SlideShare a Scribd company logo
1 of 79
Intelligent Buildings Council (IBC)
Chair: Trevor Nightingale (National Research Council)
Vice-Chair: Harsha Chandrashekar (Honeywell International Inc)
Vice-Chair: Robert Lane (Robert H. Lane and Associates Inc.)
Vice-Chair: Bob Allan (The Siemon Company)
Vice-Chair: Terrence DeFranco (Iota Communications, Inc.)
© 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC)
1. Agenda
Greg Walker (CABA)
2
1. Agenda
2. Call to Order, Welcome, Introductions, about IBC
3. Administrative
4. “Cybersecurity and Intelligent Buildings” (30 minutes)
Larry O’Brien (ARC Advisory Group)
5. Research Update
6. White Paper Sub-Committee Update
7. New Business
8. Announcements
9. Adjournment
© 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC)
2. Call to Order, Welcome, Introductions, About the IBC
Trevor Nightingale (National Research Council)
3
The CABA Intelligent Buildings Council works to strengthen the large building automation industry through
innovative technology-driven research projects. The Council was established in 2001 by CABA to
specifically review opportunities, take strategic action and monitor initiatives that relate to integrated
systems and automation in the large building sector. The Council's projects promote the next generation of
intelligent building technologies and incorporates a holistic approach that optimizes building performance
and savings.
www.caba.org/ibc
IBC Chair
Trevor Nightingale
Director General
National Research
Council
IBC Vice-Chair
Bob Allan
Global Business
Development Manager,
Intelligent Buildings
The Siemon Company
IBC Vice-Chair
Robert Lane
President & Managing
Partner
Robert H. Lane and
Associates Inc.
IBC Vice-Chair
Harsha Chandrashekar
Product Approvals &
Regulatory Leader
Honeywell International
Inc
IBC Vice-Chair
Terrence DeFranco
President and Chief
Financial Officer
Iota Communications,
Inc.
© 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC)
3. Administrative
Trevor Nightingale (National Research
Council)
3.1 Motion to approve past IBC Minutes (Nov 25):
www.caba.org/ibc
4
© 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC)
“Cybersecurity and Intelligent Buildings” (30 min)
5
4. Keynote
Harsha Chandrashekar (Honeywell International Inc)
Intelligent Buildings and
Cybersecurity
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 7
Speaker
Larry O’Brien
• VP of Research – ARC Advisory Group
• Member of Cybersecurity and smart Cities Team
• Over 25 years of experience
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 8
ARC Research on Cybersecurity and Smart Buildings
• Quantitative and qualitative research for end users-owner/operators and
suppliers
• Cybersecurity for OT/ICS environments
• Building Automation
• Smart Cities (transportation, lighting, smart city platforms, etc.)
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 9
Primary End User Challenges in Cybersecurity for Smart Cities &
Buildings
Cybersecurity
for Smart
Cities
Processes
Technology
People
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 10
Economic Impact of Cyber Attacks in Cities and Communities:
Recent Ransomware Attacks
• Florida – Lakeland City, small town of 12,000 residents, $460K ransom
• Atlanta – More than $17 million?
• Texas – 22 Mostly rural communities: cost undisclosed
• Not just a big city problem, smaller and rural communities are particularly
vulnerable.
• A ransomware attack may put a major dent in a city’s budget, but it can
completely paralyze and bankrupt a small town.
• Better funding is needed for municipalities and better coordination at a
state level for resources, including training.
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 11
IT/OT Convergence: OT Level Cybersecurity Threats
• In simple terms, OT is the domain of systems and sensors that control the
things that act in the physical world.
• In addition to the built environment, smart city OT domains include power
distribution networks, microgrids, gas pipelines, water distribution
networks, security cameras, and so on.
• OT systems have the potential to provide extreme efficiency in the
applications they control or to wreak extreme havoc.
• The new generation of cyber-attacks, many of which appear to be
sponsored by nation states with almost unlimited resources, are
sophisticated multistage attacks designed to gain control over OT systems
and cause disruption, chaos, and potential loss of human life
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 12
The Evolving Threat Landscape
Ransomware gets headlines
and can cripple communities
Threats go beyond simple
ransomware
New age of threats focuses
specifically on operations and
aims to impact equipment in
the physical world
Recent ARC Survey Showing End User Concern with
Different Kinds of Attacks
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 13
What Future Cyber-attacks on Smart Cities will Look Like
Modular Structure of CRASHOVERRIDE Malware Reveals New Level of
Sophistication in Targeted Infrastructure Malware
(Source: Dragos)
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 14
• Ransomware is like throwing
rocks.
• Coordinated OT level attacks
are like an organized military
operation.
• Target hack through HVAC
contractor followed similar
methodology.
Lockheed Martin Cyber Kill Chain Framework Documents the Stages of a Cyber Attack
(Source: Lockheed Martin)
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 15
TRITON Changed the Game
• Hydrocarbon Processing Plant in the
Middle East
• Multi-phased, and prolonged cyber-
attack that resulted in a safe plant
shutdown in August of 2017
• Breach was enabled through multiple
security lapses
• Deny the ability of the plant or
process to shut down safely Within Stage 2 of the ICS Cyber Kill Chain, TRISIS/TRICON Can
Be Viewed as a Supporting Attack
(Source: SANS Institute)
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 16
Impact of IoT and Edge Technologies on Cybersecurity
• IoT is really a catch all term that encompasses a suite of new technologies being
adopted by today’s smart cities and buildings.
• Cloud computing (which includes multiple definitions), edge and fog computing,
analytics, machine learning, AI, networking technologies (MQTT), wireless
infrastructure, 5G – all are part of IoT suite of technologies.
• These technologies are being driven into many new products at a rapid rate.
• Not everyone understands or considers the cybersecurity implications of these
technologies and how they find their way into products and applications.
• IoT also means connected. Millions of sensors, controllers, and computing
devices.
• Many large end users and owner/operators are struggling with how to balance
the innovation of IoT and the business value that it brings with the associated
(and sometimes significant) risk to secure and dependable operations.
• Cybersecurity should be part of your selection criteria for products, systems, and
applications.
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 17
For IoT, the Edge is Where the Rubber Meets the Road
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 18
The Business Value of IoT: Building Automation Use Case
• Rapid adoption of IoT-based systems with the promise of significantly reduced
operational costs is driving rapid growth in the building and facility automation
marketplace.
• The major objectives of these systems are to improve occupant comfort, reduce
energy consumption and total cost of ownership, operate building systems
efficiently, and increase the lifecycle of utilities.
• Digitizing these systems presents a huge opportunity to reduce energy and
operational costs for building or facility owner-operators.
• Commercial buildings consume over 70 percent of the electricity produced in the
US.
• Many buildings are older and incorporate dated legacy technology and could
significantly benefit from retrofitting the building control infrastructure to help
reduce total cost of ownership and enhance security and safety.
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 19
Zero Trust Cybersecurity Schemes and IoT
• Security remains one of the leading inhibitors to widespread adoption of
Industrial IoT applications.
• Zero trust security, where the hardware doesn’t trust the software and vice
versa, is emerging as the baseline for edge implementations.
• End-to-end secure encrypted network designs are necessary.
• The migration toward using Linux and other standard operating systems
coincides with a migration away from secure by configuration, which relies
on implementation, to a secure by design emphasis that enables more
standardized approaches.
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 20
IoT, Connectivity, and Managed Services
• IoT has created a new wave of remote monitoring, managed service
providers, and millions of new remote connections for things like
performance monitoring, predictive maintenance, etc.
• Exploiting security flaws at trusted third parties is often used as a tactic to
gain entry into end user owner/operator sites.
• Target hack is an example of this. Remote monitoring of HVAC systems.
• TRITON also used this technique, harvesting credentials for control system
access from a third party.
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 21
Organizations Need Integrated Cybersecurity Strategies
Siloed Programs Can’t Address All of the Issues
OT
Systems
Devices
IT
IIoT
Environment
& Cloud
ICS
IoT and
IIoT
IT
Today Tomorrow
OT
Systems
Devices
IT
IIoT
Environment
& Cloud
ICS-IT-IIoT
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 22
ARC Industrial Cybersecurity Maturity Model
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 23
Key Standards and Industry Groups at the OT Level
• ISA 62443
• NIST Framework
• ISO 27000
• NERC CIP
• DHS
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 24
ISA/IEC 62443 Cybersecurity Standard
http://isa99.isa.org/ISA99%20Wiki/Home.aspx
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 25
ISA Secure Certification
• The ISA Security Compliance Institute (ISCI), a neutral, not-for-profit
consortium manages the ISASecure certification process.
• ISASecure certifications assess conformance to a subset of the IEC 62443
series.
• ISA-Secure certifies commercial-off-the-shelf (COTS) products and product
supplier development lifecycle practices, for conformance with applicable
parts of the IEC 62443 series.
• ISASecure has an initiative with CABA for certifying products for building
control system (BCS) applications.
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 26
ISA SSA Security Assessment Process
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 27
NIST Cybersecurity Framework
• The US Commerce Department’s
National Institute of Standards
and Technology (NIST) has
received considerable
recognition over the past few
years for developing the
Cybersecurity Framework (CSF),
now widely used as the basis for
establishing effective security
management systems.
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 28
CISA/US-CERT
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 29
CSET Tool
• The Cyber Security Evaluation Tool (CSET®)
provides a systematic, disciplined, and
repeatable approach for evaluating an
organization’s security posture.
• CSET is a desktop software tool that guides
asset owners and operators through a
step-by-step process to evaluate industrial
control system (ICS) and information
technology (IT) network security practices.
• Users can evaluate their own cybersecurity
stance using many recognized government
and industry standards and
recommendations.
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 30
CSIA 2016 Assessment Report
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 31
ISO 27000
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 32
NERC CIP
• NERC is committed to protecting the bulk power system against cybersecurity compromises that could lead to misoperation or
instability. On November 22, 2013, FERC approved Version 5 of the critical infrastructure protection cybersecurity standards
(CIP Version 5), which represent significant progress in mitigating cyber risks to the bulk power system.
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 33
UL 2900 Series of Standards
UL 2900 Spans a Broad Range of Requirements and Products
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 34
Developing Cybersecurity Policy & Expertise in Your
Organization
• Cybersecurity does not equal buying and installing products.
• Having a good cybersecurity strategy does not have to involve huge investments
in technology and training. A sound strategy and standard policies can provide
significant benefits.
• You Need A Good Response Plan: Ransomware provides a good example of the
benefit of having sound cybersecurity policy and the need for a good response
plan. Many owner-operators and city governments are completely caught off
guard when they face a ransomware attack.
• Industrial cybersecurity solutions have become increasingly sophisticated and can
require a high level of cybersecurity expertise to configure and maintain. This will
increase the importance of additional vendor support and training programs for
the end user.
• Look to SANS as an excellent source of training and certification for ICS and OT
level specific cybersecurity certifications, CISSP, GCIA
• ISA, DHS also offer training and resources
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 35
Most Smart City Owner/Operators Don’t Have Formal, Written
Cybersecurity Policies or Standards in Place
(Source: ICMA/UMBC 2016 Survey
https://ebiquity.umbc.edu/_file_directory_/papers/881.pdf)
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 36
How ARC Defines the ICS/OT Cybersecurity Landscape: Building
Automation
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 37
Scope of OT Level Systems in Smart Cities and Buildings is
Broad
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 38
OT Level Cybersecurity Suppliers
Next-generation firewalls (NGFW),
industrial DPI firewalls, and
products that provide secure
unidirectional communications
(unidirectional gateways and data
diodes, which ensure secure one-
way communication).
Products that actively block
compromises to cyber assets
within control systems.
Technologies in this category
include anti-malware software,
application whitelisting, access
control, and industrial deep
packet inspection (DPI) firewalls.
Range of products for
monitoring OT networks and
endpoint assets. These products
enhance system security
through detection of latent
compromises and attacks that
have evaded network security
and endpoint defenses
Security information about cyber
assets, vulnerability alerts,
patches, and
firmware/software/hardware
updates; launchpad and
integration platform for a variety
of security maintenance support
modules
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 39
Cybersecurity Supplier Classification in Building Automation
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 40
What to Look for, What to Question
• LOTS of suppliers. Many in the startup stages, with relatively small
numbers of customers.
• Will they be around in five years?
• If they get acquired, will they still support you?
• Alliances with OT level suppliers.
• Do they understand the business?
• Product certifications and standards testing.
• Secure development processes
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 41
Some Thoughts on Cybersecurity and the Selection Process
• Many end users don’t have a good handle
on the landscape of ICS cybersecurity
solutions.
• Many end users don’t have the right
cybersecurity related criteria embedded into
their ICS and OT asset selection process.
• “Undocumented” systems and devices
currently receive the least amount of
attention when it comes to cybersecurity.
These obscure systems can include boiler
controls, compressor controls, etc.
• Different stakeholders in the organization
aren’t always involved.
Justify
Define
Select
Improve
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 42
Elements of Success for Supplier Selection
• Have a documentable, traceable, and fact-based selection process that proves how and why
you made your decision
• Bring key stakeholders together to make a consensus based decision
• Have a basic understanding of the market and the leading suppliers
• Make sure you have the right selection criteria
• Prioritize/weight criteria, remember that everything is not of equal importance to everything
else
• The selection process doesn’t end with the selection. It transitions into a supplier relationship
management process.
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 43
Summary and Conclusions
• If you don’t already have a cybersecurity program or plan in place at your
organization, you should take simple steps to start developing one. This
presentation should give you information on the key steps needed to get started
and resources.
• Attacks are only going to become more sophisticated and will increasingly target
actions in the physical world through compromising complex control systems and
OT infrastructure.
• Technology churn is driving a lot of todays cybersecurity challenges. IoT
technologies used in an OT level environment need to be carefully vetted for
cybersecurity risks, secure by design principles, etc.
• The smart city and smart building segment needs to adopt standards. ISA/IEC
62443 should seriously be considered as the standard of reference.
• Cybersecurity must be driven into the overall supplier selection process for all OT
level systems and products.
• Consider development of standard cybersecurity policy and response plans in
your organization.
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 44
Resources
• https://www.arcweb.com/consulting-services/cybersecurity-workshops
• https://www.arcweb.com/blog/cybersecurity-viewpoints
• https://www.isa.org/training-and-certifications/isa-certification/isa99iec-
62443/isa99iec-62443-cybersecurity-certificate-programs/
• https://www.nist.gov/topics/cybersecurity
• https://www.dhs.gov/cisa/national-cybersecurity-communications-
integration-center
• https://www.sans.org/netwars/cybercity
VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 45
Thank You
Questions?
Larry O’Brien
https://www.linkedin.com/in/larry-o-brien-a02685/
lobrien@arcweb.com
@dcsanalyst
@smartcityvwpts
•
© 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC)
46
4. Keynote - Questions?
Harsha Chandrashekar (Honeywell International Inc)
© 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC)
www.caba.org/resear
ch
5. Research Update
Trevor Nightingale (National Research Council)
5.1 2019 IBC Landmark Research “Evidence for Building
Retrofits that Improve Organizational Productivity (Phase 2)” (15
Funders)
47
Free Download of Phase 1: www.caba.org/productivity
© 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC)
5. Research Update
Terrence DeFranco (Iota Communications, Inc.)
(CABA)
5.2 2020 IBC Landmark Research “Intelligent Building Energy Management
Systems”
48
Topics: Implementation, integration, real-time monitoring, zero net energy, battery storage,
grid interactions, renewables, etc.
© 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC)
6. White Paper Sub-Committee
Update
Ken Wacks (Ken Wacks Associates)
6.1 Recently Completed: None
49
www.caba.org/WhitePapers
© 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC)
6. White Paper Sub-Committee
Update
Ken Wacks (Ken Wacks Associates)
6.2 In Progress:
“Energy Metering and Power Quality Metering in North America”
50
ArcoLogix LLC
Asian Institute of Intelligent Buildings
Brainwave Research Corp.
CMG
Convergint Technologies
CopperTree Analytics Inc.
Current, powered by GE
Cyber Power Systems, Inc.
Domotz
Enercare Connections Inc.
EZ Meter Technologies
Honeywell International Inc.
Ken Wacks Associates
Public Works and Government Services
Canada
Renesas Electronics America Inc.
Robert H Lane and Associates Inc.
Schneider Electric
Sustainable Resources Management
Triacta Power Solutions
Zinwave
www.caba.org/WhitePapers
© 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC)
6. White Paper Sub-Committee
Update
Ken Wacks (Ken Wacks Associates)
6.2 In Progress:
“Multi-MHz Wireless Power Transfer and Its Commercial
Applications”
51
Airfuel Alliance (Chair)
University of Michigan - Shanghai Jiao Tong
University Joint Institute
Princeton University
www.caba.org/WhitePapers
© 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC)
6. White Paper Sub-Committee
Update
Ken Wacks (Ken Wacks Associates)
6.2 In Progress:
“The Evolution of Integrating LiFi Technology into Smart Lighting
and Control Systems for the Intelligent Building”
52
Wharton County Junior College (Chair)
Acuity Brands, Inc.
ArcoLogix LLC
Control4
National Electrical Manufacturers Association
Telecommunications Industry Association (TIA)
www.caba.org/WhitePapers
© 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC)
6. White Paper Sub-Committee
Update
Ken Wacks (Ken Wacks Associates)
6.2 In Progress:
“The Ethics of AI and the IoT Connected Home and Intelligent
Buildings”
53
ArcoLogix LLC
Enbridge Gas Inc.
George Brown College
Hydro One Networks Inc.
Ken Wacks Associates
Site 1001, Inc.
Sustainable Resources Management Inc.
Syska Hennessy Group, Inc.
Telecommunications Industry Association
(TIA)
University of Toronto
© 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC)
6. White Paper Sub-Committee
Update
Ken Wacks (Ken Wacks Associates)
All proposals and previously completed IBC White Papers can be downloaded at:
www.caba.org/whitepapers
54
© 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC)
7. New Business
Trevor Nightingale (National Research Council)
7.1 Other new IBC business?
55
© 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC)
7. New Business
Andre Ristaino (ISA)
7.2 CBRE Building Technology Consultancy – Cyber
Roundtable
56
Andre Ristaino
Managing Director, ISA
Director ISA Global Cybersecurity Alliance
Global Facilities BMS Technology
Certification Program
Discussion Document:
Proposal to Develop an Assessment and Conformance
Program for Deployed Building Automation and Control
Systems
National Electrical Manufacturer’s Association (NEMA)
International Society of Automation (ISA)
US Commercial Real Estate Services (CBRE)
Agenda
(Proposed – Yet to be Finalized)
• 0830-0900 Introductions & Purpose
• 0900-1000 Program Overview & Intent
• 1000-1030 Threat Assessment (DHS /DoD)
• 1030-1130 Collaborate on Program
• 1200-1300 Decide Next Steps & Timeline
Building Management System (BMS) Defined
• Physical security systems (cameras, entry logs,
cipher locks)
• Physical movement systems (elevators, escalators)
• HVAC
• Electrical (power distribution, UPS, backup power,
clean power)
• Water/Wastewater
• Fire Control (life-safety)
• Lighting (management, distribution, POE)
• BMS control networking (wireless, LiFi, wired)
Proposed Program Excludes Traditional Business & IT Networks and
Systems in Initial Phases
Developing Program Expectations
• Critical feedback sought to shape this initiative
• Is there a market need?
• Would the real estate market embrace this initiative?
• What are the risks?
• Would this initiative drive positive changes to
policyholders and insurers? What other market
impacts can be anticipated?
• What Federal, State, Local and Tribal considerations
should be included in the standards?
• What is mandated? What is desirable?
• How to avoid the downside of the LEED program
• Recommendations for development
• Gaging interest in partnering with your working group
• Establishment of an entity to run the program
Interoperating
Building Systems
Multiple
Integrators
(Vendors)
Open
Communi-
cations
Protocols
Generic Risk
Posed by BMS:
• Minimal
Staffing
• Many paths to
exploitation
• Unchecked
spread of
malware
Live Pentest Research Finding:
If a third-party software is ‘visible’ as part of a
BMS integration system, it can be exploited
by researchers seeking to penetrate a BMS.
Examples: XSS, root access / Directory Re-writes,
Firmware over-writes, and privilege escalation enabling
researchers to gain full access to corporate IT networks.
Source: I Own Your Building (Management System), Applied Risk, November 2019
Specific Risk
Posed by BMS:
• All researched
vendors had
12 or greater
exposed
systems
• Some as high
as 1000+
This FICO-score-like rating measures an organization’s chance of experiencing a data
breach, based on measurements tied to the company’s public-facing assets. Your score ques
alerts for cyber or physical threats to supply chains, allowing intelligence to evaluate critical
vendors. The lower your score, the higher your risk.
KEY RISK
INDICATORS
WHAT IS YOUR
CYBER ‘RISK’ SCORE?
300
500 650
775
850
HIGH RISK LOW RISK
720
UNCLASSIFIED
• Health & hygiene
of IT systems
• Network
infrastructure
• Software & services
Proposed Program Intent
• A Standard program for facility owners to confirm the extent
of cyber protection designed into BMS
• Possible marketing advantage
• Adaptive to the end user’s requirements
• Raise awareness for all facility occupants
• Enhance the value of investments in BMS cyber protections
• Rewarded with a competitive advantage over less secure
facilities
• Positive response from facility insurers
• Utilizes widely-accepted industry Standards
• Accelerate the improvement of BMS cyber security for
occupant safety
• Guide a growing industry of third-party cyber protection
firms
• Start with commercial office buildings, follow on frameworks
for healthcare, industrial, hospitality, academic, and
residential facilities
Scope of Proposed Program
• An application specifically for BMS to enhance
cybersecurity for operational technology and physical
control systems – does not include IT currently
• Addresses the entire value chain of building automation
and control systems
• Reviews and integrates multiple, existing international
standards with industry best practices-promoting the
use of a tiered security posture for the BMS selected by
the end user based on the risk to a facility or operation
• Confirmed via regular 3rd party control system
enterprise and process evaluations
Program Addresses People, Processes & Technology
1) Product Supplier
• Discovers and mitigates risk
• Adheres to Federal regulations
• Evolves systems and/or components
with risk landscape
2) System Integrator Service Provider
• Discovers and escalates risk for removal
• Adheres to Federal regulations and
other compliance schema
• Provides more-secure automation
3) Asset Owner (Facility Owner)
• Deploys securely – confident!
• Cyber security management system
awareness of risk landscape
• Operation and Maintenance
• Service provider partnership in CS
management system
BMS Cybersecurity
Lifecycles
1) Product Supplier
• Secure by design
• Security development lifecycle
• Provides systems and/or components
2) System Integrator Service Provider
• Secure in development
• Risk-based system and component
integration
• Provides an automation solution
3) Asset Owner (Facility Owner)
• Secure in deployment
• Cyber security management system
• Operation and maintenance
• Maintenance may be done
by a service provider
1. Product
Supplier
2. System
Integrator
3. Asset
Owner
Value-Added to
Lifecycles
Program Targets
Incentivize the protection of BMS systems to reduce risk to/from:
• Life, safety, health – protection of employees (physical and
virtual)
• Employee actions
• Adheres to Federal, State, and Local laws and ordinances on
landlord/tenant rights and individual rights to privacy, as-
applicable.
• Protection of data (IP, financial)
• Outsider attacks (e.g. ransomware)
• Business interruption / degradation
• Compliance with Federal and Defense regulations on Federal real
estate assets, as-applicable.
• Protection of brand value
Promote Concept & Obtain Commitment Decisions NLT March
2020
Assess and Issue a Cyber Performance Rating for Facility’s BMS
• Based on consolidation of standards already in public domain
• Dynamic – the threat is always evolving
• Dynamic- the program for the response is always evolving
• Incentivizes sustainment of good cyber practices over life cycle
• Dynamic- rating requires periodic recertification to sustain these good cyber practices
• Assessment addresses protections for technology, processes, and people
• Rating public or private to tenants – Owner discretion
Good Better Best
Bronze Silver Platinum
Gold
Most
Secure
Least
Secure
Performance Model Comparison
• BRONZE
• SILVER
• GOLD
• PLATINUM
• Basic Cyber Hygiene
• Intermediate Cyber Hygiene
• Good Cyber Hygiene
• Proactive Cyber Hygiene
• Advanced / Progressive /
State of the Art
• Maturity Level 1
• Maturity Level 2
• Maturity Level 3
• Maturity Level 4
• Maturity Indicator Level 0
• Maturity Indicator Level 1
• Maturity Indicator Level 2
• Maturity Indicator Level 3
DoE Cybersecurity Capability
Maturity Model (C2M2)
DoD Cybersecurity Maturity
Model Certification (CMMC)
ISA/IEC 62443
Proposed For BMS
Certification
Bronze Level Proposed
Cybersecurity Requirements Definition
Operations Maturity Level ISA/IEC 62443-2-1 – Maturity Level 1
Maintenance Maturity Level ISA/IEC 62443-2-4 – Maturity Level 1
Automation Security Zone ISA/IEC 62443-3-3 – Security Level 1
Critical Security Zone ISA/IEC 62443-3-3 – Security Level 2
Security Level 1 Requirements - High Level Summary
Identification and
Authentication Control
User identification and authentication
Use Control User authorization enforcement
System Integrity Communications integrity, Malware protection
Data Confidentiality Information confidentiality at rest
Restricted Data Flow Network segmentation
Timely Response to Events Audit log accessibility
Resource Availability Denial of Service protection, Backup
CMMC Int Capabilities* # of Practices
*NIST, ISO, RMM KIM-SG4, CIS, etc
Practices defined as of CMMC v.6 11/19.
Access Control
Asset Management
Audit & Accountability
Awareness & Training
Configuration Management
ID & Authorization
Incident Response
Maintenance
Media Protection
Personnel Security
Physical Protection
Recovery
Risk Management
Security Assessment
Situational Awareness
System & Comm. Protection
System & Info. Integrity
4
-
-
-
-
2
-
-
1
-
4
-
-
-
-
2
4
Silver Level Proposed
Cybersecurity Requirements Definition
Operations Maturity Level ISA/IEC 62443-2-1 – Maturity Level 2
Maintenance Maturity Level ISA/IEC 62443-2-4 – Maturity Level 2
Automation Security Zone ISA/IEC 62443-3-3 – Security Level 2
Critical Security Zone ISA/IEC 62443-3-3 – Security Level 3
Security Level 2 Requirements - High Level Summary
Identification and
Authentication Control
Unique user identification and authentication
Use Control Enforcement + Role Based Access Control
System Integrity Communications integrity, Entry/Exit malware
protection
Data Confidentiality Information confidentiality at rest or in transit
Restricted Data Flow Physical network segmentation
Timely Response to
Events
Audit log accessibility, Continuous monitoring
Resource Availability DoS protection, Backup verification, Inventory
CMMC Good Capabilities* Add’l Practices
Access Control
Asset Management
Audit & Accountability
Awareness & Training
Configuration Management
ID & Authorization
Incident Response
Maintenance
Media Protection
Personnel Security
Physical Protection
Recovery
Risk Management
Security Assessment
Situational Awareness
System & Comm. Protection
System & Info. Integrity
12
--
4
2
6
5
5
4
3
2
1
2
3
3
1
3
2
*NIST, ISO, RMM KIM-SG4, CIS, etc
Practices defined as of CMMC v.6 11/19.
Gold Level Proposed
Cybersecurity Requirements Definition
Operations Maturity Level ISA/IEC 62443-2-1 – Maturity Level 3
Maintenance Maturity Level ISA/IEC 62443-2-4 – Maturity Level 3
Automation Security Zone ISA/IEC 62443-3-3 – Security Level 3
Critical Security Zone ISA/IEC 62443-3-3 – Security Level 4
Security Level 3 Requirements - High Level Summary
Identification and
Authentication Control
Multifactor user identification and
authentication
Use Control Enforcement + RBAC + Supervisor Override
System Integrity Cryptographic integrity, Centralized malware
protection
Data Confidentiality Information confidentiality at rest or in transit
Restricted Data Flow Independence from non-control networks
Timely Response to Events Audit log accessibility, Continuous monitoring
Resource Availability DoS protection, Backup automation, Inventory
CMMC Pro Control Capabilities* Add’lPractice
Access Control
Asset Management
Audit & Accountability
Awareness & Training
Configuration Management
ID & Authorization
Incident Response
Maintenance
Media Protection
Personnel Security
Physical Protection
Recovery
Risk Management
Security Assessment
Situational Awareness
System & Comm. Protection
System & Info. Integrity
5
2
7
1
3
4
2
2
4
-
1
1
3
2
1
14
3
*NIST, ISO, RMM KIM-SG4, CIS, etc
Practices defined as of CMMC v.6 11/19.
Platinum Level Proposed
Cybersecurity Requirements Definition
Operations Maturity Level ISA/IEC 62443-2-1 – Maturity Level 4
Maintenance Maturity Level ISA/IEC 62443-2-4 – Maturity Level 4
Automation Security Zone ISA/IEC 62443-3-3 – Security Level 4
Critical Security Zone ISA/IEC 62443-3-3 – Security Level 4
Security Level 4 Requirements - High Level Summary
Identification and
Authentication Control
Multifactor user identification and authentication
Use Control Enforcement + RBAC + Override + Dual approval
System Integrity Cryptographic integrity, Centralized malware
protection
Data Confidentiality Information confidentiality across zones
Restricted Data Flow Logical and physical isolation of critical networks
Timely Response to
Events
Audit log accessibility, Continuous monitoring
Resource Availability DoS protection, Backup automation, Inventory
CMMC Adv Control Family* Add’lPractices
Access Control
Asset Management
Audit & Accountability
Awareness & Training
Configuration Management
ID & Authorization
Incident Response
Maintenance
Media Protection
Personnel Security
Physical Protection
Recovery
Risk Management
Security Assessment
Situational Awareness
System & Comm. Protection
System & Info. Integrity
Not Yet Defined
“
“
“
“
“
“
“
“
“
“
“
“
“
“
“
“
*NIST, ISO, RMM KIM-SG4, CIS, etc
Practices defined as of CMMC v.6 11/19.
Our Assessment of Value
• Meet global and U.S. security requirements using a
single, unified certification
• Simplifies procurement specification process (establish
corporate standards) for technology and cyber
protection services
• All stakeholders (including insurers) can easily
understand standards-based cybersecurity capabilities
• Capabilities independently validated by external entity
• Confidence that protections will be upgraded over
time based on evolving risk
• Easily adopted into public policy
Next Steps
Establishment of an entity to serve as the keeper of the program and certification agency
Invite stakeholders to develop certification program for commercial properties
Continued development of Program for other facility types
Strategic Communication on the growing threat and proposed response
Potential adoption of program for “smart” products (cars, media, homes, appliances)
Next Steps
Action Timeline
Jan
‘20
Asset Owner
Meeting
Feb
‘20
Certification
body
designated
Funding
documents
drafted
Apr
‘20
Update to ICS
JWG
Initiate body
© 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC)
8. Announcements
Ron Zimmer (CABA)
CoRETECH 2109, Nov 13-15, San Jose, CA
Greenbuild International Conference and Expo 2019, Nov 19-22, Atlanta,
GA
CABA AGM, Dec 5, 11am ET via Webinar
AHR Expo, Feb 3-5, Orlando, FL
DISTRIBUTECH International 2020, Feb 9-11, San Diego, CA
77
8.1 Past Event Overview:
© 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC)
8. Announcements
Ron Zimmer (CABA)
78
Light+building, Mar 8-13, Frankfurt, Germany
Internet of Things World, Apr 6-9, San Jose, CA
Niagara Summit: Connecting the World, Apr 19-21, San Diego, CA
BuildingsNY, Apr 28-29, New York, NY
8.2 Upcoming events:
© 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC)
Continental Automated Buildings Association (CABA)
caba@caba.org
www.CABA.org
www.caba.org/ibc
Connect to what’s next™
9. Adjournment
Trevor Nightingale (National Research
Council)
79
Next IBC Meeting, April 2020

More Related Content

Similar to IBC-Feb-2020-1.pptx

Internet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalInternet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalAnastasios Economides
 
Build a network to thrive in the Digital age
Build a network to thrive in the Digital ageBuild a network to thrive in the Digital age
Build a network to thrive in the Digital ageFiona Sexton
 
Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My!
Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My! Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My!
Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My! Laurie Lamberth
 
What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachSUSE
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
iFluids Cybersecurity Seminar CIC Qatar 2018 Agenda
iFluids Cybersecurity Seminar  CIC Qatar 2018 AgendaiFluids Cybersecurity Seminar  CIC Qatar 2018 Agenda
iFluids Cybersecurity Seminar CIC Qatar 2018 AgendaJohn Kingsley
 
Technological innovations in facilities management
Technological innovations in facilities managementTechnological innovations in facilities management
Technological innovations in facilities managementssuserfa7375
 
IRJET- Determination of the Efficacy of Civil soft Quick Series in the Desi...
IRJET- 	 Determination of the Efficacy of Civil soft Quick Series in the Desi...IRJET- 	 Determination of the Efficacy of Civil soft Quick Series in the Desi...
IRJET- Determination of the Efficacy of Civil soft Quick Series in the Desi...IRJET Journal
 
2016/01/26 Glenn Ricart - Smart Gigabit Communities
2016/01/26 Glenn Ricart - Smart Gigabit Communities2016/01/26 Glenn Ricart - Smart Gigabit Communities
2016/01/26 Glenn Ricart - Smart Gigabit CommunitiesUS-Ignite
 
Unveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeUnveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeAndrew Blades
 
IoT-market-estimative
IoT-market-estimativeIoT-market-estimative
IoT-market-estimativeCleber Gomes
 
Open source and open communities will play a big role in SDN and networking i...
Open source and open communities will play a big role in SDN and networking i...Open source and open communities will play a big role in SDN and networking i...
Open source and open communities will play a big role in SDN and networking i...Open Networking Summits
 
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018aztechcouncil
 
Career Domain 2022-23.pptx
Career Domain 2022-23.pptxCareer Domain 2022-23.pptx
Career Domain 2022-23.pptxJanani S
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud worldZscaler
 
Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoTAhmed Banafa
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceAltoros
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017Ahmed Banafa
 
Smart Buildings Action Cluster
Smart Buildings Action ClusterSmart Buildings Action Cluster
Smart Buildings Action Clusterinside-BigData.com
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkReal-Time Innovations (RTI)
 

Similar to IBC-Feb-2020-1.pptx (20)

Internet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalInternet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_final
 
Build a network to thrive in the Digital age
Build a network to thrive in the Digital ageBuild a network to thrive in the Digital age
Build a network to thrive in the Digital age
 
Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My!
Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My! Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My!
Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My!
 
What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your Reach
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
iFluids Cybersecurity Seminar CIC Qatar 2018 Agenda
iFluids Cybersecurity Seminar  CIC Qatar 2018 AgendaiFluids Cybersecurity Seminar  CIC Qatar 2018 Agenda
iFluids Cybersecurity Seminar CIC Qatar 2018 Agenda
 
Technological innovations in facilities management
Technological innovations in facilities managementTechnological innovations in facilities management
Technological innovations in facilities management
 
IRJET- Determination of the Efficacy of Civil soft Quick Series in the Desi...
IRJET- 	 Determination of the Efficacy of Civil soft Quick Series in the Desi...IRJET- 	 Determination of the Efficacy of Civil soft Quick Series in the Desi...
IRJET- Determination of the Efficacy of Civil soft Quick Series in the Desi...
 
2016/01/26 Glenn Ricart - Smart Gigabit Communities
2016/01/26 Glenn Ricart - Smart Gigabit Communities2016/01/26 Glenn Ricart - Smart Gigabit Communities
2016/01/26 Glenn Ricart - Smart Gigabit Communities
 
Unveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeUnveiling the Sydney IoT Landscape
Unveiling the Sydney IoT Landscape
 
IoT-market-estimative
IoT-market-estimativeIoT-market-estimative
IoT-market-estimative
 
Open source and open communities will play a big role in SDN and networking i...
Open source and open communities will play a big role in SDN and networking i...Open source and open communities will play a big role in SDN and networking i...
Open source and open communities will play a big role in SDN and networking i...
 
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018
 
Career Domain 2022-23.pptx
Career Domain 2022-23.pptxCareer Domain 2022-23.pptx
Career Domain 2022-23.pptx
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoT
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to Face
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017
 
Smart Buildings Action Cluster
Smart Buildings Action ClusterSmart Buildings Action Cluster
Smart Buildings Action Cluster
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
 

More from Ruchi Gandhi

History of Architecture.ppt
History of Architecture.pptHistory of Architecture.ppt
History of Architecture.pptRuchi Gandhi
 
Urban Housing.pptx
Urban Housing.pptxUrban Housing.pptx
Urban Housing.pptxRuchi Gandhi
 
Persian GARDEN[1].pptx
Persian GARDEN[1].pptxPersian GARDEN[1].pptx
Persian GARDEN[1].pptxRuchi Gandhi
 
5_3j_pp_plumbing overview_v2.0.ppt
5_3j_pp_plumbing overview_v2.0.ppt5_3j_pp_plumbing overview_v2.0.ppt
5_3j_pp_plumbing overview_v2.0.pptRuchi Gandhi
 
HOSPITAL LIFT.pptx
HOSPITAL LIFT.pptxHOSPITAL LIFT.pptx
HOSPITAL LIFT.pptxRuchi Gandhi
 
St_unit_Intro_to_Acoustics.pptx
St_unit_Intro_to_Acoustics.pptxSt_unit_Intro_to_Acoustics.pptx
St_unit_Intro_to_Acoustics.pptxRuchi Gandhi
 
St_unit_Intro_to_Acoustics.pptx
St_unit_Intro_to_Acoustics.pptxSt_unit_Intro_to_Acoustics.pptx
St_unit_Intro_to_Acoustics.pptxRuchi Gandhi
 

More from Ruchi Gandhi (10)

History of Architecture.ppt
History of Architecture.pptHistory of Architecture.ppt
History of Architecture.ppt
 
Urban Housing.pptx
Urban Housing.pptxUrban Housing.pptx
Urban Housing.pptx
 
POLICIES.pdf
POLICIES.pdfPOLICIES.pdf
POLICIES.pdf
 
Persian GARDEN[1].pptx
Persian GARDEN[1].pptxPersian GARDEN[1].pptx
Persian GARDEN[1].pptx
 
Importance of.pdf
Importance of.pdfImportance of.pdf
Importance of.pdf
 
5_3j_pp_plumbing overview_v2.0.ppt
5_3j_pp_plumbing overview_v2.0.ppt5_3j_pp_plumbing overview_v2.0.ppt
5_3j_pp_plumbing overview_v2.0.ppt
 
ppt.pptx
ppt.pptxppt.pptx
ppt.pptx
 
HOSPITAL LIFT.pptx
HOSPITAL LIFT.pptxHOSPITAL LIFT.pptx
HOSPITAL LIFT.pptx
 
St_unit_Intro_to_Acoustics.pptx
St_unit_Intro_to_Acoustics.pptxSt_unit_Intro_to_Acoustics.pptx
St_unit_Intro_to_Acoustics.pptx
 
St_unit_Intro_to_Acoustics.pptx
St_unit_Intro_to_Acoustics.pptxSt_unit_Intro_to_Acoustics.pptx
St_unit_Intro_to_Acoustics.pptx
 

Recently uploaded

如何办理(UVa毕业证书)弗吉尼亚大学毕业证毕业证(文凭)成绩单原版一比一定制
如何办理(UVa毕业证书)弗吉尼亚大学毕业证毕业证(文凭)成绩单原版一比一定制如何办理(UVa毕业证书)弗吉尼亚大学毕业证毕业证(文凭)成绩单原版一比一定制
如何办理(UVa毕业证书)弗吉尼亚大学毕业证毕业证(文凭)成绩单原版一比一定制didi bibo
 
Revit Understanding Reference Planes and Reference lines in Revit for Family ...
Revit Understanding Reference Planes and Reference lines in Revit for Family ...Revit Understanding Reference Planes and Reference lines in Revit for Family ...
Revit Understanding Reference Planes and Reference lines in Revit for Family ...Narsimha murthy
 
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service Amravati
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service AmravatiVIP Call Girl Amravati Aashi 8250192130 Independent Escort Service Amravati
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130Suhani Kapoor
 
Cheap Rate ➥8448380779 ▻Call Girls In Iffco Chowk Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Iffco Chowk GurgaonCheap Rate ➥8448380779 ▻Call Girls In Iffco Chowk Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Iffco Chowk GurgaonDelhi Call girls
 
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
ARt app | UX Case Study
ARt app | UX Case StudyARt app | UX Case Study
ARt app | UX Case StudySophia Viganò
 
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...Suhani Kapoor
 
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfThe_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfAmirYakdi
 
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)jennyeacort
 
SD_The MATATAG Curriculum Training Design.pptx
SD_The MATATAG Curriculum Training Design.pptxSD_The MATATAG Curriculum Training Design.pptx
SD_The MATATAG Curriculum Training Design.pptxjanettecruzeiro1
 
PORTFOLIO DE ARQUITECTURA CRISTOBAL HERAUD 2024
PORTFOLIO DE ARQUITECTURA CRISTOBAL HERAUD 2024PORTFOLIO DE ARQUITECTURA CRISTOBAL HERAUD 2024
PORTFOLIO DE ARQUITECTURA CRISTOBAL HERAUD 2024CristobalHeraud
 
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...Pooja Nehwal
 
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfChapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfParomita Roy
 
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai DouxDubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Douxkojalkojal131
 
Kindergarten Assessment Questions Via LessonUp
Kindergarten Assessment Questions Via LessonUpKindergarten Assessment Questions Via LessonUp
Kindergarten Assessment Questions Via LessonUpmainac1
 
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130Suhani Kapoor
 
SCRIP Lua HTTP PROGRACMACION PLC WECON CA
SCRIP Lua HTTP PROGRACMACION PLC  WECON CASCRIP Lua HTTP PROGRACMACION PLC  WECON CA
SCRIP Lua HTTP PROGRACMACION PLC WECON CANestorGamez6
 
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...babafaisel
 
Cosumer Willingness to Pay for Sustainable Bricks
Cosumer Willingness to Pay for Sustainable BricksCosumer Willingness to Pay for Sustainable Bricks
Cosumer Willingness to Pay for Sustainable Bricksabhishekparmar618
 

Recently uploaded (20)

如何办理(UVa毕业证书)弗吉尼亚大学毕业证毕业证(文凭)成绩单原版一比一定制
如何办理(UVa毕业证书)弗吉尼亚大学毕业证毕业证(文凭)成绩单原版一比一定制如何办理(UVa毕业证书)弗吉尼亚大学毕业证毕业证(文凭)成绩单原版一比一定制
如何办理(UVa毕业证书)弗吉尼亚大学毕业证毕业证(文凭)成绩单原版一比一定制
 
Revit Understanding Reference Planes and Reference lines in Revit for Family ...
Revit Understanding Reference Planes and Reference lines in Revit for Family ...Revit Understanding Reference Planes and Reference lines in Revit for Family ...
Revit Understanding Reference Planes and Reference lines in Revit for Family ...
 
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service Amravati
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service AmravatiVIP Call Girl Amravati Aashi 8250192130 Independent Escort Service Amravati
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service Amravati
 
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
 
Cheap Rate ➥8448380779 ▻Call Girls In Iffco Chowk Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Iffco Chowk GurgaonCheap Rate ➥8448380779 ▻Call Girls In Iffco Chowk Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Iffco Chowk Gurgaon
 
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Okhla Delhi 💯Call Us 🔝8264348440🔝
 
ARt app | UX Case Study
ARt app | UX Case StudyARt app | UX Case Study
ARt app | UX Case Study
 
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
 
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfThe_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
 
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
Call Us ✡️97111⇛47426⇛Call In girls Vasant Vihar༒(Delhi)
 
SD_The MATATAG Curriculum Training Design.pptx
SD_The MATATAG Curriculum Training Design.pptxSD_The MATATAG Curriculum Training Design.pptx
SD_The MATATAG Curriculum Training Design.pptx
 
PORTFOLIO DE ARQUITECTURA CRISTOBAL HERAUD 2024
PORTFOLIO DE ARQUITECTURA CRISTOBAL HERAUD 2024PORTFOLIO DE ARQUITECTURA CRISTOBAL HERAUD 2024
PORTFOLIO DE ARQUITECTURA CRISTOBAL HERAUD 2024
 
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...
 
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfChapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
 
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai DouxDubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
 
Kindergarten Assessment Questions Via LessonUp
Kindergarten Assessment Questions Via LessonUpKindergarten Assessment Questions Via LessonUp
Kindergarten Assessment Questions Via LessonUp
 
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
 
SCRIP Lua HTTP PROGRACMACION PLC WECON CA
SCRIP Lua HTTP PROGRACMACION PLC  WECON CASCRIP Lua HTTP PROGRACMACION PLC  WECON CA
SCRIP Lua HTTP PROGRACMACION PLC WECON CA
 
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
 
Cosumer Willingness to Pay for Sustainable Bricks
Cosumer Willingness to Pay for Sustainable BricksCosumer Willingness to Pay for Sustainable Bricks
Cosumer Willingness to Pay for Sustainable Bricks
 

IBC-Feb-2020-1.pptx

  • 1. Intelligent Buildings Council (IBC) Chair: Trevor Nightingale (National Research Council) Vice-Chair: Harsha Chandrashekar (Honeywell International Inc) Vice-Chair: Robert Lane (Robert H. Lane and Associates Inc.) Vice-Chair: Bob Allan (The Siemon Company) Vice-Chair: Terrence DeFranco (Iota Communications, Inc.)
  • 2. © 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC) 1. Agenda Greg Walker (CABA) 2 1. Agenda 2. Call to Order, Welcome, Introductions, about IBC 3. Administrative 4. “Cybersecurity and Intelligent Buildings” (30 minutes) Larry O’Brien (ARC Advisory Group) 5. Research Update 6. White Paper Sub-Committee Update 7. New Business 8. Announcements 9. Adjournment
  • 3. © 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC) 2. Call to Order, Welcome, Introductions, About the IBC Trevor Nightingale (National Research Council) 3 The CABA Intelligent Buildings Council works to strengthen the large building automation industry through innovative technology-driven research projects. The Council was established in 2001 by CABA to specifically review opportunities, take strategic action and monitor initiatives that relate to integrated systems and automation in the large building sector. The Council's projects promote the next generation of intelligent building technologies and incorporates a holistic approach that optimizes building performance and savings. www.caba.org/ibc IBC Chair Trevor Nightingale Director General National Research Council IBC Vice-Chair Bob Allan Global Business Development Manager, Intelligent Buildings The Siemon Company IBC Vice-Chair Robert Lane President & Managing Partner Robert H. Lane and Associates Inc. IBC Vice-Chair Harsha Chandrashekar Product Approvals & Regulatory Leader Honeywell International Inc IBC Vice-Chair Terrence DeFranco President and Chief Financial Officer Iota Communications, Inc.
  • 4. © 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC) 3. Administrative Trevor Nightingale (National Research Council) 3.1 Motion to approve past IBC Minutes (Nov 25): www.caba.org/ibc 4
  • 5. © 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC) “Cybersecurity and Intelligent Buildings” (30 min) 5 4. Keynote Harsha Chandrashekar (Honeywell International Inc)
  • 7. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 7 Speaker Larry O’Brien • VP of Research – ARC Advisory Group • Member of Cybersecurity and smart Cities Team • Over 25 years of experience
  • 8. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 8 ARC Research on Cybersecurity and Smart Buildings • Quantitative and qualitative research for end users-owner/operators and suppliers • Cybersecurity for OT/ICS environments • Building Automation • Smart Cities (transportation, lighting, smart city platforms, etc.)
  • 9. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 9 Primary End User Challenges in Cybersecurity for Smart Cities & Buildings Cybersecurity for Smart Cities Processes Technology People
  • 10. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 10 Economic Impact of Cyber Attacks in Cities and Communities: Recent Ransomware Attacks • Florida – Lakeland City, small town of 12,000 residents, $460K ransom • Atlanta – More than $17 million? • Texas – 22 Mostly rural communities: cost undisclosed • Not just a big city problem, smaller and rural communities are particularly vulnerable. • A ransomware attack may put a major dent in a city’s budget, but it can completely paralyze and bankrupt a small town. • Better funding is needed for municipalities and better coordination at a state level for resources, including training.
  • 11. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 11 IT/OT Convergence: OT Level Cybersecurity Threats • In simple terms, OT is the domain of systems and sensors that control the things that act in the physical world. • In addition to the built environment, smart city OT domains include power distribution networks, microgrids, gas pipelines, water distribution networks, security cameras, and so on. • OT systems have the potential to provide extreme efficiency in the applications they control or to wreak extreme havoc. • The new generation of cyber-attacks, many of which appear to be sponsored by nation states with almost unlimited resources, are sophisticated multistage attacks designed to gain control over OT systems and cause disruption, chaos, and potential loss of human life
  • 12. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 12 The Evolving Threat Landscape Ransomware gets headlines and can cripple communities Threats go beyond simple ransomware New age of threats focuses specifically on operations and aims to impact equipment in the physical world Recent ARC Survey Showing End User Concern with Different Kinds of Attacks
  • 13. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 13 What Future Cyber-attacks on Smart Cities will Look Like Modular Structure of CRASHOVERRIDE Malware Reveals New Level of Sophistication in Targeted Infrastructure Malware (Source: Dragos)
  • 14. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 14 • Ransomware is like throwing rocks. • Coordinated OT level attacks are like an organized military operation. • Target hack through HVAC contractor followed similar methodology. Lockheed Martin Cyber Kill Chain Framework Documents the Stages of a Cyber Attack (Source: Lockheed Martin)
  • 15. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 15 TRITON Changed the Game • Hydrocarbon Processing Plant in the Middle East • Multi-phased, and prolonged cyber- attack that resulted in a safe plant shutdown in August of 2017 • Breach was enabled through multiple security lapses • Deny the ability of the plant or process to shut down safely Within Stage 2 of the ICS Cyber Kill Chain, TRISIS/TRICON Can Be Viewed as a Supporting Attack (Source: SANS Institute)
  • 16. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 16 Impact of IoT and Edge Technologies on Cybersecurity • IoT is really a catch all term that encompasses a suite of new technologies being adopted by today’s smart cities and buildings. • Cloud computing (which includes multiple definitions), edge and fog computing, analytics, machine learning, AI, networking technologies (MQTT), wireless infrastructure, 5G – all are part of IoT suite of technologies. • These technologies are being driven into many new products at a rapid rate. • Not everyone understands or considers the cybersecurity implications of these technologies and how they find their way into products and applications. • IoT also means connected. Millions of sensors, controllers, and computing devices. • Many large end users and owner/operators are struggling with how to balance the innovation of IoT and the business value that it brings with the associated (and sometimes significant) risk to secure and dependable operations. • Cybersecurity should be part of your selection criteria for products, systems, and applications.
  • 17. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 17 For IoT, the Edge is Where the Rubber Meets the Road
  • 18. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 18 The Business Value of IoT: Building Automation Use Case • Rapid adoption of IoT-based systems with the promise of significantly reduced operational costs is driving rapid growth in the building and facility automation marketplace. • The major objectives of these systems are to improve occupant comfort, reduce energy consumption and total cost of ownership, operate building systems efficiently, and increase the lifecycle of utilities. • Digitizing these systems presents a huge opportunity to reduce energy and operational costs for building or facility owner-operators. • Commercial buildings consume over 70 percent of the electricity produced in the US. • Many buildings are older and incorporate dated legacy technology and could significantly benefit from retrofitting the building control infrastructure to help reduce total cost of ownership and enhance security and safety.
  • 19. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 19 Zero Trust Cybersecurity Schemes and IoT • Security remains one of the leading inhibitors to widespread adoption of Industrial IoT applications. • Zero trust security, where the hardware doesn’t trust the software and vice versa, is emerging as the baseline for edge implementations. • End-to-end secure encrypted network designs are necessary. • The migration toward using Linux and other standard operating systems coincides with a migration away from secure by configuration, which relies on implementation, to a secure by design emphasis that enables more standardized approaches.
  • 20. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 20 IoT, Connectivity, and Managed Services • IoT has created a new wave of remote monitoring, managed service providers, and millions of new remote connections for things like performance monitoring, predictive maintenance, etc. • Exploiting security flaws at trusted third parties is often used as a tactic to gain entry into end user owner/operator sites. • Target hack is an example of this. Remote monitoring of HVAC systems. • TRITON also used this technique, harvesting credentials for control system access from a third party.
  • 21. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 21 Organizations Need Integrated Cybersecurity Strategies Siloed Programs Can’t Address All of the Issues OT Systems Devices IT IIoT Environment & Cloud ICS IoT and IIoT IT Today Tomorrow OT Systems Devices IT IIoT Environment & Cloud ICS-IT-IIoT
  • 22. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 22 ARC Industrial Cybersecurity Maturity Model
  • 23. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 23 Key Standards and Industry Groups at the OT Level • ISA 62443 • NIST Framework • ISO 27000 • NERC CIP • DHS
  • 24. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 24 ISA/IEC 62443 Cybersecurity Standard http://isa99.isa.org/ISA99%20Wiki/Home.aspx
  • 25. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 25 ISA Secure Certification • The ISA Security Compliance Institute (ISCI), a neutral, not-for-profit consortium manages the ISASecure certification process. • ISASecure certifications assess conformance to a subset of the IEC 62443 series. • ISA-Secure certifies commercial-off-the-shelf (COTS) products and product supplier development lifecycle practices, for conformance with applicable parts of the IEC 62443 series. • ISASecure has an initiative with CABA for certifying products for building control system (BCS) applications.
  • 26. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 26 ISA SSA Security Assessment Process
  • 27. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 27 NIST Cybersecurity Framework • The US Commerce Department’s National Institute of Standards and Technology (NIST) has received considerable recognition over the past few years for developing the Cybersecurity Framework (CSF), now widely used as the basis for establishing effective security management systems.
  • 28. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 28 CISA/US-CERT
  • 29. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 29 CSET Tool • The Cyber Security Evaluation Tool (CSET®) provides a systematic, disciplined, and repeatable approach for evaluating an organization’s security posture. • CSET is a desktop software tool that guides asset owners and operators through a step-by-step process to evaluate industrial control system (ICS) and information technology (IT) network security practices. • Users can evaluate their own cybersecurity stance using many recognized government and industry standards and recommendations.
  • 30. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 30 CSIA 2016 Assessment Report
  • 31. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 31 ISO 27000
  • 32. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 32 NERC CIP • NERC is committed to protecting the bulk power system against cybersecurity compromises that could lead to misoperation or instability. On November 22, 2013, FERC approved Version 5 of the critical infrastructure protection cybersecurity standards (CIP Version 5), which represent significant progress in mitigating cyber risks to the bulk power system.
  • 33. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 33 UL 2900 Series of Standards UL 2900 Spans a Broad Range of Requirements and Products
  • 34. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 34 Developing Cybersecurity Policy & Expertise in Your Organization • Cybersecurity does not equal buying and installing products. • Having a good cybersecurity strategy does not have to involve huge investments in technology and training. A sound strategy and standard policies can provide significant benefits. • You Need A Good Response Plan: Ransomware provides a good example of the benefit of having sound cybersecurity policy and the need for a good response plan. Many owner-operators and city governments are completely caught off guard when they face a ransomware attack. • Industrial cybersecurity solutions have become increasingly sophisticated and can require a high level of cybersecurity expertise to configure and maintain. This will increase the importance of additional vendor support and training programs for the end user. • Look to SANS as an excellent source of training and certification for ICS and OT level specific cybersecurity certifications, CISSP, GCIA • ISA, DHS also offer training and resources
  • 35. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 35 Most Smart City Owner/Operators Don’t Have Formal, Written Cybersecurity Policies or Standards in Place (Source: ICMA/UMBC 2016 Survey https://ebiquity.umbc.edu/_file_directory_/papers/881.pdf)
  • 36. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 36 How ARC Defines the ICS/OT Cybersecurity Landscape: Building Automation
  • 37. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 37 Scope of OT Level Systems in Smart Cities and Buildings is Broad
  • 38. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 38 OT Level Cybersecurity Suppliers Next-generation firewalls (NGFW), industrial DPI firewalls, and products that provide secure unidirectional communications (unidirectional gateways and data diodes, which ensure secure one- way communication). Products that actively block compromises to cyber assets within control systems. Technologies in this category include anti-malware software, application whitelisting, access control, and industrial deep packet inspection (DPI) firewalls. Range of products for monitoring OT networks and endpoint assets. These products enhance system security through detection of latent compromises and attacks that have evaded network security and endpoint defenses Security information about cyber assets, vulnerability alerts, patches, and firmware/software/hardware updates; launchpad and integration platform for a variety of security maintenance support modules
  • 39. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 39 Cybersecurity Supplier Classification in Building Automation
  • 40. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 40 What to Look for, What to Question • LOTS of suppliers. Many in the startup stages, with relatively small numbers of customers. • Will they be around in five years? • If they get acquired, will they still support you? • Alliances with OT level suppliers. • Do they understand the business? • Product certifications and standards testing. • Secure development processes
  • 41. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 41 Some Thoughts on Cybersecurity and the Selection Process • Many end users don’t have a good handle on the landscape of ICS cybersecurity solutions. • Many end users don’t have the right cybersecurity related criteria embedded into their ICS and OT asset selection process. • “Undocumented” systems and devices currently receive the least amount of attention when it comes to cybersecurity. These obscure systems can include boiler controls, compressor controls, etc. • Different stakeholders in the organization aren’t always involved. Justify Define Select Improve
  • 42. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 42 Elements of Success for Supplier Selection • Have a documentable, traceable, and fact-based selection process that proves how and why you made your decision • Bring key stakeholders together to make a consensus based decision • Have a basic understanding of the market and the leading suppliers • Make sure you have the right selection criteria • Prioritize/weight criteria, remember that everything is not of equal importance to everything else • The selection process doesn’t end with the selection. It transitions into a supplier relationship management process.
  • 43. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 43 Summary and Conclusions • If you don’t already have a cybersecurity program or plan in place at your organization, you should take simple steps to start developing one. This presentation should give you information on the key steps needed to get started and resources. • Attacks are only going to become more sophisticated and will increasingly target actions in the physical world through compromising complex control systems and OT infrastructure. • Technology churn is driving a lot of todays cybersecurity challenges. IoT technologies used in an OT level environment need to be carefully vetted for cybersecurity risks, secure by design principles, etc. • The smart city and smart building segment needs to adopt standards. ISA/IEC 62443 should seriously be considered as the standard of reference. • Cybersecurity must be driven into the overall supplier selection process for all OT level systems and products. • Consider development of standard cybersecurity policy and response plans in your organization.
  • 44. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 44 Resources • https://www.arcweb.com/consulting-services/cybersecurity-workshops • https://www.arcweb.com/blog/cybersecurity-viewpoints • https://www.isa.org/training-and-certifications/isa-certification/isa99iec- 62443/isa99iec-62443-cybersecurity-certificate-programs/ • https://www.nist.gov/topics/cybersecurity • https://www.dhs.gov/cisa/national-cybersecurity-communications- integration-center • https://www.sans.org/netwars/cybercity
  • 45. VISION, EXPERIENCE, ANSWERS FOR INDUSTRY, INFRASTRUCTURE & CITIES © ARC Advisory Group • 45 Thank You Questions? Larry O’Brien https://www.linkedin.com/in/larry-o-brien-a02685/ lobrien@arcweb.com @dcsanalyst @smartcityvwpts •
  • 46. © 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC) 46 4. Keynote - Questions? Harsha Chandrashekar (Honeywell International Inc)
  • 47. © 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC) www.caba.org/resear ch 5. Research Update Trevor Nightingale (National Research Council) 5.1 2019 IBC Landmark Research “Evidence for Building Retrofits that Improve Organizational Productivity (Phase 2)” (15 Funders) 47 Free Download of Phase 1: www.caba.org/productivity
  • 48. © 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC) 5. Research Update Terrence DeFranco (Iota Communications, Inc.) (CABA) 5.2 2020 IBC Landmark Research “Intelligent Building Energy Management Systems” 48 Topics: Implementation, integration, real-time monitoring, zero net energy, battery storage, grid interactions, renewables, etc.
  • 49. © 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC) 6. White Paper Sub-Committee Update Ken Wacks (Ken Wacks Associates) 6.1 Recently Completed: None 49 www.caba.org/WhitePapers
  • 50. © 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC) 6. White Paper Sub-Committee Update Ken Wacks (Ken Wacks Associates) 6.2 In Progress: “Energy Metering and Power Quality Metering in North America” 50 ArcoLogix LLC Asian Institute of Intelligent Buildings Brainwave Research Corp. CMG Convergint Technologies CopperTree Analytics Inc. Current, powered by GE Cyber Power Systems, Inc. Domotz Enercare Connections Inc. EZ Meter Technologies Honeywell International Inc. Ken Wacks Associates Public Works and Government Services Canada Renesas Electronics America Inc. Robert H Lane and Associates Inc. Schneider Electric Sustainable Resources Management Triacta Power Solutions Zinwave www.caba.org/WhitePapers
  • 51. © 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC) 6. White Paper Sub-Committee Update Ken Wacks (Ken Wacks Associates) 6.2 In Progress: “Multi-MHz Wireless Power Transfer and Its Commercial Applications” 51 Airfuel Alliance (Chair) University of Michigan - Shanghai Jiao Tong University Joint Institute Princeton University www.caba.org/WhitePapers
  • 52. © 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC) 6. White Paper Sub-Committee Update Ken Wacks (Ken Wacks Associates) 6.2 In Progress: “The Evolution of Integrating LiFi Technology into Smart Lighting and Control Systems for the Intelligent Building” 52 Wharton County Junior College (Chair) Acuity Brands, Inc. ArcoLogix LLC Control4 National Electrical Manufacturers Association Telecommunications Industry Association (TIA) www.caba.org/WhitePapers
  • 53. © 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC) 6. White Paper Sub-Committee Update Ken Wacks (Ken Wacks Associates) 6.2 In Progress: “The Ethics of AI and the IoT Connected Home and Intelligent Buildings” 53 ArcoLogix LLC Enbridge Gas Inc. George Brown College Hydro One Networks Inc. Ken Wacks Associates Site 1001, Inc. Sustainable Resources Management Inc. Syska Hennessy Group, Inc. Telecommunications Industry Association (TIA) University of Toronto
  • 54. © 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC) 6. White Paper Sub-Committee Update Ken Wacks (Ken Wacks Associates) All proposals and previously completed IBC White Papers can be downloaded at: www.caba.org/whitepapers 54
  • 55. © 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC) 7. New Business Trevor Nightingale (National Research Council) 7.1 Other new IBC business? 55
  • 56. © 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC) 7. New Business Andre Ristaino (ISA) 7.2 CBRE Building Technology Consultancy – Cyber Roundtable 56 Andre Ristaino Managing Director, ISA Director ISA Global Cybersecurity Alliance
  • 57. Global Facilities BMS Technology Certification Program Discussion Document: Proposal to Develop an Assessment and Conformance Program for Deployed Building Automation and Control Systems National Electrical Manufacturer’s Association (NEMA) International Society of Automation (ISA) US Commercial Real Estate Services (CBRE)
  • 58. Agenda (Proposed – Yet to be Finalized) • 0830-0900 Introductions & Purpose • 0900-1000 Program Overview & Intent • 1000-1030 Threat Assessment (DHS /DoD) • 1030-1130 Collaborate on Program • 1200-1300 Decide Next Steps & Timeline
  • 59. Building Management System (BMS) Defined • Physical security systems (cameras, entry logs, cipher locks) • Physical movement systems (elevators, escalators) • HVAC • Electrical (power distribution, UPS, backup power, clean power) • Water/Wastewater • Fire Control (life-safety) • Lighting (management, distribution, POE) • BMS control networking (wireless, LiFi, wired) Proposed Program Excludes Traditional Business & IT Networks and Systems in Initial Phases
  • 60. Developing Program Expectations • Critical feedback sought to shape this initiative • Is there a market need? • Would the real estate market embrace this initiative? • What are the risks? • Would this initiative drive positive changes to policyholders and insurers? What other market impacts can be anticipated? • What Federal, State, Local and Tribal considerations should be included in the standards? • What is mandated? What is desirable? • How to avoid the downside of the LEED program • Recommendations for development • Gaging interest in partnering with your working group • Establishment of an entity to run the program
  • 61. Interoperating Building Systems Multiple Integrators (Vendors) Open Communi- cations Protocols Generic Risk Posed by BMS: • Minimal Staffing • Many paths to exploitation • Unchecked spread of malware Live Pentest Research Finding: If a third-party software is ‘visible’ as part of a BMS integration system, it can be exploited by researchers seeking to penetrate a BMS. Examples: XSS, root access / Directory Re-writes, Firmware over-writes, and privilege escalation enabling researchers to gain full access to corporate IT networks. Source: I Own Your Building (Management System), Applied Risk, November 2019 Specific Risk Posed by BMS: • All researched vendors had 12 or greater exposed systems • Some as high as 1000+
  • 62.
  • 63. This FICO-score-like rating measures an organization’s chance of experiencing a data breach, based on measurements tied to the company’s public-facing assets. Your score ques alerts for cyber or physical threats to supply chains, allowing intelligence to evaluate critical vendors. The lower your score, the higher your risk. KEY RISK INDICATORS WHAT IS YOUR CYBER ‘RISK’ SCORE? 300 500 650 775 850 HIGH RISK LOW RISK 720 UNCLASSIFIED • Health & hygiene of IT systems • Network infrastructure • Software & services
  • 64. Proposed Program Intent • A Standard program for facility owners to confirm the extent of cyber protection designed into BMS • Possible marketing advantage • Adaptive to the end user’s requirements • Raise awareness for all facility occupants • Enhance the value of investments in BMS cyber protections • Rewarded with a competitive advantage over less secure facilities • Positive response from facility insurers • Utilizes widely-accepted industry Standards • Accelerate the improvement of BMS cyber security for occupant safety • Guide a growing industry of third-party cyber protection firms • Start with commercial office buildings, follow on frameworks for healthcare, industrial, hospitality, academic, and residential facilities
  • 65. Scope of Proposed Program • An application specifically for BMS to enhance cybersecurity for operational technology and physical control systems – does not include IT currently • Addresses the entire value chain of building automation and control systems • Reviews and integrates multiple, existing international standards with industry best practices-promoting the use of a tiered security posture for the BMS selected by the end user based on the risk to a facility or operation • Confirmed via regular 3rd party control system enterprise and process evaluations Program Addresses People, Processes & Technology
  • 66. 1) Product Supplier • Discovers and mitigates risk • Adheres to Federal regulations • Evolves systems and/or components with risk landscape 2) System Integrator Service Provider • Discovers and escalates risk for removal • Adheres to Federal regulations and other compliance schema • Provides more-secure automation 3) Asset Owner (Facility Owner) • Deploys securely – confident! • Cyber security management system awareness of risk landscape • Operation and Maintenance • Service provider partnership in CS management system BMS Cybersecurity Lifecycles 1) Product Supplier • Secure by design • Security development lifecycle • Provides systems and/or components 2) System Integrator Service Provider • Secure in development • Risk-based system and component integration • Provides an automation solution 3) Asset Owner (Facility Owner) • Secure in deployment • Cyber security management system • Operation and maintenance • Maintenance may be done by a service provider 1. Product Supplier 2. System Integrator 3. Asset Owner Value-Added to Lifecycles
  • 67. Program Targets Incentivize the protection of BMS systems to reduce risk to/from: • Life, safety, health – protection of employees (physical and virtual) • Employee actions • Adheres to Federal, State, and Local laws and ordinances on landlord/tenant rights and individual rights to privacy, as- applicable. • Protection of data (IP, financial) • Outsider attacks (e.g. ransomware) • Business interruption / degradation • Compliance with Federal and Defense regulations on Federal real estate assets, as-applicable. • Protection of brand value Promote Concept & Obtain Commitment Decisions NLT March 2020
  • 68. Assess and Issue a Cyber Performance Rating for Facility’s BMS • Based on consolidation of standards already in public domain • Dynamic – the threat is always evolving • Dynamic- the program for the response is always evolving • Incentivizes sustainment of good cyber practices over life cycle • Dynamic- rating requires periodic recertification to sustain these good cyber practices • Assessment addresses protections for technology, processes, and people • Rating public or private to tenants – Owner discretion Good Better Best Bronze Silver Platinum Gold Most Secure Least Secure
  • 69. Performance Model Comparison • BRONZE • SILVER • GOLD • PLATINUM • Basic Cyber Hygiene • Intermediate Cyber Hygiene • Good Cyber Hygiene • Proactive Cyber Hygiene • Advanced / Progressive / State of the Art • Maturity Level 1 • Maturity Level 2 • Maturity Level 3 • Maturity Level 4 • Maturity Indicator Level 0 • Maturity Indicator Level 1 • Maturity Indicator Level 2 • Maturity Indicator Level 3 DoE Cybersecurity Capability Maturity Model (C2M2) DoD Cybersecurity Maturity Model Certification (CMMC) ISA/IEC 62443 Proposed For BMS Certification
  • 70. Bronze Level Proposed Cybersecurity Requirements Definition Operations Maturity Level ISA/IEC 62443-2-1 – Maturity Level 1 Maintenance Maturity Level ISA/IEC 62443-2-4 – Maturity Level 1 Automation Security Zone ISA/IEC 62443-3-3 – Security Level 1 Critical Security Zone ISA/IEC 62443-3-3 – Security Level 2 Security Level 1 Requirements - High Level Summary Identification and Authentication Control User identification and authentication Use Control User authorization enforcement System Integrity Communications integrity, Malware protection Data Confidentiality Information confidentiality at rest Restricted Data Flow Network segmentation Timely Response to Events Audit log accessibility Resource Availability Denial of Service protection, Backup CMMC Int Capabilities* # of Practices *NIST, ISO, RMM KIM-SG4, CIS, etc Practices defined as of CMMC v.6 11/19. Access Control Asset Management Audit & Accountability Awareness & Training Configuration Management ID & Authorization Incident Response Maintenance Media Protection Personnel Security Physical Protection Recovery Risk Management Security Assessment Situational Awareness System & Comm. Protection System & Info. Integrity 4 - - - - 2 - - 1 - 4 - - - - 2 4
  • 71. Silver Level Proposed Cybersecurity Requirements Definition Operations Maturity Level ISA/IEC 62443-2-1 – Maturity Level 2 Maintenance Maturity Level ISA/IEC 62443-2-4 – Maturity Level 2 Automation Security Zone ISA/IEC 62443-3-3 – Security Level 2 Critical Security Zone ISA/IEC 62443-3-3 – Security Level 3 Security Level 2 Requirements - High Level Summary Identification and Authentication Control Unique user identification and authentication Use Control Enforcement + Role Based Access Control System Integrity Communications integrity, Entry/Exit malware protection Data Confidentiality Information confidentiality at rest or in transit Restricted Data Flow Physical network segmentation Timely Response to Events Audit log accessibility, Continuous monitoring Resource Availability DoS protection, Backup verification, Inventory CMMC Good Capabilities* Add’l Practices Access Control Asset Management Audit & Accountability Awareness & Training Configuration Management ID & Authorization Incident Response Maintenance Media Protection Personnel Security Physical Protection Recovery Risk Management Security Assessment Situational Awareness System & Comm. Protection System & Info. Integrity 12 -- 4 2 6 5 5 4 3 2 1 2 3 3 1 3 2 *NIST, ISO, RMM KIM-SG4, CIS, etc Practices defined as of CMMC v.6 11/19.
  • 72. Gold Level Proposed Cybersecurity Requirements Definition Operations Maturity Level ISA/IEC 62443-2-1 – Maturity Level 3 Maintenance Maturity Level ISA/IEC 62443-2-4 – Maturity Level 3 Automation Security Zone ISA/IEC 62443-3-3 – Security Level 3 Critical Security Zone ISA/IEC 62443-3-3 – Security Level 4 Security Level 3 Requirements - High Level Summary Identification and Authentication Control Multifactor user identification and authentication Use Control Enforcement + RBAC + Supervisor Override System Integrity Cryptographic integrity, Centralized malware protection Data Confidentiality Information confidentiality at rest or in transit Restricted Data Flow Independence from non-control networks Timely Response to Events Audit log accessibility, Continuous monitoring Resource Availability DoS protection, Backup automation, Inventory CMMC Pro Control Capabilities* Add’lPractice Access Control Asset Management Audit & Accountability Awareness & Training Configuration Management ID & Authorization Incident Response Maintenance Media Protection Personnel Security Physical Protection Recovery Risk Management Security Assessment Situational Awareness System & Comm. Protection System & Info. Integrity 5 2 7 1 3 4 2 2 4 - 1 1 3 2 1 14 3 *NIST, ISO, RMM KIM-SG4, CIS, etc Practices defined as of CMMC v.6 11/19.
  • 73. Platinum Level Proposed Cybersecurity Requirements Definition Operations Maturity Level ISA/IEC 62443-2-1 – Maturity Level 4 Maintenance Maturity Level ISA/IEC 62443-2-4 – Maturity Level 4 Automation Security Zone ISA/IEC 62443-3-3 – Security Level 4 Critical Security Zone ISA/IEC 62443-3-3 – Security Level 4 Security Level 4 Requirements - High Level Summary Identification and Authentication Control Multifactor user identification and authentication Use Control Enforcement + RBAC + Override + Dual approval System Integrity Cryptographic integrity, Centralized malware protection Data Confidentiality Information confidentiality across zones Restricted Data Flow Logical and physical isolation of critical networks Timely Response to Events Audit log accessibility, Continuous monitoring Resource Availability DoS protection, Backup automation, Inventory CMMC Adv Control Family* Add’lPractices Access Control Asset Management Audit & Accountability Awareness & Training Configuration Management ID & Authorization Incident Response Maintenance Media Protection Personnel Security Physical Protection Recovery Risk Management Security Assessment Situational Awareness System & Comm. Protection System & Info. Integrity Not Yet Defined “ “ “ “ “ “ “ “ “ “ “ “ “ “ “ “ *NIST, ISO, RMM KIM-SG4, CIS, etc Practices defined as of CMMC v.6 11/19.
  • 74. Our Assessment of Value • Meet global and U.S. security requirements using a single, unified certification • Simplifies procurement specification process (establish corporate standards) for technology and cyber protection services • All stakeholders (including insurers) can easily understand standards-based cybersecurity capabilities • Capabilities independently validated by external entity • Confidence that protections will be upgraded over time based on evolving risk • Easily adopted into public policy
  • 75. Next Steps Establishment of an entity to serve as the keeper of the program and certification agency Invite stakeholders to develop certification program for commercial properties Continued development of Program for other facility types Strategic Communication on the growing threat and proposed response Potential adoption of program for “smart” products (cars, media, homes, appliances) Next Steps
  • 77. © 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC) 8. Announcements Ron Zimmer (CABA) CoRETECH 2109, Nov 13-15, San Jose, CA Greenbuild International Conference and Expo 2019, Nov 19-22, Atlanta, GA CABA AGM, Dec 5, 11am ET via Webinar AHR Expo, Feb 3-5, Orlando, FL DISTRIBUTECH International 2020, Feb 9-11, San Diego, CA 77 8.1 Past Event Overview:
  • 78. © 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC) 8. Announcements Ron Zimmer (CABA) 78 Light+building, Mar 8-13, Frankfurt, Germany Internet of Things World, Apr 6-9, San Jose, CA Niagara Summit: Connecting the World, Apr 19-21, San Diego, CA BuildingsNY, Apr 28-29, New York, NY 8.2 Upcoming events:
  • 79. © 2020, Continental Automated Buildings Association (CABA) CABA Intelligent Buildings Council (IBC) Continental Automated Buildings Association (CABA) caba@caba.org www.CABA.org www.caba.org/ibc Connect to what’s next™ 9. Adjournment Trevor Nightingale (National Research Council) 79 Next IBC Meeting, April 2020

Editor's Notes

  1. Now let me summarize all of this by referring to what we have been telling our industrial clients about the changes they need to consider in their cybersecurity programs. Today, most of these companies are managing their cyber assets with individual, siloed cybersecurity programs ICS cybersecurity is responsible for the plant and SCADA control systems. IT cybersecurity is responsible for enterprise systems, cloud interfaces, and IoT devices like cameras, etc. IIoT cybersecurity is just emerging and is generally defining their responsibilities to be secure devices. Each of these programs makes their own decisions about strategies and technologies, based upon their limited responsibilities. But, this will never work for the kinds of situations I just discussed. They require end-to-end security spanning of all of these elements. Industrial companies are already struggling with ICS attacks through IT systems like email, and the broad connectivity of the IIoT will add to the challenges they face in identifying, isolating and remediating cyber compromises. Unless they have an integrated strategy, they will never be able to support the new, innovative programs using IIoT.