The document discusses a 2015 survey that found collaboration between IT and OT teams is lacking in many manufacturers. Less than half of respondents said the teams collaborated on upgrading systems, and only 37% reported collaborating on technical issues. Nearly 10% reported no collaboration. The document also discusses challenges with integrating IT and OT, including different approaches, skill sets, and priorities around availability, security, and real-time response. It presents a framework for levels of IT-OT integration, from research to transformation, and questions for discussion around challenges, skills gaps, security approaches, and stakeholder buy-in.
OpsRamp and Mystic River are joining forces to bring you this interactive webinar. Can we create gateways between IT and OT? IT/OT convergence has been defined as the integration of information technology (IT) systems used for data-centric computing with operational technology (OT) systems used to monitor events, processes and devices and make adjustments in enterprise and industrial operations. But what this will look like and what is the new role of IT operations management? What is changing in IT and OT to align these worlds? This Tech Talk features our partner Mystic River Consulting, a firm with proven, repeatable service delivery methodologies and a proprietary platform that drives transformational IT project results, at a game changing speed. We’ll discuss the convergence of IT and OT and dive into a demonstration to show what’s possible with OpsRamp.
Watch the recording: https://www.brighttalk.com/webcast/17791/416457
Learn more at https://www.opsramp.com
Also, follow us on social media channels to learn about product highlights, news, announcements, events, conferences and more:
Twitter - https://www.twitter.com/OpsRamp
LinkedIn - https://www.linkedin.com/company/opsramp
Facebook - https://www.facebook.com/OpsRampHQ/
Enterprise Security Architecture was initially targeted to address two problems
1- System complexity
2- Inadequate business alignment
Resulting into More Cost, Less Value
Splunk Enterprise Security (ES) ist eine SIEM-Lösung, die Einblicke in von Sicherheitstechnologien erzeugte Maschinendaten wie Angaben über Netzwerke, Endpunkte, Zugriffe, Schadsoftware, Schwachstellen sowie Identitätsdaten liefert. Sicherheitsteams können damit interne und externe Angriffe schnell erkennen und abwehren und somit das Threat Management vereinfachen, Risiken minimieren und Ihr Unternehmen schützen. Splunk Enterprise Security strafft sämtliche Aspekte von Sicherheitsprozessen und eignet sich für Unternehmen jeder Größe und Expertise.
Operational technology (OT) and information technology (IT) security protect devices, networks, systems, and users. Cybersecurity has long been critical in IT and helps organizations keep sensitive data safe, ensure users connect to the internet securely, and detect and prevent potential cyberattacks.
7 Steps to Build a SOC with Limited ResourcesLogRhythm
Most organizations don't have the resources to staff a 24x7 security operations center (SOC). This results in events that aren't monitored around the clock, major delays in detecting and responding to incidents, and the inability for the team to proactively hunt for threats. It's a dangerous situation.
But there is a solution. By using the Threat Lifecycle Management framework to combine people, process, and technology to automate manual tasks, your team can rapidly detect and respond to threats—without adding resources. Read on to learn 7 steps to building your SOC, even when your resources are limited.
OpsRamp and Mystic River are joining forces to bring you this interactive webinar. Can we create gateways between IT and OT? IT/OT convergence has been defined as the integration of information technology (IT) systems used for data-centric computing with operational technology (OT) systems used to monitor events, processes and devices and make adjustments in enterprise and industrial operations. But what this will look like and what is the new role of IT operations management? What is changing in IT and OT to align these worlds? This Tech Talk features our partner Mystic River Consulting, a firm with proven, repeatable service delivery methodologies and a proprietary platform that drives transformational IT project results, at a game changing speed. We’ll discuss the convergence of IT and OT and dive into a demonstration to show what’s possible with OpsRamp.
Watch the recording: https://www.brighttalk.com/webcast/17791/416457
Learn more at https://www.opsramp.com
Also, follow us on social media channels to learn about product highlights, news, announcements, events, conferences and more:
Twitter - https://www.twitter.com/OpsRamp
LinkedIn - https://www.linkedin.com/company/opsramp
Facebook - https://www.facebook.com/OpsRampHQ/
Enterprise Security Architecture was initially targeted to address two problems
1- System complexity
2- Inadequate business alignment
Resulting into More Cost, Less Value
Splunk Enterprise Security (ES) ist eine SIEM-Lösung, die Einblicke in von Sicherheitstechnologien erzeugte Maschinendaten wie Angaben über Netzwerke, Endpunkte, Zugriffe, Schadsoftware, Schwachstellen sowie Identitätsdaten liefert. Sicherheitsteams können damit interne und externe Angriffe schnell erkennen und abwehren und somit das Threat Management vereinfachen, Risiken minimieren und Ihr Unternehmen schützen. Splunk Enterprise Security strafft sämtliche Aspekte von Sicherheitsprozessen und eignet sich für Unternehmen jeder Größe und Expertise.
Operational technology (OT) and information technology (IT) security protect devices, networks, systems, and users. Cybersecurity has long been critical in IT and helps organizations keep sensitive data safe, ensure users connect to the internet securely, and detect and prevent potential cyberattacks.
7 Steps to Build a SOC with Limited ResourcesLogRhythm
Most organizations don't have the resources to staff a 24x7 security operations center (SOC). This results in events that aren't monitored around the clock, major delays in detecting and responding to incidents, and the inability for the team to proactively hunt for threats. It's a dangerous situation.
But there is a solution. By using the Threat Lifecycle Management framework to combine people, process, and technology to automate manual tasks, your team can rapidly detect and respond to threats—without adding resources. Read on to learn 7 steps to building your SOC, even when your resources are limited.
2018 ISPE Tieghi OT/ICS CyberSecurity per Pharma 4.0Enzo M. Tieghi
OT/ICS cyberSecurity should be one of the pillars for any Industry4.0/Pharma4.0 initiative. ISPE Italy Affiliate organized a conference at Campus Biomedico University in Rome in July 2018 on Pharma4.0. Data Integrity and Operation Continuity are requirements and Plant Floor CyberSecurity is required in digitization projects where ICS Networks should comunicate with Industrial Internet and Industrial IoT.
Dragos S4x20: How to Build an OT Security Operations CenterDragos, Inc.
Senior Director of Business Development, Matt Cowell's, S4x20 presentation details how to build an effective OT security operations center and the tools and skills needed.
Building a Next-Generation Security Operations Center (SOC)Sqrrl
So, you need to build a Security Operations Center (SOC)? What does that mean? What does the modern SOC need to do? Learn from Dr. Terry Brugger, who has been doing information security work for over 15 years, including building out a SOC for a large Federal agency and consulting for numerous large enterprises on their security operations.
Watch the presentation with audio here: http://info.sqrrl.com/sqrrl-october-webinar-next-generation-soc
SOC Architecture - Building the NextGen SOCPriyanka Aash
Why are APTs difficult to detect
Revisit the cyber kill chain
Process orient detection
NextGen SOC Process
Building your threat mind map
Implement and measure your SOC
Building an effective Information Security RoadmapElliott Franklin
As company information security functions continue to grow each year with increasing attacks and regulations, how are you handling the
pressure? Are you constantly battling to run the business projects and reacting to customer requests? Have you blocked off a few hours each week
on your calendar to close your email, turn off your phone and try to build, assess and maintain an effective vision for your security team? This
presentation will discuss a cascading approach to creating such a roadmap that is easily understood by executives and has helped gain quick buy
in for multiple enterprise wide security projects.
Data Quality Management: Cleaner Data, Better Reportingaccenture
In this new Accenture Finance & Risk presentation we explore a process to investigate, prioritize and resolve data quality issues, key to creating a more efficient and accurate reporting environment. View our presentation to learn more.
For more on regulatory reporting, see presentation on Financial Reporting Robotics: http://bit.ly/2qaLK9y
Visit our blog for latest Regulatory Insights: https://accntu.re/2qnXs1B
ADV Slides: How to Improve Your Analytic Data Architecture MaturityDATAVERSITY
Many organizations are immature when it comes to data use. The answer lies in delivering a greater level of insight from data, straight to the point of need. Enter: machine learning.
In this webinar, William will look at categories of organizational response to the challenge across strategy, architecture, modeling, processes, and ethics. Machine learning maturity levels tend to move in harmony across these categories. As a general principle of maturity models, you can’t skip levels in any category, nor can you advance in one category well beyond the others.
Vis-à-vis ML, attaining and retaining momentum up the model is paramount for success. You will ascend the model through concerted efforts delivering business wins utilizing progressive elements of the model, and thereby increasing your machine learning maturity. The model will evolve. No plateaus are comfortable for long.
With ML maturity markers, sequencing, and tactics, this webinar provides a plan for how to build analytic Data Architecture maturity in your organization.
2018 ISPE Tieghi OT/ICS CyberSecurity per Pharma 4.0Enzo M. Tieghi
OT/ICS cyberSecurity should be one of the pillars for any Industry4.0/Pharma4.0 initiative. ISPE Italy Affiliate organized a conference at Campus Biomedico University in Rome in July 2018 on Pharma4.0. Data Integrity and Operation Continuity are requirements and Plant Floor CyberSecurity is required in digitization projects where ICS Networks should comunicate with Industrial Internet and Industrial IoT.
Dragos S4x20: How to Build an OT Security Operations CenterDragos, Inc.
Senior Director of Business Development, Matt Cowell's, S4x20 presentation details how to build an effective OT security operations center and the tools and skills needed.
Building a Next-Generation Security Operations Center (SOC)Sqrrl
So, you need to build a Security Operations Center (SOC)? What does that mean? What does the modern SOC need to do? Learn from Dr. Terry Brugger, who has been doing information security work for over 15 years, including building out a SOC for a large Federal agency and consulting for numerous large enterprises on their security operations.
Watch the presentation with audio here: http://info.sqrrl.com/sqrrl-october-webinar-next-generation-soc
SOC Architecture - Building the NextGen SOCPriyanka Aash
Why are APTs difficult to detect
Revisit the cyber kill chain
Process orient detection
NextGen SOC Process
Building your threat mind map
Implement and measure your SOC
Building an effective Information Security RoadmapElliott Franklin
As company information security functions continue to grow each year with increasing attacks and regulations, how are you handling the
pressure? Are you constantly battling to run the business projects and reacting to customer requests? Have you blocked off a few hours each week
on your calendar to close your email, turn off your phone and try to build, assess and maintain an effective vision for your security team? This
presentation will discuss a cascading approach to creating such a roadmap that is easily understood by executives and has helped gain quick buy
in for multiple enterprise wide security projects.
Data Quality Management: Cleaner Data, Better Reportingaccenture
In this new Accenture Finance & Risk presentation we explore a process to investigate, prioritize and resolve data quality issues, key to creating a more efficient and accurate reporting environment. View our presentation to learn more.
For more on regulatory reporting, see presentation on Financial Reporting Robotics: http://bit.ly/2qaLK9y
Visit our blog for latest Regulatory Insights: https://accntu.re/2qnXs1B
ADV Slides: How to Improve Your Analytic Data Architecture MaturityDATAVERSITY
Many organizations are immature when it comes to data use. The answer lies in delivering a greater level of insight from data, straight to the point of need. Enter: machine learning.
In this webinar, William will look at categories of organizational response to the challenge across strategy, architecture, modeling, processes, and ethics. Machine learning maturity levels tend to move in harmony across these categories. As a general principle of maturity models, you can’t skip levels in any category, nor can you advance in one category well beyond the others.
Vis-à-vis ML, attaining and retaining momentum up the model is paramount for success. You will ascend the model through concerted efforts delivering business wins utilizing progressive elements of the model, and thereby increasing your machine learning maturity. The model will evolve. No plateaus are comfortable for long.
With ML maturity markers, sequencing, and tactics, this webinar provides a plan for how to build analytic Data Architecture maturity in your organization.
ADV Slides: What the Aspiring or New Data Scientist Needs to Know About the E...DATAVERSITY
Many data scientists are well grounded in creating accomplishment in the enterprise, but many come from outside – from academia, from PhD programs and research. They have the necessary technical skills, but it doesn’t count until their product gets to production and in use. The speaker recently helped a struggling data scientist understand his organization and how to create success in it. That turned into this presentation, because many new data scientists struggle with the complexities of an enterprise.
Presented at the IndicThreads.com Software Development Conference 2016 held in Pune, India. More at http://www.IndicThreads.com and http://Pune16.IndicThreads.com
--
The new Enterprise Management Associates (EMA) research study Big Data Impacts on Hybrid Infrastructure and Management study examined what types of IT monitoring data enterprises are collecting and analyzing with big data technology and how they leverage that analytics to improve IT management practices. These slides cover some of the findings.
Intelligent Maintenance: Mapping the #IIoT ProcessDan Yarmoluk
A presentation about Industrial IoT, the value chain and real-world use cases; how to create value with IoT at your organization with an emphasis on predictive maintenance (bearing fault detection).
According to EMA, most companies use 6 or more monitoring tool for a fragmented, piecemeal approach to monitoring. Riverbed SteelCentral is the only end-to-end performance management platform that blends user experience, infrastructure, application, and network monitoring for a holistic view of performance.
Brighttalk converged infrastructure and it operations management - finalAndrew White
How Converged Infrastructure Will Change IT Operations Management
Over the past decade, Enterprises have leveraged a shared service model to make IT more cost effective. The emergence of “Converged Infrastructure” and “Fabric-Based Infrastructure” will allow IT to offer purpose driven solutions rather than the function driven solutions of the past. To do this, IT will need to evolve towards more modular designs, rely more on open standards, and rethink their approach to management frameworks.
In this session you will learn:
How converged infrastructure is used to create purpose driven solutions
Why new operational challenges are faced as this new approach is used broadly
What changes need to occur to succeed with this new paradigm
The last 18+ months have proven to be like no other time in modern history, and it has had a profound effect on the supply chain in the manufacturing industry. This disruption has meant many restless nights worrying about supply chains, workforce agility, capacity planning, resource allocation, and much more for manufacturers. Manufacturers have realized that better planning and preparedness are crucial to adapting to the rapid changes in demand seen in today's current climate.
In this webinar, you will learn how to address these challenges head-on as we discuss how your organization can become more agile and scale to your specific business requirements and how Cloud ERP systems can support better planning and preparedness for what's next.
________________________________________
About The Presenter
Steve Canter - Director of Global Service Delivery
Steve Canter has over 25 years of experience in the information technology industry. Steve has been responsible for delivering solutions to many medium-sized and large companies in a variety of industries as a consultant and project manager. Steve also brings a unique perspective to SmartERP, having spent over ten years as the CIO for a manufacturing and distribution company. During that period, he also helped shape product and customer service strategy at Microsoft and Oracle as a member of several customer advisory boards.
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
More and more manufacturers have been investing in cloud technology these days, but there is still a contingent of businesses who don’t see the appeal, or are concerned about the risks. In a recent MBT survey about cloud adoption, 50 percent of those manufacturers not using cloud computing said they didn’t because of security concerns. But are these concerns actually justified, or are businesses leaving opportunity on the table due to glaring misconceptions?
What Does Artificial Intelligence Have to Do with IT Operations?Precisely
From the early days of IT, organizations have grappled with the challenges of understanding how well their infrastructure is performing in support of the business. They have used a plethora of tools to detect, manage, and resolve problems that are causing disruption of services, but still struggle to achieve a unified, cross-domain understanding of what is happening across their IT infrastructure. Fortunately, over the past few years analytics platforms like Splunk, Elastic, and others have emerged to address requirements around IT Operations Analytics (ITOA). Now today the buzz is around AIOps – Artificial Intelligence Operations. But what is AIOps, and what can it do to help organizations address IT challenges. In this presentation you will get a better understanding of:
What is Artificial Intelligence for IT Operations
What are the required technologies for success at AIOps
What challenges exist for achieving AIOPs
Challenges of Operationalising Data Science in Productioniguazio
The presentation topic for this meet-up was covered in two sections without any breaks in-between
Section 1: Business Aspects (20 mins)
Speaker: Rasmi Mohapatra, Product Owner, Experian
https://www.linkedin.com/in/rasmi-m-428b3a46/
Once your data science application is in the production, there are many typical data science operational challenges experienced today - across business domains - we will cover a few challenges with example scenarios
Section 2: Tech Aspects (40 mins, slides & demo, Q&A )
Speaker: Santanu Dey, Solution Architect, Iguazio
https://www.linkedin.com/in/santanu/
In this part of the talk, we will cover how these operational challenges can be overcome e.g. automating data collection & preparation, making ML models portable & deploying in production, monitoring and scaling, etc.
with relevant demos.
The differing ways to monitor and instrumentJonah Kowall
FullStack London July 15th, 2016
Monitoring is complicated, and in most organizations consists of far too many tools owned by many teams. These tools consist of monitoring tools each looking at a component myopically. These tools metrics and logs from devices and software emitting them. Increasingly modern companies are creating their own instrumentation, but there is a large base of generic instrumentation of software. Fixing monitoring issues requires people, process, and technology. In this talk we will cover many common issues seen in the real world. For example decisions on what should be monitored or collected from a technology and a business perspective. This requires process and coordination.
We will investigate what instrumentation is most scalable and effective across languages this includes the commonly used APIs and possibilities to capture data from common languages like Java, .NET and PHP, but we’ll also go into methods which work with Python, Node.js, and golang. We will cover browser and mobile instrumentation techniques. How these are done? which APIs are being used? What open source tools and frameworks can be leveraged? Most importantly how to coordinate and communicate requirements across your organization.
Attendees of this session will walk away with a clear understanding of:
What is instrumentation, and what do I instrument, collect, and store?
The understanding of overhead and how this can be accomplished on common software stacks?
How to work with application owners to collect business data.
How correlation works in custom open source or packaged monitoring tools.
With Industry 4.0 becoming more of a reality every day and new technologies and capabilities breaking onto the industrial scene regularly, there are more opportunities than ever to advance automation systems. System integrators are often the first to see and implement new technologies, as well as the first to learn of the common misconceptions and pitfalls that come with quickly changing trends.
What new technology is a fleeting fad, and what is here to stay? What are the best practices for securing and expanding industrial systems? Where does the industry appear to be headed in the coming years?
In this engaging roundtable webinar, expert system integrators from a diverse range of backgrounds will offer their insights, tips, and stories about their experiences on these questions and more, from the front lines of industrial integration.
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...Precisely
IT leaders looking to move beyond reactive and ad hoc troubleshooting need to find the intersection of maintaining existing systems while still driving innovation - solving for the present while preparing for the future. Identifying ways to bring existing infrastructure and legacy systems into the modern world can create the business advantage you need.
View the conversation with Splunk’s Chief Technology Advocate, Andi Mann and Syncsort’s Chief Product Officer, David Hodgson where we discuss the digital transformation taking place in IT and how machine learning and AI are helping IT leaders create a more business-centric view of their world including:
• The importance of data sharing and collaboration between mainframe and distributed IT
• The value of integrating legacy data sources and existing infrastructure into the modern world
• Achieving an end to end view of IT operations and application performance with machine learning
Amidst an industry cloud of confusion about what “AIOps” is and what it can do, these slides--based on the webinar from EMA research--delineates a clear path to victory for business and IT stakeholders seeking to use machine learning to optimize the performance of critical business services.
2. According to the results of a 2015 MPI/Rockwell survey
Less than half (45%) of manufacturers surveyed said that their OT
and IT teams collaborated on issues such as upgrading legacy
operations or enterprise systems
A scant 37% reported a collaborative approach to solving technical
enterprise issues
Nearly 10% reported no collaboration between the two
departments.
- Industry Week
3.
4. Dumpers, loaders and
heavy mining equipment
Sensors to monitor asset
performance
Onboard event logging and
prognosis
Transmission of events
from assets
Intelligent asset response
Resource deployment
Remote
troubleshooting……
Enterprise backbone
integration
Communication networks
and database
Hardware / Software
updates
Integrating Enterprise ERP
with OT applications
Integration between
Equipment data logger and
big data back-end / cloud
Field service management
Supply chain
management…..
5. Tesla’s
Response
Tesla communicated the recall to its
customer but told them “not to worry”.
Next day morning 29, 222 cars were
updated with the fix while the customers
were sleeping overnight.
Previously Tesla had also performed a silent
/ non-recall fix where in it had to tweak the
settings of the electronic shock absorbers
to make it more resilient at high speed.
GM’s
Response
GM asked its customers to take its cars
to the dealers for update and fix.
6.
7. NIST ICS (Special Publication 800-82, Revision 2, Guide to Industrial Control Systems (ICS) Security (Pages 2-16 to 2-17)(4)
Category IT Systems OT Systems
Primary Players • CIO
• Computer Science Grads
• “Wintel geeks” / Younger generation
• COO, Engineers, Technicians, Production
Managers and Staff
• Older staff who moved up through then ranks
from line operators to technicians
Primary Focus • Data confidentiality and integrity is paramount
• Automation of business processes
• Information management and manipulation
• Safety and protection of the process and
equipment
• Response to human and other emergency
interaction is critical
• Controlling physical process
Component Lifetime • Lifetime in order of 3-5 years • Lifetime in order of 15-20 years
Security Approach • Confidentiality, Integrity and Availability • Availability, Integrity, Confidentiality
Performance
Requirement
• Non-real time
• High throughputs demanded
• Downtimes acceptable
• Real-time
• Reponses is time-critical
• Downtime or delays unacceptable
Data • Complex data type
• Multilayered analytics
• Low data rate (10k records/second)
• Simple data type
• Just-in-time analytics
• High data rate (1M messages/sec)
Interfaces and
Networks
• Web browser
• Keyboard
• TCP/IP based
• Typical IT networking practices
• HIM
• Sensors with embedded OS and Programs
• Codded displays and touch screens
• Serial based communication (Moving to TCP/IT)
12. Awareness of
Enterprise OT
Systems Landscape
and Degree of
Convergence
Consensus That
Convergence Means
a Change in
Managing OT
Rationalization and
Alignment of OT
Management and
Methods With IT
Tools
Integration of IT and
OT Systems and
Infrastructure
Optimize and
Standardize
Processes
LEVEL 1
LEVEL 2
LEVEL 3
LEVEL 4
LEVEL 5
Research
Foundation
Alignment
Integration
Transformation
1. As-is IT & OT
Architecture
2. As-is OT mtn. process
mapping
3. IT-OT Technical
integration
Architecture (Data,
Security)
1. IT-OT Competency
Center model
2. Vision, Goals, Charter,
R&R and Governance
3. CC Operating Norms
4. Cross departmental
training through job
rotation
1. To-be integration
architecture
2.OT Risk and Roadmap
profiling – Heat Map
3. Vendor Collaboration
4. Process alignment
1. Pilot Integration
Projects
2. Vendor Collaboration
3. Monitoring
4. Cyber Security Testing
1. Launch targeted
transformation
initiatives
2. Measure benefits
3. Repeat
15. What are some of the challenges that you are
facing in your organization with IT/OT
integration?
16. What is your IT / Cyber Security department
doing to bridge the IT and OT skills gap?
17. What approach are you taking to address
security concerns as part of your IT /OT
initiatives?
How are you getting the stakeholder buy-ins
on related investments?