SlideShare a Scribd company logo
Critical challenges
• Digital risks to critical
infrastructure?
• How to enhance digital
resilience?
• Who is responsible for
what?
• How to verify proper
implementation of
regulations?
Example: energy
Complexity is increasing:
+ More interconnection
+ More information exchange
+ Higher reliability, increased
control
+ Better interoperability
- Increased cyber
vulnerabilities
Roles and challenges
Regulators:
• Raise cyber security
awareness, assign
accountability, provide clear
requirements
Utilities:
• Accept responsibility, update
infrastructure, commit
necessary investment
Protecting cyber physical systems
Virtual world
Data
Identify, correct, protect
from constant attacks
Large surface for attacks
Physical world
Ensure physical function -
reliability, time and time
again - either/or
Narrow surface for attacks
ICT OT
Global risks, global approach
Prefer common platforms that
encourage cooperation and
avoid island solutions
IEC Standards:
• Global reach – 171 countries
• Members = countries
not companies
• Built-in high consensus value
• Neutral, independent
Provide input to standardization
Three axes of cyber security
Credit: Schneider Electric
ISO/IEC 27001/2 key clauses
= Unique Domains
Build to International Standards
Credit: Schneider Electric
IEC: 235 OT and ICT security related publications
IEC CA Systems also active in cyber security – helps regulators
verify implementation
Real-time visibility of threats
Credit: Schneider Electric
• IECEE solutions for the
cyber physical world
• IEC 62443 series for
Industrial Automation and
Control Systems (IACS)
builds on established
Standards - e.g., ISO/IEC
27000 series
• “Defense-in-depth”
architecture is the goal
IEC Security Infrastructure
Solution (SIS) – Cyber security
Most successful strategies :
• Site security evaluation
• Prioritization of “crown jewels”
• Risk assessment, layer of
protection analysis, security
assurance levels
• Exercise alert/detection
systems and personnel
• Disaster recovery
• Continuously re-evaluate and
strengthen
Defense-in-depth
IEC and cyber security (June 2018)

More Related Content

What's hot

Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Honeywell
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Jim Gilsinn
 
Contributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity StandardsContributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity Standards
Yokogawa1
 
Introduction to Industrial Cybersecurity for Water and Waste Water Operators
Introduction to Industrial Cybersecurity for Water and Waste Water OperatorsIntroduction to Industrial Cybersecurity for Water and Waste Water Operators
Introduction to Industrial Cybersecurity for Water and Waste Water Operators
Sean R. Bouchard, P.Eng
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)
Joan Figueras Tugas
 
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorLessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy Sector
EnergySec
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
MarcoAfzali
 
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Jiunn-Jer Sun
 
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...
Digital Bond
 
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Jim Gilsinn
 
Should I Patch My ICS?
Should I Patch My ICS?Should I Patch My ICS?
Should I Patch My ICS?
Digital Bond
 
S4xJapan Closing Keynote
S4xJapan Closing KeynoteS4xJapan Closing Keynote
S4xJapan Closing Keynote
Digital Bond
 
Cybersecurity for modern industrial systems
Cybersecurity for modern industrial  systemsCybersecurity for modern industrial  systems
Cybersecurity for modern industrial systems
Itex Solutions
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
Digital Bond
 
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
EnergySec
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
promediakw
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Honeywell
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS security
Chris Sistrunk
 
DHS ICS Security Presentation
DHS ICS Security PresentationDHS ICS Security Presentation
DHS ICS Security Presentation
guest85a34f
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Community Protection Forum
 

What's hot (20)

Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
 
Contributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity StandardsContributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity Standards
 
Introduction to Industrial Cybersecurity for Water and Waste Water Operators
Introduction to Industrial Cybersecurity for Water and Waste Water OperatorsIntroduction to Industrial Cybersecurity for Water and Waste Water Operators
Introduction to Industrial Cybersecurity for Water and Waste Water Operators
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)
 
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorLessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy Sector
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
 
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
 
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...
 
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
 
Should I Patch My ICS?
Should I Patch My ICS?Should I Patch My ICS?
Should I Patch My ICS?
 
S4xJapan Closing Keynote
S4xJapan Closing KeynoteS4xJapan Closing Keynote
S4xJapan Closing Keynote
 
Cybersecurity for modern industrial systems
Cybersecurity for modern industrial  systemsCybersecurity for modern industrial  systems
Cybersecurity for modern industrial systems
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS security
 
DHS ICS Security Presentation
DHS ICS Security PresentationDHS ICS Security Presentation
DHS ICS Security Presentation
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 

Similar to IEC and cyber security (June 2018)

CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
CSO_Presentations
 
weyai cybersecurity.pptx
weyai cybersecurity.pptxweyai cybersecurity.pptx
weyai cybersecurity.pptx
Weyai1
 
Security metrics 2
Security metrics 2Security metrics 2
Security metrics 2
Manish Kumar
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar Presentation
Certrec
 
ePlus Managed Security Services
ePlus Managed Security ServicesePlus Managed Security Services
ePlus Managed Security Services
ePlus
 
Tech 2 Tech: increasing security posture and threat intelligence sharing
Tech 2 Tech: increasing security posture and threat intelligence sharingTech 2 Tech: increasing security posture and threat intelligence sharing
Tech 2 Tech: increasing security posture and threat intelligence sharing
Jisc
 
Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security Services
All Covered
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your Data
Great Wide Open
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
Falgun Rathod
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?
IT Governance Ltd
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from Symantec
Arrow ECS UK
 
framework-version-1.1-overview-20180427-for-web-002.pptx
framework-version-1.1-overview-20180427-for-web-002.pptxframework-version-1.1-overview-20180427-for-web-002.pptx
framework-version-1.1-overview-20180427-for-web-002.pptx
AshishRanjan546644
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Standards Customer Council
 
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Tripwire
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
Cloud Standards Customer Council
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
marukanda
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
RAJESH S
 
MIS_Session05.pptx
MIS_Session05.pptxMIS_Session05.pptx
MIS_Session05.pptx
AfricaRealInformatic
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
John Donahue
 
3 Reasons Why the Cloud is More Secure than Your Server
3 Reasons Why the Cloud is More Secure than Your Server3 Reasons Why the Cloud is More Secure than Your Server
3 Reasons Why the Cloud is More Secure than Your Server
Clio - Cloud-Based Legal Technology
 

Similar to IEC and cyber security (June 2018) (20)

CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
weyai cybersecurity.pptx
weyai cybersecurity.pptxweyai cybersecurity.pptx
weyai cybersecurity.pptx
 
Security metrics 2
Security metrics 2Security metrics 2
Security metrics 2
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar Presentation
 
ePlus Managed Security Services
ePlus Managed Security ServicesePlus Managed Security Services
ePlus Managed Security Services
 
Tech 2 Tech: increasing security posture and threat intelligence sharing
Tech 2 Tech: increasing security posture and threat intelligence sharingTech 2 Tech: increasing security posture and threat intelligence sharing
Tech 2 Tech: increasing security posture and threat intelligence sharing
 
Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security Services
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your Data
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from Symantec
 
framework-version-1.1-overview-20180427-for-web-002.pptx
framework-version-1.1-overview-20180427-for-web-002.pptxframework-version-1.1-overview-20180427-for-web-002.pptx
framework-version-1.1-overview-20180427-for-web-002.pptx
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
 
MIS_Session05.pptx
MIS_Session05.pptxMIS_Session05.pptx
MIS_Session05.pptx
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
3 Reasons Why the Cloud is More Secure than Your Server
3 Reasons Why the Cloud is More Secure than Your Server3 Reasons Why the Cloud is More Secure than Your Server
3 Reasons Why the Cloud is More Secure than Your Server
 

More from International Electrotechnical Commission (IEC)

Enabling global trade and helping to address the energy challenge - the IEC h...
Enabling global trade and helping to address the energy challenge - the IEC h...Enabling global trade and helping to address the energy challenge - the IEC h...
Enabling global trade and helping to address the energy challenge - the IEC h...
International Electrotechnical Commission (IEC)
 
Product piracy in electronic components: IEC role in counterfeit avoidance
Product piracy in electronic components: IEC role in counterfeit avoidanceProduct piracy in electronic components: IEC role in counterfeit avoidance
Product piracy in electronic components: IEC role in counterfeit avoidance
International Electrotechnical Commission (IEC)
 
Enabling Smart Grids globally
Enabling Smart Grids globallyEnabling Smart Grids globally
The new economy and standards
The new economy and standardsThe new economy and standards
Introduction to the IEC and its Smart Grid initiative
Introduction to the IEC and its Smart Grid initiativeIntroduction to the IEC and its Smart Grid initiative
Introduction to the IEC and its Smart Grid initiative
International Electrotechnical Commission (IEC)
 
Global Markets, Global Standards
Global Markets, Global StandardsGlobal Markets, Global Standards
Global Markets, Global Standards
International Electrotechnical Commission (IEC)
 
International standards facilitate international trade
International standards facilitate international tradeInternational standards facilitate international trade
International standards facilitate international trade
International Electrotechnical Commission (IEC)
 
Energy Efficiency: A 'new' energy source and its metrics
Energy Efficiency: A 'new' energy source and its metricsEnergy Efficiency: A 'new' energy source and its metrics
Energy Efficiency: A 'new' energy source and its metrics
International Electrotechnical Commission (IEC)
 

More from International Electrotechnical Commission (IEC) (8)

Enabling global trade and helping to address the energy challenge - the IEC h...
Enabling global trade and helping to address the energy challenge - the IEC h...Enabling global trade and helping to address the energy challenge - the IEC h...
Enabling global trade and helping to address the energy challenge - the IEC h...
 
Product piracy in electronic components: IEC role in counterfeit avoidance
Product piracy in electronic components: IEC role in counterfeit avoidanceProduct piracy in electronic components: IEC role in counterfeit avoidance
Product piracy in electronic components: IEC role in counterfeit avoidance
 
Enabling Smart Grids globally
Enabling Smart Grids globallyEnabling Smart Grids globally
Enabling Smart Grids globally
 
The new economy and standards
The new economy and standardsThe new economy and standards
The new economy and standards
 
Introduction to the IEC and its Smart Grid initiative
Introduction to the IEC and its Smart Grid initiativeIntroduction to the IEC and its Smart Grid initiative
Introduction to the IEC and its Smart Grid initiative
 
Global Markets, Global Standards
Global Markets, Global StandardsGlobal Markets, Global Standards
Global Markets, Global Standards
 
International standards facilitate international trade
International standards facilitate international tradeInternational standards facilitate international trade
International standards facilitate international trade
 
Energy Efficiency: A 'new' energy source and its metrics
Energy Efficiency: A 'new' energy source and its metricsEnergy Efficiency: A 'new' energy source and its metrics
Energy Efficiency: A 'new' energy source and its metrics
 

Recently uploaded

Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 

Recently uploaded (20)

Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 

IEC and cyber security (June 2018)

  • 1.
  • 2. Critical challenges • Digital risks to critical infrastructure? • How to enhance digital resilience? • Who is responsible for what? • How to verify proper implementation of regulations?
  • 3. Example: energy Complexity is increasing: + More interconnection + More information exchange + Higher reliability, increased control + Better interoperability - Increased cyber vulnerabilities
  • 4. Roles and challenges Regulators: • Raise cyber security awareness, assign accountability, provide clear requirements Utilities: • Accept responsibility, update infrastructure, commit necessary investment
  • 5. Protecting cyber physical systems Virtual world Data Identify, correct, protect from constant attacks Large surface for attacks Physical world Ensure physical function - reliability, time and time again - either/or Narrow surface for attacks ICT OT
  • 6. Global risks, global approach Prefer common platforms that encourage cooperation and avoid island solutions IEC Standards: • Global reach – 171 countries • Members = countries not companies • Built-in high consensus value • Neutral, independent Provide input to standardization
  • 7. Three axes of cyber security Credit: Schneider Electric
  • 8. ISO/IEC 27001/2 key clauses = Unique Domains
  • 9. Build to International Standards Credit: Schneider Electric IEC: 235 OT and ICT security related publications IEC CA Systems also active in cyber security – helps regulators verify implementation
  • 10. Real-time visibility of threats Credit: Schneider Electric
  • 11.
  • 12. • IECEE solutions for the cyber physical world • IEC 62443 series for Industrial Automation and Control Systems (IACS) builds on established Standards - e.g., ISO/IEC 27000 series • “Defense-in-depth” architecture is the goal IEC Security Infrastructure Solution (SIS) – Cyber security
  • 13. Most successful strategies : • Site security evaluation • Prioritization of “crown jewels” • Risk assessment, layer of protection analysis, security assurance levels • Exercise alert/detection systems and personnel • Disaster recovery • Continuously re-evaluate and strengthen Defense-in-depth

Editor's Notes

  1. Among the most critical challenges is the security of connected cyber physical systems. Very often little or no attention is paid at the design stage to ensure that connected objects are secure against malicious attacks.   The exploitation of cyber vulnerabilities of infrastructure systems is becoming an increasing threat to business and society’s overall security. Let me explain the unique way in which the IEC helps improve cyber security with the example of energy.  
  2. Over the past decade, energy systems have become more interconnected and provide more information, resulting in higher reliability, increased levels of control and higher productivity.   Interoperability between different vendor products and systems has been increasingly achieved by deploying products and solutions based on open standards such as the IEC 61850 series which covers communication networks and systems for power utility automation and IEC 61970 the Common Information Model (CIM) for information exchange for energy management systems, SCADA, planning and optimization. However, this change in technologies has also exposed utilities to increased cyber security threats.
  3. Utilities are under huge pressure to update infrastructure but also to reduce cost and increase profitability.   The role of regulators should be to create awareness at the management level by making top management accountable for cyber security outcomes and by providing clear requirements.
  4. Big data opens many new market opportunities but it also generates new risks. To protect cyber physical systems effectively it is necessary to have an ICT and an OT approach. While IT has to safeguard every layer of the system, continuously correcting any possible weakness, OT is about keeping systems functioning as intended, on or off. Today, cyber security is generally led by an IT approach. Information and communication technology has lots of moving parts with many variants. Gateways are everywhere and offer a large surface for potential attacks.   IT is responsible for safeguarding every layer, constantly identifying and correcting every possible weakness. The primary focus is about data and its ability to flow securely in a virtual world.   However, given the operational constraints in energy generation and distribution, both an ICT and an OT approach to cyber security is needed. This is also true in many other critical infrastructure systems.   Operational technology systems are engineered for specific actions in the physical world. The primary security focus in OT is about ensuring control over physical outcomes. OT cyber security is a key strength of the IEC.    
  5. It is important that cyber security standards go beyond the country level and are built by specialists with the input of regulators and industry. Regulators need to offer common platforms that encourage broad cooperation, interoperability and avoid island solutions.   IEC standards can be a useful tool to design and enforce regulation, because of the high consensus value that is embedded in them. IEC members are countries, not individual companies. IEC governance ensures a neutral and independent platform.   However, if regulators want to benefit from standardization they need to get involved at least in the inception of new topics to be standardized and the management of portfolios of standards. Cyber-attacks often spread globally. For this reason cyber security standards need to be built by specialists with the input of regulators and industry from around the world.   IEC Standards together with conformity assessment can be useful tools to design and enforce cyber security, because of the high consensus value that is embedded in them.
  6. A concerted effort in international standardization and regulation offers many advantages. However, standards alone will not bring the appropriate level of security or result in an “achieved cyber-secure state”. Mitigating risk and anticipating attack vulnerabilities on utility grids and systems are not just about installing secure technology, but equally about understanding and managing risk.   Adequate protection from cyber threats requires a cyber security strategy at the organization, process and technical levels. Those must include a comprehensive set of measures, processes and technical means as well as proper preparation of people.   A strong cyber defence also needs an ongoing effort and recurring investment in risk assessment, cyber security processes, design and implementation as well as people and asset management.   Cyber security has to be worked out in layers.
  7. Ideally risk assessment and security policy and processes should be led by the ISO/IEC 27000 series of International Standards on IT Security Techniques which provides best practice recommendations in this area.
  8. To ensure high quality and dependable cyber security functionality in heterogeneous installations, preference should be given to technology that is based on International Standards.   The IEC has issued 235 OT and IT security related publications. Some 160 have been developed in cooperation with ISO, including the IEC/ISO 27000 family of Standards. The IEC CA Systems are also active in this area and can help policy makers verify implementation of cyber security regulations.
  9. For example, state of the art cyber security products based on International Standards provide utilities with real-time visibility of security-relevant user activity within their systems and help secure power system-specific communication protocols. IEC 62351 helps ensure that users only receive the permissions they need to perform their duties according to the principle of fewest privileges. The Standard includes a list of pre-defined roles with pre-defined rights. It helps protect access, informs user authentication and establishes security logs contributing to secure communications.    
  10. Nuclear power plants are still another ball game in terms of security. The primary systems that control the reactor and the secondary systems that control the power generation equipment have often been built years ago. They are isolated from each other and most are based on analogue equipment that is not connected to a network and therefore overall less susceptible to cyber-attacks.   However, more recently these systems are being retrofitted with digital equipment and as a result cyber security considerations are moving to the forefront. Since 1970, the IEC works closely with the International Atomic Energy Agency (IAEA). In 2014, this collaboration resulted in IEC 62645, which directly addresses requirements for cyber security in nuclear power plants. It takes into account the principles and basic safety aspects as well as terminology and definitions applied by the IAEA.   While IEC 62645 applies some of the high-level principles and concepts of ISO/IEC 27000 it tailors them to fit the nuclear context. In particular, it defines adequate measures for the prevention, detection and reaction to malicious cyber-attacks on computer based systems in nuclear power plants. The Standard is intended to be used by nuclear power plant designers, operators, systems evaluators, vendors, subcontractors and licensors.
  11. The IEC is currently also exploring market needs in terms of global certification for products, systems, services and personnel in the area of cyber security. In this context, the IEC, through IECEE is already offering verification solutions to protect the cyber physical world.   The IECEE Conformity Assessment Scheme, commonly called the CB Scheme, now includes a programme, which provides certification to select Standards within the IEC 62443 series, including ISO/IEC 27000.   The aim is to put in place a business-continuity-security-system that helps protect as many assets as possible.   However, since it is impossible to protect everything equally, it is necessary to prioritize the “crown jewels”, to erect the defense-in-depth architecture that provides the best solution to ensure business continuity. IEC 62443 is an important tool in the deployment of this strategy.
  12. An efficient defense-in-depth strategy that is future proof needs to address the following: Site security practices and policies Prioritization of assets that require first line defense Risk assessment of current level of protection Development of protection strategy, including reason why and who is responsible Regular testing and verification of readiness of security alert and detection systems, including all relevant responding personnel Establishment and testing of disaster recovery measures, including backup retrieval and system re-initialization Continuous evaluation and improvements of protection layers
  13. Last but not least, IEC work is not limited to energy. We also cover a wide array of other areas, including medical, transportation, for example railways, maritime, automotive, manufacturing, finance, home entertainment and smart devices.