SlideShare a Scribd company logo
Point Of View
Technology Landscape for Utilities Industry: Cyber Security
By Sougata Mitra, Business Leader, Energy & Utilities
Background
In the electricity sector, the historical focus has been on implementation of equipment that could improve electricity system
reliability. Communications and IT equipment were formerly viewed as just supporting electricity system reliability. However, both
the communications and IT sectors are becoming more critical to the reliability of the electricity system. Utilities are installing
technologies that Transform the utility network, Improve generation performance and Transform customer operations. Information
technology (IT) focuses on the protection of information and information systems from unauthorized access, use, disclosure,
disruption, modification, or destruction in order to provide confidentiality, integrity, and availability. Cybersecurity for the smart grid
requires an expansion of this focus to address the combined IT, ICS, and communication systems, and their integration with
physical equipment and resources in order to maintain the reliability and the security of the smart grid and to protect the privacy of
consumers.
The Solution Provider Landscape
Given the market opportunity around critical infrastructure protection, it isn’t surprising that vendors are rushing to provide products
and services to address the need. Many of these vendors lack experience working with OT and are taking a traditional information
security approach to solving the problem. It isn’t uncommon to see a vendor promoting a traditional network security solution such
as intrusion detection or intrusion prevention as being “critical infrastructure/ ICS/SCADA ready,” when in fact the solution doesn’t
speak the protocols typically seen in these environments. Understanding a vendor’s experience and a solution’s capabilities
specific to your environment is critical. There are vendors with technologies and services that actually have experience securing
OT environments.
Vendor Solution Highlights / Comments
BAE Applied
Intelligence
Industrial Protect Industrial Protect is a security appliance developed to protect connections between IT
and OT networks. The appliance provides hardware-based security, ensuring the
validity, integrity, and authorization of data exchange
Bayshore
Networks
Bayshore IC Bayshore Networks provides a platform that evaluates and enforces industry
standards and customized application-layer policies. Bayshore Networks’ technology
is Pallaton, an embedded, extensible, XML-based policy language
GE Wurldtech Achilles Wurldtech provides products and services for both device manufacturers and
operators. Wurldtech provides security assessments to vendors as well as protection
profiles to operators. Wurldtech also certifies both manufacturer devices and operator
security practices.
Lockheed Martin
Industrial
Defender
Automation
Systems Manager
(ASM)
ASM provides visibility into security, compliance, and change management activities
across industrial control system environments
Secure Crossing Zenwall Secure Crossing leverages a whitelisting approach. By allowing only the selected
protocols and specific actions within those protocols and disallowing all other traffic,
Zenwall provides the level of filtering needed for a customer to solve SCADA, Remote
Location, or Zone Level security.
Sourcefire Firepower FirePower offers network based intrusion detection and prevention. FireSight provides
passive network visibility into hosts, users, assets,applications, files, protocols, and
vulnerabilities within critical infrastructure environments.
Tofino Security Tofino Industrial
Security Solution
Tofino Security appliances provide inline network segmentation with firewall, content
inspection, and connection management capabilities

More Related Content

What's hot

Io t applications and use cases part-1
Io t applications and use cases part-1Io t applications and use cases part-1
Io t applications and use cases part-1Divya Tiwari
 
Smart Grid for the CSO
Smart Grid for the CSOSmart Grid for the CSO
Smart Grid for the CSOAndy Bochman
 
운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)
운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)
운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)GE코리아
 
Who will buy IOT products and why.
Who will buy IOT products and why.Who will buy IOT products and why.
Who will buy IOT products and why.Atanu Roy Chowdhury
 
Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing GlobalSign
 
OpShield 운영기술 환경 보안 솔루션
OpShield 운영기술 환경 보안 솔루션 OpShield 운영기술 환경 보안 솔루션
OpShield 운영기술 환경 보안 솔루션 GE코리아
 
Discovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTDiscovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTAlcatel-Lucent Enterprise
 
Innovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit ApproachInnovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit ApproachAtanu Roy Chowdhury
 
Connected Health: The Importance of Systems Integration
Connected Health: The Importance of Systems IntegrationConnected Health: The Importance of Systems Integration
Connected Health: The Importance of Systems IntegrationUBMCanon
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE코리아
 
IoT - the internet evolution
IoT - the internet evolutionIoT - the internet evolution
IoT - the internet evolutionPrateek T.C
 
Manufacturing and the Industrial Internet of Things (IIoT)
Manufacturing and the Industrial Internet of Things (IIoT)Manufacturing and the Industrial Internet of Things (IIoT)
Manufacturing and the Industrial Internet of Things (IIoT)Plex Systems
 
Professional designations in it governance
Professional designations in it governanceProfessional designations in it governance
Professional designations in it governancejkllee
 
Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid systemamaljose949563
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati
 
Eurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationEurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationStefane Mouille
 

What's hot (19)

Io t applications and use cases part-1
Io t applications and use cases part-1Io t applications and use cases part-1
Io t applications and use cases part-1
 
Smart Grid for the CSO
Smart Grid for the CSOSmart Grid for the CSO
Smart Grid for the CSO
 
Smart grid security
Smart grid securitySmart grid security
Smart grid security
 
운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)
운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)
운영기술용 사이버 보안 핵심 가이드 | 월드테크(Wurldtech)
 
Who will buy IOT products and why.
Who will buy IOT products and why.Who will buy IOT products and why.
Who will buy IOT products and why.
 
Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
OpShield 운영기술 환경 보안 솔루션
OpShield 운영기술 환경 보안 솔루션 OpShield 운영기술 환경 보안 솔루션
OpShield 운영기술 환경 보안 솔루션
 
Discovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTDiscovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoT
 
Innovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit ApproachInnovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit Approach
 
Connected Health: The Importance of Systems Integration
Connected Health: The Importance of Systems IntegrationConnected Health: The Importance of Systems Integration
Connected Health: The Importance of Systems Integration
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
 
IoT - the internet evolution
IoT - the internet evolutionIoT - the internet evolution
IoT - the internet evolution
 
Manufacturing and the Industrial Internet of Things (IIoT)
Manufacturing and the Industrial Internet of Things (IIoT)Manufacturing and the Industrial Internet of Things (IIoT)
Manufacturing and the Industrial Internet of Things (IIoT)
 
Professional designations in it governance
Professional designations in it governanceProfessional designations in it governance
Professional designations in it governance
 
Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid system
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational Awareness
 
Eurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationEurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentation
 
PT on CF
PT on CFPT on CF
PT on CF
 

Viewers also liked

Building Business Service Intelligence with ITSI
Building Business Service Intelligence with ITSIBuilding Business Service Intelligence with ITSI
Building Business Service Intelligence with ITSISplunk
 
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
Wie Sie Ransomware aufspüren und was Sie dagegen machen könnenWie Sie Ransomware aufspüren und was Sie dagegen machen können
Wie Sie Ransomware aufspüren und was Sie dagegen machen könnenSplunk
 
Delivering business value from operational insights at ING Bank
Delivering business value from operational insights at ING BankDelivering business value from operational insights at ING Bank
Delivering business value from operational insights at ING BankSplunk
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Anwesh Dixit
 

Viewers also liked (7)

Building Business Service Intelligence with ITSI
Building Business Service Intelligence with ITSIBuilding Business Service Intelligence with ITSI
Building Business Service Intelligence with ITSI
 
Titanium ,
Titanium , Titanium ,
Titanium ,
 
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk ReportForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
 
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
Wie Sie Ransomware aufspüren und was Sie dagegen machen könnenWie Sie Ransomware aufspüren und was Sie dagegen machen können
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
 
Delivering business value from operational insights at ING Bank
Delivering business value from operational insights at ING BankDelivering business value from operational insights at ING Bank
Delivering business value from operational insights at ING Bank
 
EMEA Airheads- ArubaOS - High availability with AP Fast Failover
EMEA Airheads- ArubaOS - High availability with AP Fast FailoverEMEA Airheads- ArubaOS - High availability with AP Fast Failover
EMEA Airheads- ArubaOS - High availability with AP Fast Failover
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 

Similar to Cybersecurity in Utilities

Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...IBM_Info_Management
 
IoT / M2M Solutions with Informix in the IoT Gateway
IoT / M2M Solutions with Informix in the IoT GatewayIoT / M2M Solutions with Informix in the IoT Gateway
IoT / M2M Solutions with Informix in the IoT GatewayEurotech
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilitiesNirmal Thaliyil
 
What operational technology cyber security is?
What operational technology cyber security is?What operational technology cyber security is?
What operational technology cyber security is?sohailAhmad304
 
Explain industrial control system
Explain industrial control systemExplain industrial control system
Explain industrial control systemPoonam Kherde
 
Midokura for Industry 4.0
Midokura for Industry 4.0Midokura for Industry 4.0
Midokura for Industry 4.0Susan Wu
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices IJECEIAES
 
RA TechED 2019 - NT03 - Building Converged Plantwide Ethernet Architectures
RA TechED 2019 - NT03 - Building Converged Plantwide Ethernet ArchitecturesRA TechED 2019 - NT03 - Building Converged Plantwide Ethernet Architectures
RA TechED 2019 - NT03 - Building Converged Plantwide Ethernet ArchitecturesRockwell Automation
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsEnergySec
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesDr Dev Kambhampati
 
IRJET- Effect of ICT Application in Manufacturing Industry
IRJET- Effect of ICT Application in Manufacturing IndustryIRJET- Effect of ICT Application in Manufacturing Industry
IRJET- Effect of ICT Application in Manufacturing IndustryIRJET Journal
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET Journal
 
Galactic Security Systems - Who Owns OT Security Anyway?
Galactic Security Systems - Who Owns OT Security Anyway?Galactic Security Systems - Who Owns OT Security Anyway?
Galactic Security Systems - Who Owns OT Security Anyway?Fairuz Rafique
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0Osama Shahumi
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksPriyanka Aash
 
Industrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case StudyIndustrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case StudyPolestar IIoT
 

Similar to Cybersecurity in Utilities (20)

Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
 
IoT / M2M Solutions with Informix in the IoT Gateway
IoT / M2M Solutions with Informix in the IoT GatewayIoT / M2M Solutions with Informix in the IoT Gateway
IoT / M2M Solutions with Informix in the IoT Gateway
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
Rockwell PSP
Rockwell PSP Rockwell PSP
Rockwell PSP
 
What operational technology cyber security is?
What operational technology cyber security is?What operational technology cyber security is?
What operational technology cyber security is?
 
Explain industrial control system
Explain industrial control systemExplain industrial control system
Explain industrial control system
 
Midokura for Industry 4.0
Midokura for Industry 4.0Midokura for Industry 4.0
Midokura for Industry 4.0
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices
 
RA TechED 2019 - NT03 - Building Converged Plantwide Ethernet Architectures
RA TechED 2019 - NT03 - Building Converged Plantwide Ethernet ArchitecturesRA TechED 2019 - NT03 - Building Converged Plantwide Ethernet Architectures
RA TechED 2019 - NT03 - Building Converged Plantwide Ethernet Architectures
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric Utilities
 
IRJET- Effect of ICT Application in Manufacturing Industry
IRJET- Effect of ICT Application in Manufacturing IndustryIRJET- Effect of ICT Application in Manufacturing Industry
IRJET- Effect of ICT Application in Manufacturing Industry
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
 
Galactic Security Systems - Who Owns OT Security Anyway?
Galactic Security Systems - Who Owns OT Security Anyway?Galactic Security Systems - Who Owns OT Security Anyway?
Galactic Security Systems - Who Owns OT Security Anyway?
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
 
Industrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case StudyIndustrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case Study
 
Iio t security std
Iio t security stdIio t security std
Iio t security std
 

More from Sougata Mitra

Expectation from smart grid
Expectation from smart gridExpectation from smart grid
Expectation from smart gridSougata Mitra
 
Technology components big data
Technology components   big dataTechnology components   big data
Technology components big dataSougata Mitra
 
Nucleus of Smart Grid: Communication
Nucleus of Smart Grid: CommunicationNucleus of Smart Grid: Communication
Nucleus of Smart Grid: CommunicationSougata Mitra
 
Business Benefits of GIS - ROI
Business Benefits of GIS - ROI Business Benefits of GIS - ROI
Business Benefits of GIS - ROI Sougata Mitra
 
Migrating enterprise applications to cloud
Migrating enterprise applications to cloudMigrating enterprise applications to cloud
Migrating enterprise applications to cloudSougata Mitra
 
Introduction IS Utilities - Indian DISCOM
Introduction IS Utilities - Indian DISCOMIntroduction IS Utilities - Indian DISCOM
Introduction IS Utilities - Indian DISCOMSougata Mitra
 
Introduction - Utilities Industry
Introduction - Utilities IndustryIntroduction - Utilities Industry
Introduction - Utilities IndustrySougata Mitra
 
Sify advantage odisha
Sify advantage odishaSify advantage odisha
Sify advantage odishaSougata Mitra
 
Pre-configured Cloud Solutions
Pre-configured Cloud Solutions Pre-configured Cloud Solutions
Pre-configured Cloud Solutions Sougata Mitra
 
E form vendor for o&g
E form vendor for o&gE form vendor for o&g
E form vendor for o&gSougata Mitra
 
Eform for Small Enterprise
Eform for Small Enterprise Eform for Small Enterprise
Eform for Small Enterprise Sougata Mitra
 
Resume sales coal enu
Resume sales coal enuResume sales coal enu
Resume sales coal enuSougata Mitra
 
Resume sales application
Resume sales applicationResume sales application
Resume sales applicationSougata Mitra
 
Resume pre sales enu coal
Resume pre sales enu coalResume pre sales enu coal
Resume pre sales enu coalSougata Mitra
 
Resume enu consulting
Resume enu consultingResume enu consulting
Resume enu consultingSougata Mitra
 
Sougata Mitra, EU Sales
Sougata Mitra, EU Sales Sougata Mitra, EU Sales
Sougata Mitra, EU Sales Sougata Mitra
 

More from Sougata Mitra (20)

Expectation from smart grid
Expectation from smart gridExpectation from smart grid
Expectation from smart grid
 
Technology components big data
Technology components   big dataTechnology components   big data
Technology components big data
 
Nucleus of Smart Grid: Communication
Nucleus of Smart Grid: CommunicationNucleus of Smart Grid: Communication
Nucleus of Smart Grid: Communication
 
Business Benefits of GIS - ROI
Business Benefits of GIS - ROI Business Benefits of GIS - ROI
Business Benefits of GIS - ROI
 
Migrating enterprise applications to cloud
Migrating enterprise applications to cloudMigrating enterprise applications to cloud
Migrating enterprise applications to cloud
 
Introduction IS Utilities - Indian DISCOM
Introduction IS Utilities - Indian DISCOMIntroduction IS Utilities - Indian DISCOM
Introduction IS Utilities - Indian DISCOM
 
Introduction - Utilities Industry
Introduction - Utilities IndustryIntroduction - Utilities Industry
Introduction - Utilities Industry
 
Sify advantage odisha
Sify advantage odishaSify advantage odisha
Sify advantage odisha
 
SCADA Overview
SCADA OverviewSCADA Overview
SCADA Overview
 
Pre-configured Cloud Solutions
Pre-configured Cloud Solutions Pre-configured Cloud Solutions
Pre-configured Cloud Solutions
 
Eform report
Eform report Eform report
Eform report
 
E form vendor for o&g
E form vendor for o&gE form vendor for o&g
E form vendor for o&g
 
Gis pov
Gis povGis pov
Gis pov
 
Eform for Small Enterprise
Eform for Small Enterprise Eform for Small Enterprise
Eform for Small Enterprise
 
Resume sales enu
Resume sales enuResume sales enu
Resume sales enu
 
Resume sales coal enu
Resume sales coal enuResume sales coal enu
Resume sales coal enu
 
Resume sales application
Resume sales applicationResume sales application
Resume sales application
 
Resume pre sales enu coal
Resume pre sales enu coalResume pre sales enu coal
Resume pre sales enu coal
 
Resume enu consulting
Resume enu consultingResume enu consulting
Resume enu consulting
 
Sougata Mitra, EU Sales
Sougata Mitra, EU Sales Sougata Mitra, EU Sales
Sougata Mitra, EU Sales
 

Recently uploaded

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 

Recently uploaded (20)

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 

Cybersecurity in Utilities

  • 1. Point Of View Technology Landscape for Utilities Industry: Cyber Security By Sougata Mitra, Business Leader, Energy & Utilities Background In the electricity sector, the historical focus has been on implementation of equipment that could improve electricity system reliability. Communications and IT equipment were formerly viewed as just supporting electricity system reliability. However, both the communications and IT sectors are becoming more critical to the reliability of the electricity system. Utilities are installing technologies that Transform the utility network, Improve generation performance and Transform customer operations. Information technology (IT) focuses on the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability. Cybersecurity for the smart grid requires an expansion of this focus to address the combined IT, ICS, and communication systems, and their integration with physical equipment and resources in order to maintain the reliability and the security of the smart grid and to protect the privacy of consumers. The Solution Provider Landscape Given the market opportunity around critical infrastructure protection, it isn’t surprising that vendors are rushing to provide products and services to address the need. Many of these vendors lack experience working with OT and are taking a traditional information security approach to solving the problem. It isn’t uncommon to see a vendor promoting a traditional network security solution such as intrusion detection or intrusion prevention as being “critical infrastructure/ ICS/SCADA ready,” when in fact the solution doesn’t speak the protocols typically seen in these environments. Understanding a vendor’s experience and a solution’s capabilities specific to your environment is critical. There are vendors with technologies and services that actually have experience securing OT environments. Vendor Solution Highlights / Comments BAE Applied Intelligence Industrial Protect Industrial Protect is a security appliance developed to protect connections between IT and OT networks. The appliance provides hardware-based security, ensuring the validity, integrity, and authorization of data exchange Bayshore Networks Bayshore IC Bayshore Networks provides a platform that evaluates and enforces industry standards and customized application-layer policies. Bayshore Networks’ technology is Pallaton, an embedded, extensible, XML-based policy language GE Wurldtech Achilles Wurldtech provides products and services for both device manufacturers and operators. Wurldtech provides security assessments to vendors as well as protection profiles to operators. Wurldtech also certifies both manufacturer devices and operator security practices. Lockheed Martin Industrial Defender Automation Systems Manager (ASM) ASM provides visibility into security, compliance, and change management activities across industrial control system environments Secure Crossing Zenwall Secure Crossing leverages a whitelisting approach. By allowing only the selected protocols and specific actions within those protocols and disallowing all other traffic, Zenwall provides the level of filtering needed for a customer to solve SCADA, Remote Location, or Zone Level security. Sourcefire Firepower FirePower offers network based intrusion detection and prevention. FireSight provides passive network visibility into hosts, users, assets,applications, files, protocols, and vulnerabilities within critical infrastructure environments. Tofino Security Tofino Industrial Security Solution Tofino Security appliances provide inline network segmentation with firewall, content inspection, and connection management capabilities