il PM incontra la proprietà intellettuale: pianificare la ...
 
SMAU MILANO 2023 | Il neuromarketing: solo 8 secondi per catturare l’attenzio...
SMAU MILANO 2023 | Il neuromarketing: solo 8 secondi per catturare l’attenzio...SMAU MILANO 2023 | Il neuromarketing: solo 8 secondi per catturare l’attenzio...
SMAU MILANO 2023 | Il neuromarketing: solo 8 secondi per catturare l’attenzio...
 
SMAU MILANO 2023 | Collaborazioni vincenti: Come le startup possono creare pa...
SMAU MILANO 2023 | Collaborazioni vincenti: Come le startup possono creare pa...SMAU MILANO 2023 | Collaborazioni vincenti: Come le startup possono creare pa...
SMAU MILANO 2023 | Collaborazioni vincenti: Come le startup possono creare pa...
 
SMAU MILANO 2023 | Funnel Hacking: massimizzare il ROAS in 7 passaggi
SMAU MILANO 2023 | Funnel Hacking: massimizzare il ROAS in 7 passaggiSMAU MILANO 2023 | Funnel Hacking: massimizzare il ROAS in 7 passaggi
SMAU MILANO 2023 | Funnel Hacking: massimizzare il ROAS in 7 passaggi
 
SMAU MILANO 2023 | Una reputazione che ti precede: come il personal storytell...
SMAU MILANO 2023 | Una reputazione che ti precede: come il personal storytell...SMAU MILANO 2023 | Una reputazione che ti precede: come il personal storytell...
SMAU MILANO 2023 | Una reputazione che ti precede: come il personal storytell...
 
SMAU MILANO 2023 | Come scalare una produzione video: il caso “Vongola Lupino...
SMAU MILANO 2023 | Come scalare una produzione video: il caso “Vongola Lupino...SMAU MILANO 2023 | Come scalare una produzione video: il caso “Vongola Lupino...
SMAU MILANO 2023 | Come scalare una produzione video: il caso “Vongola Lupino...
 
SMAU MILANO 2023 | IA Generativa per aziende - come addestrare i modelli ling...
SMAU MILANO 2023 | IA Generativa per aziende - come addestrare i modelli ling...SMAU MILANO 2023 | IA Generativa per aziende - come addestrare i modelli ling...
SMAU MILANO 2023 | IA Generativa per aziende - come addestrare i modelli ling...
 
SMAU MILANO 2023 | L'intelligenza artificiale per davvero (facciamola sul ser...
SMAU MILANO 2023 | L'intelligenza artificiale per davvero (facciamola sul ser...SMAU MILANO 2023 | L'intelligenza artificiale per davvero (facciamola sul ser...
SMAU MILANO 2023 | L'intelligenza artificiale per davvero (facciamola sul ser...
 
SMAU MILANO 2023 | Personal Branding: come comunicare in maniera efficace la...
SMAU MILANO 2023 |  Personal Branding: come comunicare in maniera efficace la...SMAU MILANO 2023 |  Personal Branding: come comunicare in maniera efficace la...
SMAU MILANO 2023 | Personal Branding: come comunicare in maniera efficace la...
 
SMAU MILANO 2023 | What's Next? Rivoluzioni industriali, intelligenza artific...
SMAU MILANO 2023 | What's Next? Rivoluzioni industriali, intelligenza artific...SMAU MILANO 2023 | What's Next? Rivoluzioni industriali, intelligenza artific...
SMAU MILANO 2023 | What's Next? Rivoluzioni industriali, intelligenza artific...
 
SMAU MILANO 2023 | SMAU MILANO 2023 | Intelligenza Artificiale e chatbots
SMAU MILANO 2023 | SMAU MILANO 2023 | Intelligenza Artificiale e chatbotsSMAU MILANO 2023 | SMAU MILANO 2023 | Intelligenza Artificiale e chatbots
SMAU MILANO 2023 | SMAU MILANO 2023 | Intelligenza Artificiale e chatbots
 

Recently uploaded

Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
shivangimorya083
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
SofiyaSharma5
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 

Recently uploaded (20)

Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 

Marco Armoni AIPSI - SMAU Milano 2017

  • 1. + Cyber Risk in Advanced Manufacturing Marco Armoni Cyber Security Expert – A.I. Researcher AIPSI – Italian Chapter of ISSA
  • 2. AIPSI, Associazione Italiana Professionisti Sicurezza Informatica  Capitolo italiano di ISSA, Information Systems Security Association, (www.issa.org) • >>10.000 Soci, la più grande associazione non-profit di professionisti della Sicurezza ICT  AIPSI è il punto di aggregazione sul territorio e di trasferimento di know-how per i professionisti della sicurezza digitale, sia dipendenti sia liberi professionisti ed imprenditori del settore  Primari obiettivi AIPSI • Aiutare i propri Soci nella crescita professionale e quindi nella crescita del loro business • offrire ai propri Soci servizi qualificati per tale crescita, che includono • Convegni, workshop, webinar sia a livello nazionale che internazionale via ISSA • Rapporti annuali e specifici OAD, Osservatorio attacchi Digitali in Italia • Supporto nell’intero ciclo di vita professionale • Formazione specializzata e supporto alle certificazioni, in particolare eCF Plus (EN 16234-1:2016, in Italia UNI 11506) Contribuire alla diffusione della cultura e la sensibilizzazione per la sicurezza informatica agli utenti digitali  Collaborazione con varie Associazioni ed Enti per eventi ed iniziative congiunte: AICA, Assintel, Assolombarda, Anorc, CSA Italy, FidaInform, FTI, Inforav, Polizia Postale, Smau, i vari ClubTI sul territorio, ecc.  Sede Centrale: Milano Sedi territoriali : Ancona-Macerata, Lecce, Torino, Verona-Venezia  Contatti: aipsi@aipsi.org, segreteria@aipsi.org
  • 3. Iniziativa OAD, Osservatorio Attacchi Digitali in Italia (ex OAI) • Che cosa è • Indagine via web sugli attacchi digitali intenzionali ai sistemi informatici in Italia • Obiettivi iniziativa • Fornire informazioni sulla reale situazione degli attacchi digitali in Italia • Contribuire alla creazione di una cultura della sicurezza informatica in Italia, sensibilizzando in particolare i vertici delle aziende/enti ed i decisori sulla sicurezza informatica • Che cosa fa • Indagine generale annuale e specifiche su argomenti caldi, condotte attraverso un questionario on-line indirizzato a CIO, CISO, CSO, ai proprietari/CEO per le piccole aziende • Come • Rigore, trasparenza, correttezza, assoluta indipendenza (anche dagli Sponsor) • Rigoroso anonimato per i rispondenti ai questionari • Collaborazione con numerose Associazioni (Patrocinatori) per ampliare il bacino dei rispondenti e dei lettori Tutti i Rapporti OAD ( e OAI) pubblicati dal 2008 ad oggi sono scaricabili gratuitamente da https://www.aipsi.org/aree-tematiche/osservatorio-attacchi-digitali/precedenti-rapporti-oad-oai.html AIPSI sta organizzando l’edizione OAD 2018: sul sito AIPSI troverete il Questionario chi vi invitiamo a compilare !!
  • 4. Cyber Risk in Advanced Manufacturing Manufacturers drive extensive innovation in products, manufacturing process, and industrial ecosystem relationships, in order to compete in a changing global marketplace.
  • 5. Cyber Risk in Advanced Manufacturing Key cyber risk themes  Executive and board level engagement  Talent and human capital  Industrial control systems (ICS)  Connected products  Industrial ecosystem  Intellectual property
  • 6. Cyber Risk in Advanced Manufacturing Themes Evidences  Engage the board to develop a business-driven cyber risk program  Be purposeful in addressing talent-related challenges  Remain vigilant in protecting critical IP investments  Harden security, implement monitoring, and incident response for industrial control systems  Design cyber risk management mechanisms into connected products before deployment  Identify and address emerging cyber risks in the industrial ecosystem  The changing nature of the cyberthreat landscape
  • 7. Cyber Risk in Advanced Manufacturing Threats Normal Threats Consideration
  • 8. Cyber Risk in Advanced Manufacturing
  • 9. Cyber Risk in Advanced Manufacturing Norse World Cyber Attack Map
  • 10. Cyber Risk in Advanced Manufacturing Do You Have Considered Manufacturing ?
  • 11. Cyber Risk in Advanced Manufacturing PLC / ICT Integration Layer Threats (Cyber Attack) Threats (Old Firmware Default Option)
  • 12. Cyber Risk in Advanced Manufacturing Manufacturing Security Cyber Safety Maintenance
  • 13. Cyber Risk in Advanced Manufacturing Proposal for an A.I. Security and Maintenance Monitoring System
  • 14. Cyber Risk in Advanced Manufacturing Project Reseach History Earth Modeling (Parallel Computing for Large Data) First Diagnostic Helper System (Decisional Matrix) (Isabel Project)  Spinoff Diagnostic Helper System I Release (Neural Network) Diagnosis from real time data Diagnostic Helper System II Release (Neural Network + Bayesian Network) Diagnosis and Prediction from real time data
  • 15. Cyber Risk in Advanced Manufacturing  Manufacturing Sensor System
  • 16. Cyber Risk in Advanced Manufacturing  Manufacturing Sensor System
  • 17. Cyber Risk in Advanced Manufacturing Neuron Neuron Replication Neural Network Neural Elaboration
  • 18. Cyber Risk in Advanced Manufacturing  Neuron Function
  • 19. Cyber Risk in Advanced Manufacturing  Neuronal Network
  • 20. Cyber Risk in Advanced Manufacturing  Simple Neural Network Learning (Perceptron)
  • 21. Cyber Risk in Advanced Manufacturing  Cyber Threat Detection Using Neural Network
  • 22. Cyber Risk in Advanced Manufacturing  First System Module (Data Acquisition  Analysis Module) Automated Manufacturing System Lines (Sensors) Analysis Module (Dataset Comparison  Decision Matrix  Regression Process)
  • 23. Cyber Risk in Advanced Manufactoring  Dataset Comparison  Decision Matrix From Neural Processor AlarmConsole TriggerActions Regression To Learn Data
  • 24. Cyber Risk in Advanced Manufacturing  Decision Tree Simulation
  • 25. Cyber Risk in Advanced Manufacturing  Decision Tree Pratical Example
  • 26. Cyber Risk in Advanced Manufacturing  Bayesian Network & Prediction Module Analysis Module (Dataset Comparison  Decision Matrix  Regression Process) Prediction Message Bayesian Network
  • 27. Cyber Risk in Advanced Manufacturing  Bayesian Probability Formula
  • 28. Cyber Risk in Advanced Manufacturing  Bayesian Network Distribution
  • 29. Cyber Risk in Advanced Manufacturing  Bayesian Network Example
  • 30. Cyber Risk in Advanced Manufacturing  BBN for System Health
  • 31. Cyber Risk in Advanced Manufacturing  BBN  NPT (Node Probability Table)
  • 32. Cyber Risk in Advanced Manufacturing  BBN  NPT Graphic Representation
  • 33. Cyber Risk in Advanced Manufacturing  Classification with Bayesian Network Number to recognize Percentage of recognition
  • 34. Cyber Risk in Advanced Manufacturing  Health and Cyber Threats Monitoring and Management System Structure DataAcquisition NeuralNetwork Classification IssueAnalysis DecisionMatrix Bayesian Network Prediction Alarm Console Triggered Action Probability Determination
  • 35. Cyber Risk in Advanced Manufacturing  Health and Cyber Threats Monitoring and Management System Structure  Deterministic (Neuron) and Probabilistic (Bayes) Approach  Simple to Understand  Logical Approach with Simple Logical Mathematical Theories  Simple to Compile  Python Language Oriented  Simple to integrate with more PLC System through Data Gateway  Simple to Organize for many Manufacturing System
  • 36. Cyber Risk in Advanced Manufacturing  Effect of Cyber Attack on PLC (Real Simulation from CNN) First Effect after Hacking Machine Crash after Hacking
  • 37. Cyber Risk in Advanced Manufacturing  Health and Cyber Threats Monitoring and Management System Structure The Future ?  Autogeneration Neurons + Autogeneration Synapsis to increase data mining (classification & elaboration)  Data Gathering direct from Signals (collect direct on sensors with IP sensors)
  • 38. Cyber Risk in Advanced Manufacturing Thank You For Information and Mathematical Paper email to: marco.armoni@studioarmoni.com Marco Armoni Cyber Security Expert – A.I. Researcher