SlideShare a Scribd company logo
1 of 19
Download to read offline
| Document Number | June 25, 2018 |
© Yokogawa Electric Corporation
The names of corporations, organizations, products and logos herein are either registered trademarks or
trademarks of Yokogawa Electric Corporation and their respective holders.
Cybersecurity Application Installation
with No Shutdown Required
3
| Document Number | June 25, 2018 |
© Yokogawa Electric Corporation
Presenter
1
MATT MALONE
ICS Cybersecurity Consultant
Yokogawa Corporation of
America
Sugarland, TX
matthew.malone@yokogawa.
com
Matt is the industrial cybersecurity consultant for YCA and has been in the
automation industry for the past six years. Over the last three years, he
has specialized in ICS cybersecurity to provide the best possible service to
clients in this emerging sector. Prior to starting a career in the private
sector, Matt spent eight years in the US Navy as an explosive ordnance
disposal (EOD) technician and deep sea diver.
| Document Number | June 25, 2018 |
© Yokogawa Electric Corporation
TOPICS
Update and Threat Overview
Solving the Problem
Process Cybersecurity Solutions
Case study
Q&A
1
2
3
4
5
| Document Number | June 25, 2018 |
© Yokogawa Electric Corporation
Recent ICS Cyber Attacks and Business Impact
• 2014 German Steel Mill – catastrophic blast furnace damage
• 2016 Unnamed US Water Company - hackers gained control of PLCs
• 2017 Maersk – “Notpetya” attack. $250-300M in damage and lost revenue
• 2017 Unnamed US Petrochem plant – Triconix attack (Triton), unplanned
outage
• 2018 Boardwalk – pipeline shut down
• 2018 Saipam – “Shamoon” cyber attack, seven day outage
• 2019 NorskHydro - $40M loss in production
• 2020 Various supply chain attacks and COVID spam campaigns
| Document Number | June 25, 2018 |
© Yokogawa Electric Corporation
Cyber Attacks and Business Impact
• Malware Vectors
• 60% of all instances are due to employee error
• 65% of employees admit to using weak and re-used passwords
• 32% of employees admit to sharing passwords with others
• Recycled malware
• Unique Challenges
• No network visibility
• Small maintenance windows
• Compliance to different regulations
• Starting a program from the ground up
| Document Number | June 25, 2018 |
© Yokogawa Electric Corporation
How Do We Solve the Problem?
UNCERTAIN LEADING LAGGING CERTAIN
Threats
Threats
Threats
Threats
Threats
Threats
Technology
Process
People
Prevention
Controls
Losses
Losses
Losses
Losses
Losses
Losses
Technology
Process
People
Recovery
Controls
Incident
Result (Past)
= Facts
Risk (Future)
= Impact &
Likelihood
Easy to measure
To late to improve
Difficult to
measure and
easy to Improve
Leading Indicators = Measures of
Effectiveness
Performance
Compliance
Lagging Indicators = Measures of
Effectiveness
Performance
Compliance
| Document Number | June 25, 2018 |
© Yokogawa Electric Corporation
Cybersecurity Assessment
 Why start with the
assessment?
 Simple – 2-3 days
 Identify unknowns
 Update network architecture
 Sustainable – non-recurring cost
 Secure – can provide immediate
notification of compromise
 Begin the roadmap plan
Knowns – malware, zero
day attacks,
vulnerabilities, threats
Unknowns – network
architecture, nodes,
unmanaged connections
| Document Number | June 25, 2018 |
© Yokogawa Electric Corporation
System Hardening Services
 Why perform System Hardening services?
 Simple – can be done centrally
 Sustainable – can be performed during SAT
 Sustainable – most bang for the buck
 Default settings ARE NOT the recommended settings
 Reduces the attack surface by:
 Restricting non-essential ports (physical and logical)
 Disabling auto-run
 Improving user authentication
 Restricting non-essential network services
| Document Number | June 25, 2018 |
© Yokogawa Electric Corporation
Antivirus
 Why Antivirus?
 33% of ALL computers have some form of malware*
 The “black list” for known viruses, Trojans, and worms
 Effectiveness is directly proportional to the level of updates
 More than COTS AV
 Simple
 Centralized AV servers streamline updates and maintenance
 Yokogawa tested and verified updates
 Sustainable - Can prevent recycled cyberattacks
*Source: https://www.technewsworld.com/story/80707.html
| Document Number | June 25, 2018 |
© Yokogawa Electric Corporation
Antivirus
| Document Number | June 25, 2018 |
© Yokogawa Electric Corporation
Patch Management
 Why Patch Management?
 Can prevent recycled cyberattacks and zero day attacks
 $200M in damages in 2014 from 8 different recycled
malware components*
 Simple
 Create custom groups of machines which allows administrators to
pick and choose certain updates
 Centralized patch management can update several sites from one
corporate location
 Yokogawa tested and verified
 Sustainable
 Bug fixes for OS
 Reduces bandwidth
*Source: https://www.technewsworld.com/story/80707.html
| Document Number | June 25, 2018 |
© Yokogawa Electric Corporation
Patch Management
| Document Number | June 25, 2018 |
© Yokogawa Electric Corporation
Application Whitelisting
 Why whitelisting?
 Prevents unauthorized programs,
scripts, and apps from running
 Simple
 Locks down protected end points
 Yokogawa tested and verified vendors
(ex: SS1WL1)
 Sustainable
 Runs transparently w/ low overhead
 Minimal impact
| Document Number | June 25, 2018 |
© Yokogawa Electric Corporation
Backup and Recovery System (BRS)
 Why BRS?
 Consolidate backup storage media in
central location
 DRP/BCP compliance
 Simple
 Separate backup traffic from VNET/IP
(avoids instability)
 Easy recovery
 Sustainable
 Runs transparently w/ low overhead
 Minimal impact
| Document Number | June 25, 2018 |
© Yokogawa Electric Corporation
Secure Remote Connectivity
 Why VPS Remote?
 Secure method for offsite maintenance
 Reduction of travel time and cost
 Compliance with COVID restrictions
 Simple
 VPN technology for secure access
 Sustainable
 Minimize mean time to recovery via
emergency support
 Remote monitoring for maintenance or
security
| Document Number | June 25, 2018 |
© Yokogawa Electric Corporation
Wireless Security
 Why?
 Threat of packet capture and wireless DoS
 IIoT expansion
 Simple
 LoRaWAN communication protection
 Edge protection
 Sustainable
 Spectrum analyzer testing
 Security from the sensor to the cloud
| Document Number | June 25, 2018 |
© Yokogawa Electric Corporation
Case Studies
Case Study #1 – Legacy Cryo Station
Case Study #2 – Petrochem Plant
 Challenges
 No network visability
 High insurance premiums
 Industry standards
 Solution
 Security assessment via passive
data analysis
 Physical assessment
 Updated network architecture
 Cybersecurity roadmap
development
 Challenges – no corporate
control for AV updates, short
time line
 Solution
 Secure remote connection
establish to accommodate
offsite work
 Secure architecture design at
each site for remote,
centralized patch management
and AV updates
| Document Number | June 25, 2018 |
© Yokogawa Electric Corporation
The names of corporations, organizations, products and logos herein are either registered trademarks or
trademarks of Yokogawa Electric Corporation and their respective holders.
QUESTIONS?
| Document Number | June 25, 2018 |
© Yokogawa Electric Corporation
Event Logistics
21
Email Link with
Recording
Shortly after the event, you will receive an email
containing a link to the recording and be able to
download the slidedeck.
Short Survey
As you exit the webinar, you will have the option to
participate in a short survey. Your feedback is very
important to us, so please take a minute to
complete this.
Questions
If you have any questions for this Webinar topic,
please send them to webinars@us.yokogawa.com

More Related Content

What's hot

Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020Precisely
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksYokogawa1
 
Cyber security in power sector
Cyber security in power sectorCyber security in power sector
Cyber security in power sectorP K Agarwal
 
Using IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical InfrastructureUsing IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical InfrastructureEnergySec
 
CMMC Certification
CMMC CertificationCMMC Certification
CMMC CertificationControlCase
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsAlan Tatourian
 
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentCybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentOnward Security
 
Product security program slideshare
Product security program slideshareProduct security program slideshare
Product security program slideshareAmir Einav
 
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...TI Safe
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksPriyanka Aash
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
 
Security Testing Trends for 2020
Security Testing Trends for 2020Security Testing Trends for 2020
Security Testing Trends for 2020TestingXperts
 
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsFull Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsIgnyte Assurance Platform
 
Secured Remote Solutions for Critical Plant Assets
Secured Remote Solutions for Critical Plant AssetsSecured Remote Solutions for Critical Plant Assets
Secured Remote Solutions for Critical Plant AssetsYokogawa
 
Integrating of security activates in agile process
Integrating of security activates in agile processIntegrating of security activates in agile process
Integrating of security activates in agile processZubair Rahim
 
第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンス第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンスchomchana trevai
 

What's hot (20)

Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT Networks
 
Cyber security in power sector
Cyber security in power sectorCyber security in power sector
Cyber security in power sector
 
Using IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical InfrastructureUsing IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
 
CMMC Certification
CMMC CertificationCMMC Certification
CMMC Certification
 
Gpc case study_eng_0221
Gpc case study_eng_0221Gpc case study_eng_0221
Gpc case study_eng_0221
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
 
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentCybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT Equipment
 
Product security program slideshare
Product security program slideshareProduct security program slideshare
Product security program slideshare
 
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
Security Testing Trends for 2020
Security Testing Trends for 2020Security Testing Trends for 2020
Security Testing Trends for 2020
 
Arvind Mehrotra
Arvind MehrotraArvind Mehrotra
Arvind Mehrotra
 
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsFull Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
 
Secured Remote Solutions for Critical Plant Assets
Secured Remote Solutions for Critical Plant AssetsSecured Remote Solutions for Critical Plant Assets
Secured Remote Solutions for Critical Plant Assets
 
Integrating of security activates in agile process
Integrating of security activates in agile processIntegrating of security activates in agile process
Integrating of security activates in agile process
 
第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンス第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンス
 

Similar to Cybersecurity Application Installation with no Shutdown Required webinar Slides

Digital productivity is as easy as 1, 2, total insight final
Digital productivity is as easy as 1, 2, total insight finalDigital productivity is as easy as 1, 2, total insight final
Digital productivity is as easy as 1, 2, total insight finalYokogawa1
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance EnergyTech2015
 
Comparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsComparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsIRJET Journal
 
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementAleksey Lukatskiy
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsSolarWinds
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...SolarWinds
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxssuser365526
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
 
Ensure Every Customer Matters With End User Monitoring at AppD Global Tour Lo...
Ensure Every Customer Matters With End User Monitoring at AppD Global Tour Lo...Ensure Every Customer Matters With End User Monitoring at AppD Global Tour Lo...
Ensure Every Customer Matters With End User Monitoring at AppD Global Tour Lo...AppDynamics
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...Enterprise Management Associates
 
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...TI Safe
 
WESPr 18 presentation slides CAV Taguchi
WESPr 18 presentation slides CAV TaguchiWESPr 18 presentation slides CAV Taguchi
WESPr 18 presentation slides CAV TaguchiKenji Taguchi
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceEnergySec
 
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionMarketingArrowECS_CZ
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service providerpaulharry03
 
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroSkycure
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati
 

Similar to Cybersecurity Application Installation with no Shutdown Required webinar Slides (20)

Digital productivity is as easy as 1, 2, total insight final
Digital productivity is as easy as 1, 2, total insight finalDigital productivity is as easy as 1, 2, total insight final
Digital productivity is as easy as 1, 2, total insight final
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance
 
Comparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsComparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment Tools
 
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness Measurement
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...
 
Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Ensure Every Customer Matters With End User Monitoring at AppD Global Tour Lo...
Ensure Every Customer Matters With End User Monitoring at AppD Global Tour Lo...Ensure Every Customer Matters With End User Monitoring at AppD Global Tour Lo...
Ensure Every Customer Matters With End User Monitoring at AppD Global Tour Lo...
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
 
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
 
WESPr 18 presentation slides CAV Taguchi
WESPr 18 presentation slides CAV TaguchiWESPr 18 presentation slides CAV Taguchi
WESPr 18 presentation slides CAV Taguchi
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud Adoption
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service provider
 
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security Superhero
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational Awareness
 

More from Yokogawa1

Data, Data, Everywhere...GA10 Brings It All Together
Data, Data, Everywhere...GA10 Brings It All TogetherData, Data, Everywhere...GA10 Brings It All Together
Data, Data, Everywhere...GA10 Brings It All TogetherYokogawa1
 
202102 attaining proficiency in industrial pressure measurement r7
202102 attaining proficiency in industrial pressure measurement r7202102 attaining proficiency in industrial pressure measurement r7
202102 attaining proficiency in industrial pressure measurement r7Yokogawa1
 
Chromatography Basics 2021
Chromatography Basics 2021Chromatography Basics 2021
Chromatography Basics 2021Yokogawa1
 
An Economic X-ray of Digital Transformation
An Economic X-ray of Digital TransformationAn Economic X-ray of Digital Transformation
An Economic X-ray of Digital TransformationYokogawa1
 
Using A Unique, Next Generation APC Solution To Address Common Problems In Th...
Using A Unique, Next Generation APC Solution To Address Common Problems In Th...Using A Unique, Next Generation APC Solution To Address Common Problems In Th...
Using A Unique, Next Generation APC Solution To Address Common Problems In Th...Yokogawa1
 
Open Process Automation: Status of the O-PAS™ Standard, Conformance Certifica...
Open Process Automation: Status of the O-PAS™ Standard, Conformance Certifica...Open Process Automation: Status of the O-PAS™ Standard, Conformance Certifica...
Open Process Automation: Status of the O-PAS™ Standard, Conformance Certifica...Yokogawa1
 
The Value-driven Approach to Digitalizing Assets and their Supply Chains
The Value-driven Approach to Digitalizing Assets and their Supply ChainsThe Value-driven Approach to Digitalizing Assets and their Supply Chains
The Value-driven Approach to Digitalizing Assets and their Supply ChainsYokogawa1
 
The Role And Evolution Of Advanced Analytics In The Process Industries
The Role And Evolution Of Advanced Analytics In The Process IndustriesThe Role And Evolution Of Advanced Analytics In The Process Industries
The Role And Evolution Of Advanced Analytics In The Process IndustriesYokogawa1
 
The Digital Twin For Production Optimization
The Digital Twin For Production OptimizationThe Digital Twin For Production Optimization
The Digital Twin For Production OptimizationYokogawa1
 
Multi-Site Optimization To Drive Value Creation In Chevron
Multi-Site Optimization To Drive Value Creation In ChevronMulti-Site Optimization To Drive Value Creation In Chevron
Multi-Site Optimization To Drive Value Creation In ChevronYokogawa1
 
Keeping PACE with Advanced Process Control
Keeping PACE with Advanced Process ControlKeeping PACE with Advanced Process Control
Keeping PACE with Advanced Process ControlYokogawa1
 
Yokogawa’s DX and Smart Manufacturing Vision for Building our Future
Yokogawa’s DX and Smart Manufacturing Vision for Building our FutureYokogawa’s DX and Smart Manufacturing Vision for Building our Future
Yokogawa’s DX and Smart Manufacturing Vision for Building our FutureYokogawa1
 
Business Model Disruption - The Step-wise Transition to Remote Operations
Business Model Disruption - The Step-wise Transition to Remote OperationsBusiness Model Disruption - The Step-wise Transition to Remote Operations
Business Model Disruption - The Step-wise Transition to Remote OperationsYokogawa1
 
A New Digital Maintenance Platform in a Large Petrochemical Facility to Ident...
A New Digital Maintenance Platform in a Large Petrochemical Facility to Ident...A New Digital Maintenance Platform in a Large Petrochemical Facility to Ident...
A New Digital Maintenance Platform in a Large Petrochemical Facility to Ident...Yokogawa1
 
Shift team effectiveness: Don't bother if you can't change "shop floor" shift...
Shift team effectiveness: Don't bother if you can't change "shop floor" shift...Shift team effectiveness: Don't bother if you can't change "shop floor" shift...
Shift team effectiveness: Don't bother if you can't change "shop floor" shift...Yokogawa1
 
Adversity Drives Innovation and Enterprise Resilience to Best Leverage a Hist...
Adversity Drives Innovation and Enterprise Resilience to Best Leverage a Hist...Adversity Drives Innovation and Enterprise Resilience to Best Leverage a Hist...
Adversity Drives Innovation and Enterprise Resilience to Best Leverage a Hist...Yokogawa1
 
Improved Upstream Production Efficiency with Remote Optimization Centers, Fie...
Improved Upstream Production Efficiency with Remote Optimization Centers, Fie...Improved Upstream Production Efficiency with Remote Optimization Centers, Fie...
Improved Upstream Production Efficiency with Remote Optimization Centers, Fie...Yokogawa1
 
Transforming Decision Making in Scheduling of Terminal Operations
Transforming Decision Making in Scheduling of Terminal OperationsTransforming Decision Making in Scheduling of Terminal Operations
Transforming Decision Making in Scheduling of Terminal OperationsYokogawa1
 
Contributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity StandardsContributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity StandardsYokogawa1
 
Asia NOC Bridges Business-wide Performance Objectives and KPIs through an Adv...
Asia NOC Bridges Business-wide Performance Objectives and KPIs through an Adv...Asia NOC Bridges Business-wide Performance Objectives and KPIs through an Adv...
Asia NOC Bridges Business-wide Performance Objectives and KPIs through an Adv...Yokogawa1
 

More from Yokogawa1 (20)

Data, Data, Everywhere...GA10 Brings It All Together
Data, Data, Everywhere...GA10 Brings It All TogetherData, Data, Everywhere...GA10 Brings It All Together
Data, Data, Everywhere...GA10 Brings It All Together
 
202102 attaining proficiency in industrial pressure measurement r7
202102 attaining proficiency in industrial pressure measurement r7202102 attaining proficiency in industrial pressure measurement r7
202102 attaining proficiency in industrial pressure measurement r7
 
Chromatography Basics 2021
Chromatography Basics 2021Chromatography Basics 2021
Chromatography Basics 2021
 
An Economic X-ray of Digital Transformation
An Economic X-ray of Digital TransformationAn Economic X-ray of Digital Transformation
An Economic X-ray of Digital Transformation
 
Using A Unique, Next Generation APC Solution To Address Common Problems In Th...
Using A Unique, Next Generation APC Solution To Address Common Problems In Th...Using A Unique, Next Generation APC Solution To Address Common Problems In Th...
Using A Unique, Next Generation APC Solution To Address Common Problems In Th...
 
Open Process Automation: Status of the O-PAS™ Standard, Conformance Certifica...
Open Process Automation: Status of the O-PAS™ Standard, Conformance Certifica...Open Process Automation: Status of the O-PAS™ Standard, Conformance Certifica...
Open Process Automation: Status of the O-PAS™ Standard, Conformance Certifica...
 
The Value-driven Approach to Digitalizing Assets and their Supply Chains
The Value-driven Approach to Digitalizing Assets and their Supply ChainsThe Value-driven Approach to Digitalizing Assets and their Supply Chains
The Value-driven Approach to Digitalizing Assets and their Supply Chains
 
The Role And Evolution Of Advanced Analytics In The Process Industries
The Role And Evolution Of Advanced Analytics In The Process IndustriesThe Role And Evolution Of Advanced Analytics In The Process Industries
The Role And Evolution Of Advanced Analytics In The Process Industries
 
The Digital Twin For Production Optimization
The Digital Twin For Production OptimizationThe Digital Twin For Production Optimization
The Digital Twin For Production Optimization
 
Multi-Site Optimization To Drive Value Creation In Chevron
Multi-Site Optimization To Drive Value Creation In ChevronMulti-Site Optimization To Drive Value Creation In Chevron
Multi-Site Optimization To Drive Value Creation In Chevron
 
Keeping PACE with Advanced Process Control
Keeping PACE with Advanced Process ControlKeeping PACE with Advanced Process Control
Keeping PACE with Advanced Process Control
 
Yokogawa’s DX and Smart Manufacturing Vision for Building our Future
Yokogawa’s DX and Smart Manufacturing Vision for Building our FutureYokogawa’s DX and Smart Manufacturing Vision for Building our Future
Yokogawa’s DX and Smart Manufacturing Vision for Building our Future
 
Business Model Disruption - The Step-wise Transition to Remote Operations
Business Model Disruption - The Step-wise Transition to Remote OperationsBusiness Model Disruption - The Step-wise Transition to Remote Operations
Business Model Disruption - The Step-wise Transition to Remote Operations
 
A New Digital Maintenance Platform in a Large Petrochemical Facility to Ident...
A New Digital Maintenance Platform in a Large Petrochemical Facility to Ident...A New Digital Maintenance Platform in a Large Petrochemical Facility to Ident...
A New Digital Maintenance Platform in a Large Petrochemical Facility to Ident...
 
Shift team effectiveness: Don't bother if you can't change "shop floor" shift...
Shift team effectiveness: Don't bother if you can't change "shop floor" shift...Shift team effectiveness: Don't bother if you can't change "shop floor" shift...
Shift team effectiveness: Don't bother if you can't change "shop floor" shift...
 
Adversity Drives Innovation and Enterprise Resilience to Best Leverage a Hist...
Adversity Drives Innovation and Enterprise Resilience to Best Leverage a Hist...Adversity Drives Innovation and Enterprise Resilience to Best Leverage a Hist...
Adversity Drives Innovation and Enterprise Resilience to Best Leverage a Hist...
 
Improved Upstream Production Efficiency with Remote Optimization Centers, Fie...
Improved Upstream Production Efficiency with Remote Optimization Centers, Fie...Improved Upstream Production Efficiency with Remote Optimization Centers, Fie...
Improved Upstream Production Efficiency with Remote Optimization Centers, Fie...
 
Transforming Decision Making in Scheduling of Terminal Operations
Transforming Decision Making in Scheduling of Terminal OperationsTransforming Decision Making in Scheduling of Terminal Operations
Transforming Decision Making in Scheduling of Terminal Operations
 
Contributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity StandardsContributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity Standards
 
Asia NOC Bridges Business-wide Performance Objectives and KPIs through an Adv...
Asia NOC Bridges Business-wide Performance Objectives and KPIs through an Adv...Asia NOC Bridges Business-wide Performance Objectives and KPIs through an Adv...
Asia NOC Bridges Business-wide Performance Objectives and KPIs through an Adv...
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

Cybersecurity Application Installation with no Shutdown Required webinar Slides

  • 1. | Document Number | June 25, 2018 | © Yokogawa Electric Corporation The names of corporations, organizations, products and logos herein are either registered trademarks or trademarks of Yokogawa Electric Corporation and their respective holders. Cybersecurity Application Installation with No Shutdown Required 3
  • 2. | Document Number | June 25, 2018 | © Yokogawa Electric Corporation Presenter 1 MATT MALONE ICS Cybersecurity Consultant Yokogawa Corporation of America Sugarland, TX matthew.malone@yokogawa. com Matt is the industrial cybersecurity consultant for YCA and has been in the automation industry for the past six years. Over the last three years, he has specialized in ICS cybersecurity to provide the best possible service to clients in this emerging sector. Prior to starting a career in the private sector, Matt spent eight years in the US Navy as an explosive ordnance disposal (EOD) technician and deep sea diver.
  • 3. | Document Number | June 25, 2018 | © Yokogawa Electric Corporation TOPICS Update and Threat Overview Solving the Problem Process Cybersecurity Solutions Case study Q&A 1 2 3 4 5
  • 4. | Document Number | June 25, 2018 | © Yokogawa Electric Corporation Recent ICS Cyber Attacks and Business Impact • 2014 German Steel Mill – catastrophic blast furnace damage • 2016 Unnamed US Water Company - hackers gained control of PLCs • 2017 Maersk – “Notpetya” attack. $250-300M in damage and lost revenue • 2017 Unnamed US Petrochem plant – Triconix attack (Triton), unplanned outage • 2018 Boardwalk – pipeline shut down • 2018 Saipam – “Shamoon” cyber attack, seven day outage • 2019 NorskHydro - $40M loss in production • 2020 Various supply chain attacks and COVID spam campaigns
  • 5. | Document Number | June 25, 2018 | © Yokogawa Electric Corporation Cyber Attacks and Business Impact • Malware Vectors • 60% of all instances are due to employee error • 65% of employees admit to using weak and re-used passwords • 32% of employees admit to sharing passwords with others • Recycled malware • Unique Challenges • No network visibility • Small maintenance windows • Compliance to different regulations • Starting a program from the ground up
  • 6. | Document Number | June 25, 2018 | © Yokogawa Electric Corporation How Do We Solve the Problem? UNCERTAIN LEADING LAGGING CERTAIN Threats Threats Threats Threats Threats Threats Technology Process People Prevention Controls Losses Losses Losses Losses Losses Losses Technology Process People Recovery Controls Incident Result (Past) = Facts Risk (Future) = Impact & Likelihood Easy to measure To late to improve Difficult to measure and easy to Improve Leading Indicators = Measures of Effectiveness Performance Compliance Lagging Indicators = Measures of Effectiveness Performance Compliance
  • 7. | Document Number | June 25, 2018 | © Yokogawa Electric Corporation Cybersecurity Assessment  Why start with the assessment?  Simple – 2-3 days  Identify unknowns  Update network architecture  Sustainable – non-recurring cost  Secure – can provide immediate notification of compromise  Begin the roadmap plan Knowns – malware, zero day attacks, vulnerabilities, threats Unknowns – network architecture, nodes, unmanaged connections
  • 8. | Document Number | June 25, 2018 | © Yokogawa Electric Corporation System Hardening Services  Why perform System Hardening services?  Simple – can be done centrally  Sustainable – can be performed during SAT  Sustainable – most bang for the buck  Default settings ARE NOT the recommended settings  Reduces the attack surface by:  Restricting non-essential ports (physical and logical)  Disabling auto-run  Improving user authentication  Restricting non-essential network services
  • 9. | Document Number | June 25, 2018 | © Yokogawa Electric Corporation Antivirus  Why Antivirus?  33% of ALL computers have some form of malware*  The “black list” for known viruses, Trojans, and worms  Effectiveness is directly proportional to the level of updates  More than COTS AV  Simple  Centralized AV servers streamline updates and maintenance  Yokogawa tested and verified updates  Sustainable - Can prevent recycled cyberattacks *Source: https://www.technewsworld.com/story/80707.html
  • 10. | Document Number | June 25, 2018 | © Yokogawa Electric Corporation Antivirus
  • 11. | Document Number | June 25, 2018 | © Yokogawa Electric Corporation Patch Management  Why Patch Management?  Can prevent recycled cyberattacks and zero day attacks  $200M in damages in 2014 from 8 different recycled malware components*  Simple  Create custom groups of machines which allows administrators to pick and choose certain updates  Centralized patch management can update several sites from one corporate location  Yokogawa tested and verified  Sustainable  Bug fixes for OS  Reduces bandwidth *Source: https://www.technewsworld.com/story/80707.html
  • 12. | Document Number | June 25, 2018 | © Yokogawa Electric Corporation Patch Management
  • 13. | Document Number | June 25, 2018 | © Yokogawa Electric Corporation Application Whitelisting  Why whitelisting?  Prevents unauthorized programs, scripts, and apps from running  Simple  Locks down protected end points  Yokogawa tested and verified vendors (ex: SS1WL1)  Sustainable  Runs transparently w/ low overhead  Minimal impact
  • 14. | Document Number | June 25, 2018 | © Yokogawa Electric Corporation Backup and Recovery System (BRS)  Why BRS?  Consolidate backup storage media in central location  DRP/BCP compliance  Simple  Separate backup traffic from VNET/IP (avoids instability)  Easy recovery  Sustainable  Runs transparently w/ low overhead  Minimal impact
  • 15. | Document Number | June 25, 2018 | © Yokogawa Electric Corporation Secure Remote Connectivity  Why VPS Remote?  Secure method for offsite maintenance  Reduction of travel time and cost  Compliance with COVID restrictions  Simple  VPN technology for secure access  Sustainable  Minimize mean time to recovery via emergency support  Remote monitoring for maintenance or security
  • 16. | Document Number | June 25, 2018 | © Yokogawa Electric Corporation Wireless Security  Why?  Threat of packet capture and wireless DoS  IIoT expansion  Simple  LoRaWAN communication protection  Edge protection  Sustainable  Spectrum analyzer testing  Security from the sensor to the cloud
  • 17. | Document Number | June 25, 2018 | © Yokogawa Electric Corporation Case Studies Case Study #1 – Legacy Cryo Station Case Study #2 – Petrochem Plant  Challenges  No network visability  High insurance premiums  Industry standards  Solution  Security assessment via passive data analysis  Physical assessment  Updated network architecture  Cybersecurity roadmap development  Challenges – no corporate control for AV updates, short time line  Solution  Secure remote connection establish to accommodate offsite work  Secure architecture design at each site for remote, centralized patch management and AV updates
  • 18. | Document Number | June 25, 2018 | © Yokogawa Electric Corporation The names of corporations, organizations, products and logos herein are either registered trademarks or trademarks of Yokogawa Electric Corporation and their respective holders. QUESTIONS?
  • 19. | Document Number | June 25, 2018 | © Yokogawa Electric Corporation Event Logistics 21 Email Link with Recording Shortly after the event, you will receive an email containing a link to the recording and be able to download the slidedeck. Short Survey As you exit the webinar, you will have the option to participate in a short survey. Your feedback is very important to us, so please take a minute to complete this. Questions If you have any questions for this Webinar topic, please send them to webinars@us.yokogawa.com