Das sollte jeder ITSpezialist über. Automations- und Produktionsnetzwerke wissen

Size: px
Start display at page:

Download "Das sollte jeder ITSpezialist über. Automations- und Produktionsnetzwerke wissen"

Transcription

1 Das sollte jeder ITSpezialist über Automations- und Produktionsnetzwerke wissen Frank Schirra, Rockwell Automation Solution Architect Edi Truttmann, Cisco Systems Network Solution Sales Specialist 2012 Cisco and/or its affiliates. All rights reserved.

2 Cisco & Rockwell Partnership Network Evolution - Convergence Agenda Industrial Networking - Reference Architecture Industrial Security Summary 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2

3 Common Technology View Support use of open, unmodified standards, with intelligent networking features in automation networks through ODVA, ISA and others Collaborating on Reference Architectures Tested and validated design and implementation guidance and best practices for a converged network architecture People and Process Optimization Develop process guidelines for help with convergence, facilitate training and dialogue with IT and Manufacturing Product Collaboration Developed Industrial Ethernet switch incorporating the best of Cisco and the best of Rockwell Automation 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3

4 combining the best of both worlds 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4

5 Cisco & Rockwell Partnership Network Evolution - Convergence Agenda Industrial Networking - Reference Architecture Industrial Security Summary 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5

6 170 Years Ago: Invention of the Telegraph 100 Years Ago: Invention of the Radio 70 Years Ago: First general purpose electronic computer 40 Years Ago: First Internet connection 20 Years Ago: World Wide Web Intelligently Connecting People, Process, Data, and Things 2005: IP Traffic: 29 exabytes 2008: Video Traffic: 21 exabytes 2012: 50M Connecte 2003: 0.5B Connected Devices 2005: First Smartphone 2010: 0.5B Smartphones 2010: 7B Connected Devices 2011: 90M Smartmeters 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6

7 Business and Societal Impact Connectivity Digitize Access to Information Web Browser Search Networked Economy Digitize Business Process E-commerce Digital Supply Chain Collaboration Immersive Experiences Digitize Interactions (Business & Social) Social Mobility Cloud Video Internet of Everything Digitize the World Connecting: People Process Data Things Intelligent Connections 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7

8 IT and OT Converge The Network IP-Rich IT 2012 Cisco and/or its affiliates. All rights reserved. + CORE BUSINESS OPERATIONS Cisco Confidential 8

9 Cisco & Rockwell Partnership Network Evolution - Convergence Agenda Industrial Networking - Reference Architecture Industrial Security Summary 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9

10 Cisco & Rockwell Partnership Network Evolution - Convergence Agenda Industrial Networking - Reference Architecture Industrial Security Summary 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10

11 DNA of Your Control Network Level 5 Level 4 Level 3 Level 2 Level 1 Level 0 , Intranet, etc. Terminal Services Application Mirror FactoryTalk Application Server FactoryTalk Client Batch Control FactoryTalk Directory Operator Interface Discrete Control Patch Management Web Services Operations Enterprise Network Site Business Planning and Logistics Network Engineering Workstation FactoryTalk Client Drive Control AV Server Application Server Domain Controller Site Manufacturing Operations and Control Engineering Workstation Continuous Process Control Sensors Drives Actuators Robots Area Supervisory Control Operator Interface Safety Control Firewall Firewall Web CIP Basic Control Process Enterprise Zone DMZ Manufacturing Zone Cell/Area Zone Gaining visibility into this world of previously undetected cyber-threats helped reassure our team that we were doing the right thing by adding intrusion prevention technology across our industrial network. Charles Harper, Director of National Supply and Pipeline Operations at Air Liquide Cisco Industrial Security: Inform, Protect and Respond Network Security Access Control Secure Mobility Content Security 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11

12 Customized Threat Bypasses Security Gateways Firewall IPS Threat Spreads Inside Perimeter Customized Threat Enters from Inside N-AV Web Sec Threat Spreads to Devices Sec Perimeter security stops many threats but Sophisticated Cyber Threats Evade Existing Security Constructs Fingerprints of Threat are Found Only in Network Fabric 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12

13 Night Dragon Stuxnet Threat Characteristics: Custom-written for target Zeus (Zitmo) Buckshot Yankee Nitro DuQu Bypass the perimeter Spread laterally on internal network where detection abilities were limited Evade traditional detection techniques Aurora Shady Rat Rocra Citadel SpyEye (Spitmo) Flame 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13

14 Core Infrastructure with NetFlow Cisco 2900/3560/3700/4500/6500, NGA. ASA, ISR, ASR 1000, Identity Services Engine Identity Services Engine Provides context information Identity Information including: who, what, when, where, how StealthWatch Lancope StealthWatch Platform Visibility and Management Aggregates FLOW and CONTEXT to highlight anomalies and risk Advanced Services Cisco or Partner Consultation/Updates Design-Implementation, Subscription Design Proof of Concept Limited Deployment Enterprise Deployment 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14

15 Identity and Context-Centric Policy Platform Where Who What When How Security Policy Attributes Business-Relevant Policies Identity Centralized Policy Engine (Identity Services Engine) Dynamic Policy User and Devices Monitoring and Reporting Security Policy Enforcement in the Network Application Controls One Policy for Wired, Wireless, and Remote Users 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15

16 Monitor, collect and analyze network traffic, establish a baseline, and alarm on anomalies and behavior changes NetFlow Telemetry Cisco Switches, Routers, and ASA 5500 TrustSec Enabled Enterprise Network NetFlow: Switches, Routers, and ASA 5500 Context: NBAR/AVC Identity Services Engine Threat Context Data Cisco Identity, Device, Posture, Application Cisco Cyber Threat Detection - enhances efficiency and effectiveness of analysis and provides key insight into internal activity across the network 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16

17 Cisco & Rockwell Partnership Network Evolution - Convergence Agenda Industrial Networking - Reference Architecture Industrial Security Summary 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17

18 combining the best of both worlds 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18

19 Rockwell Automation and Cisco Systems Collaboration Content relevant to both IT Network Engineers and Industrial Control System Engineers Built on Technology and Industry Standards IEEE, IETF, IEC, ISA-95, ISA-99. Recommendations and Design Guidance Documented configuration settings Cisco Validated Design Future-ready 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 19

20 Thank you.

Scalable Secure Remote Access Solutions

Scalable Secure Remote Access Solutions Scalable Secure Remote Access Solutions Jason Dely, CISSP Principal Security Consultant jdely@ra.rockwell.com Scott Friberg Solutions Architect Cisco Systems, Inc. sfriberg@cisco.com Jeffrey A. Shearer,

More information

Securing The Connected Enterprise

Securing The Connected Enterprise Securing The Connected Enterprise Pack Expo 2015 Las Vegas Chelsea An Business Development Lead, Network & Security PUBLIC Copyright 2015 Rockwell Automation, Inc. All Rights Reserved. 8 Connected Enterprise

More information

REFERENCE ARCHITECTURES FOR MANUFACTURING

REFERENCE ARCHITECTURES FOR MANUFACTURING Synopsis Industry adoption of EtherNet/IP TM for control and information resulted in the wide deployment of standard Ethernet in manufacturing. This deployment acts as the technology enabler for the convergence

More information

Computer System Security Updates

Computer System Security Updates Why patch? If you have already deployed a network architecture, such as the one recommended by Rockwell Automation and Cisco in the Converged Plantwide Ethernet Design and Implementation Guide (http://www.ab.com/networks/architectures.html),

More information

Next Gen IT Opportunities for IT-CMF A Cisco POV >> IVI Autumn Summit Sep, 23 2013

Next Gen IT Opportunities for IT-CMF A Cisco POV >> IVI Autumn Summit Sep, 23 2013 Next Gen IT Opportunities for IT-CMF A Cisco POV >> IVI Autumn Summit Sep, 23 2013 Parag Gondhalekar Cisco Consulting Services 2010 Cisco and/or its affiliates. All rights reserved. At Cisco We See around

More information

Simplifying the Transition to Virtualization TS17

Simplifying the Transition to Virtualization TS17 Simplifying the Transition to Virtualization TS17 Name Sandeep Redkar Title Manager Process Solutions Date 11 th February 2015 Agenda Overview & Drivers Virtualization for Production Rockwell Automation

More information

Innovation value pools for Utilities or Advanced Information and Communications (ICT) Technology in Energy

Innovation value pools for Utilities or Advanced Information and Communications (ICT) Technology in Energy Innovation value pools for Utilities or Advanced Information and Communications (ICT) Technology in Energy Tony Court Director, Cisco Consulting Services Oct 2014 3 R s for Utility Success in 21 st Century

More information

How the Internet of Things Will Transform the Manufacturing Industry

How the Internet of Things Will Transform the Manufacturing Industry How the Internet of Things Will Transform the Manufacturing Industry Dinesh Malkani President, Cisco India & SAARC February 26, 2015 By 2018, Video will be 62% of India's mobile data traffic India Is Ready

More information

Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats

Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats Solution Overview Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats What You Will Learn The network security threat landscape is ever-evolving. But always

More information

The Internet of Things (IoT) and Industrial Networks. Guy Denis gudenis@cisco.com Rockwell Automation Alliance Manager Europe 2015

The Internet of Things (IoT) and Industrial Networks. Guy Denis gudenis@cisco.com Rockwell Automation Alliance Manager Europe 2015 The Internet of Things (IoT) and Industrial Networks Guy Denis gudenis@cisco.com Rockwell Automation Alliance Manager Europe 2015 Increasingly Everything will be interconnected 50 Billion Smart Objects

More information

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples

More information

Network Security Trends & Fundamentals of Securing EtherNet/IP Networks

Network Security Trends & Fundamentals of Securing EtherNet/IP Networks Network Security Trends & Fundamentals of Securing EtherNet/IP Networks Presented by Rockwell Automation Industrial Network Security Trends Security Quips "Good enough" security now, is better than "perfect"

More information

T46 - Integrated Architecture Tools for Securing Your Control System

T46 - Integrated Architecture Tools for Securing Your Control System T46 - Integrated Architecture Tools for Securing Your Control System PUBLIC PUBLIC - 5058-CO900G Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. The Connected Enterprise PUBLIC Copyright

More information

Cisco Cyber Threat Defense - Visibility and Network Prevention

Cisco Cyber Threat Defense - Visibility and Network Prevention White Paper Advanced Threat Detection: Gain Network Visibility and Stop Malware What You Will Learn The Cisco Cyber Threat Defense (CTD) solution brings visibility to all the points of your extended network,

More information

AUP28 - Implementing Security and IP Protection

AUP28 - Implementing Security and IP Protection AUP28 - Implementing Security and IP Protection Features in the Integrated Architecture Mads Laier DK Commercial Engineer Logix & Networks Rev 5058-CO900E Agenda Why IACS Security Now! Defense in depth

More information

Production Software Within Manufacturing Reference Architectures

Production Software Within Manufacturing Reference Architectures Production Software Within Manufacturing Reference Architectures Synopsis Industry adoption of EtherNet/IP for control and information has driven the wide deployment of standard Ethernet for manufacturing

More information

Cisco & Big Data Security

Cisco & Big Data Security Cisco & Big Data Security 巨 量 資 料 的 傳 輸 保 護 Joey Kuo Borderless Networks Manager hskuo@cisco.com The any-to-any world and the Internet of Everything is an evolution in connectivity and collaboration that

More information

CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS

CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS Didier Mora System Engineer Cisco Mayo, 2015 Converging Digital Disruptions The Nexus of Forces The 3rd Platform The Industrial Internet IoT = $1.9

More information

Scalable, Secure Remote Monitoring Solutions Stay a step ahead by remotely monitoring your critical assets

Scalable, Secure Remote Monitoring Solutions Stay a step ahead by remotely monitoring your critical assets Scalable, Secure Remote Monitoring Solutions Stay a step ahead by remotely monitoring your critical assets PUBLIC PUBLIC - 5058-CO900G Why Is This Important? What s Driving This Need? Customer Impact It

More information

Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1

Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1 C b Th Cyber Threatt Defense D f S Solution l ti Moritz Wenz, Lancope 1 The Threat Landscape is evolving Enterprise Response Antivirus (Host-Based) IDS/IPS (Network Perimeter) Reputation (Global) and Sandboxing

More information

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)

More information

Information Technology Cluster

Information Technology Cluster Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network

More information

Cybersecurity Before - During - After An Integrated Security Strategy

Cybersecurity Before - During - After An Integrated Security Strategy Cybersecurity Before - During - After An Integrated Security Strategy Peter Romness Business Development Manager Public SectorCybersecurity Cisco Systems Inc. 1 Mobility Cloud Threat IOT Consumercentric

More information

Cisco Secure BYOD Solution

Cisco Secure BYOD Solution Q&A Cisco Secure BYOD Solution What Is New? Q. What is new from security to take organizations beyond BYOD? A. Cisco is announcing a solution that goes beyond BYOD in enabling you to securely deliver bring-your-owndevice

More information

Internet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis

Internet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis Internet of Everything Cisco product managers Vytautas Zulonas Tomas Kirvelaitis Content Internet of Everything application Internet of Everything challenges Cisco solutions Convergence of Mobile, Social,

More information

Industrial Security Solutions

Industrial Security Solutions Industrial Security Solutions Building More Secure Environments From Enterprise to End Devices You have assets to protect. Control systems, networks and software can all help defend against security threats

More information

Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco

Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco Secure Access into Industrial Automation and Systems Industry Best Practice and Trends Serhii Konovalov Venkat Pothamsetty Cisco Vendor offers a remote firmware update and PLC programming. Contractor asks

More information

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats Dragan Novaković Consulting Systems Engineer Security November 2015. New Networks Mean New Security Challenges

More information

http://www.velocis.in Extending Collaboration to BYOD Devices

http://www.velocis.in Extending Collaboration to BYOD Devices Extending Collaboration to BYOD Devices Extending Collaboration to BYOD Devices Device Freedom without Compromising the IT Network Today s employees are increasingly on the move, using mobile devices throughout

More information

Data Center Security That Accelerates Your Business

Data Center Security That Accelerates Your Business Solution Overview Data Center Security That Accelerates Your Business Business today runs at a breakneck pace. Customers want exceptional service, and workers expect instant access to their job tools,

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

Securing Manufacturing Control Networks. Alan J. Raveling, CISSP November 2 nd 5 th Pack Expo 2014

Securing Manufacturing Control Networks. Alan J. Raveling, CISSP November 2 nd 5 th Pack Expo 2014 Securing Manufacturing Control Networks Alan J. Raveling, CISSP November 2 nd 5 th Pack Expo 2014 As Internet-enabled technologies such as cloud and mobility grow, the need to understand the potential

More information

IT Security and OT Security. Understanding the Challenges

IT Security and OT Security. Understanding the Challenges IT Security and OT Security Understanding the Challenges Security Maturity Evolution in Industrial Control 1950s 5/4/2012 # 2 Technology Sophistication Security Maturity Evolution in Industrial Control

More information

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample

More information

The Internet of Everything:

The Internet of Everything: The Internet of Everything: Transforming O&G Industry in the new age Serhii Konovalov O&G Engineering Executive Amazing things Happen When You Connect the Unconnected March 12th, 2015 Why Internet of Everything?

More information

Internet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis

Internet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis Internet of Everything Cisco product managers Vytautas Zulonas Tomas Kirvelaitis Content Internet of Everything application Internet of Everything challenges Cisco solutions Convergence of Mobile, Social,

More information

Dr. György Kálmán gyorgy@mnemonic.no

Dr. György Kálmán gyorgy@mnemonic.no COMMUNICATION AND SECURITY IN CURRENT INDUSTRIAL AUTOMATION Dr. György Kálmán gyorgy@mnemonic.no Agenda Connected systems historical overview Current trends, concepts, pre and post Stuxnet Risks and threats

More information

Securing Manufacturing Computing and Controller Assets

Securing Manufacturing Computing and Controller Assets Securing Manufacturing Computing and Controller Assets Rockwell Automation and Cisco Four Key Initiatives: Common Technology View: A single system architecture, using open, industry standard networking

More information

Designing a Windows Server 2008 Network Infrastructure

Designing a Windows Server 2008 Network Infrastructure Designing a Windows Server 2008 Network Infrastructure MOC6435 About this Course This five-day course will provide students with an understanding of how to design a Windows Server 2008 Network Infrastructure

More information

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design.

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design. SSM6435 - Course 6435A: Designing a Windows Server 2008 Network Infrastructure Overview About this Course This five-day course will provide students with an understanding of how to design a Windows Server

More information

Cisco TrustSec Solution Overview

Cisco TrustSec Solution Overview Solution Overview Cisco TrustSec Solution Overview 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 10 Contents Introduction... 3 Solution Overview...

More information

Security in IT & Automatisierung

Security in IT & Automatisierung Security in IT & Automatisierung Welten wachsen zusammen und ermöglichen Industrie 4.0 Manfred Bauer manbauer@cisco.com April 2015 Informations Technologie Automatisierung Menschen Maschinen Sicherheit

More information

Choosing the correct Time Synchronization Protocol and incorporating the 1756-TIME module into your Application

Choosing the correct Time Synchronization Protocol and incorporating the 1756-TIME module into your Application Choosing the correct Time Synchronization Protocol and incorporating the 1756-TIME module into your Application By: Josh Matson Various Time Synchronization Protocols From the earliest days of networked

More information

Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things

Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things White Paper Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things Connect things. Analyze and act on the data they produce in milliseconds. Then send the right data to the cloud for

More information

Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435

Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435 coursemonster.com/au Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435 View training dates» Overview This course will provide students with an understanding

More information

How To Make A Network Safer With Stealthwatch

How To Make A Network Safer With Stealthwatch Netzwerkkonzept Informationsveranstaltung am 03.07.2007 Im Bristol Hotel Mainz Thema: Ideen zum Netzwerkdesign - Switching -WLAN - Security - VoIP Datum: 03.07.2007, Seite: 1 Network Behaviour Analysis

More information

Manufacturing and the Internet of Everything

Manufacturing and the Internet of Everything Manufacturing and the Internet of Everything Johan Arens, CISCO (joarens@cisco.com) Business relevance of the Internet of everything Manufacturing trends Business imperatives and outcomes A vision of the

More information

Process Control Networks Secure Architecture Design

Process Control Networks Secure Architecture Design Process Control Networks Secure Architecture Design Guest Speaker Robert Alston Principle Lead Network and Security Consultant Over 25 years network experience including design, implementation, troubleshooting

More information

Deploying Firewalls Throughout Your Organization

Deploying Firewalls Throughout Your Organization Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense

More information

The Internet of Everything

The Internet of Everything The Internet of Everything The Next Evolution of the Internet is Changing Everything Todd Meister Vice President, Software and Solutions Innovation Americas Partner Organization, Cisco October 23, 2014

More information

BEFORE. DURING. AFTER. CISCO'S INTEGRATED SECURITY STRATEGY NIALL MOYNIHAN CISCO EMEAR

BEFORE. DURING. AFTER. CISCO'S INTEGRATED SECURITY STRATEGY NIALL MOYNIHAN CISCO EMEAR BEFORE. DURING. AFTER. CISCO'S INTEGRATED SECURITY STRATEGY NIALL MOYNIHAN CISCO EMEAR The IndustrializaBon of Hacking SophisEcated AFacks, Complex Landscape Hacking Becomes an Industry Phishing, Low

More information

Things I can do to protect my network from getting Hacked!!!!!! Jazib Frahim, Technical Leader

Things I can do to protect my network from getting Hacked!!!!!! Jazib Frahim, Technical Leader Things I can do to protect my network from getting Hacked!!!!!! Jazib Frahim, Technical Leader Cisco Support Community Expert Series Webcast Today s featured expert is Cisco Technical Leader Ask him questions

More information

AUP28. Implementing Security In Integrated Architecture Practical security solutions for Industrial Control System (ICS)

AUP28. Implementing Security In Integrated Architecture Practical security solutions for Industrial Control System (ICS) AUP28 Implementing Security In Integrated Architecture Practical security solutions for Industrial Control System (ICS) Clive Barwise, Rockwell Automation European Product Manager Networks and Security

More information

Session 14: Functional Security in a Process Environment

Session 14: Functional Security in a Process Environment Abstract Session 14: Functional Security in a Process Environment Kurt Forster Industrial IT Solutions Specialist, Autopro Automation Consultants In an ideal industrial production security scenario, the

More information

PR03. High Availability

PR03. High Availability PR03 High Availability Related Topics NI10 Ethernet/IP Best Practices NI15 Enterprise Data Collection Options NI16 Thin Client Overview Solution Area 4 (Process) Agenda Overview Controllers & I/O Software

More information

Cisco Networking Capabilities for Medianet

Cisco Networking Capabilities for Medianet Cisco Networking Capabilities for Medianet Product Overview A medianet is an end-to-end architecture for a network comprising advanced, intelligent technologies and devices in a platform optimized for

More information

Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF

Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF TECHNOLOGY STRATEGY BRIEF Extreme Networks CoreFlow2 Technology Benefits INCREASED VISIBILITY Detailed monitoring of applications, their

More information

Simplify IT. With Cisco Application Centric Infrastructure. Barry Huang bhuang@cisco.com. Nov 13, 2014

Simplify IT. With Cisco Application Centric Infrastructure. Barry Huang bhuang@cisco.com. Nov 13, 2014 Simplify IT With Cisco Application Centric Infrastructure Barry Huang bhuang@cisco.com Nov 13, 2014 There are two approaches to Control Systems IMPERATIVE CONTROL DECLARATIVE CONTROL Baggage handlers follow

More information

Chapter 1 The Principles of Auditing 1

Chapter 1 The Principles of Auditing 1 Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls

More information

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT Utilities WHITE PAPER May 2013 INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT Table of Contents Introduction...3 Problem Statement...4 Solution Requirements...5 Components of an Integrated

More information

Achieving Secure, Remote Access to Plant-Floor Applications and Data

Achieving Secure, Remote Access to Plant-Floor Applications and Data Achieving Secure, Remote Access to Plant-Floor Applications and Data Abstract To increase the flexibility and efficiency of production operations, manufacturers are adopting open networking standards for

More information

Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance

Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance White Paper Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance What You Will Learn Modern data centers power businesses through a new generation of applications,

More information

Cisco Certification Skills Matrix

Cisco Certification Skills Matrix Cisco Certification Skills Matrix Whatever skills you need, IT networking professionals with Cisco Certifications have more to offer. Use this matrix to help evaluate candidates and make the perfect hire.

More information

Securing Process Control Systems

Securing Process Control Systems Securing Process Control Systems Bradford H. Hegrat, CISSP, CISM Sr. Principal Security Consultant Network & Security Services Rockwell Automation Process Solutions User Group (PSUG) November 14-15, 2011

More information

Readiness Assessments: Vital to Secure Mobility

Readiness Assessments: Vital to Secure Mobility White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats

More information

How To Extend Security Policies To Public Clouds

How To Extend Security Policies To Public Clouds What You Will Learn Public sector organizations without the budget to build a private cloud can consider public cloud services. The drawback until now has been tenants limited ability to implement their

More information

Cisco SecureX Product Brochure

Cisco SecureX Product Brochure Cisco SecureX Product Brochure Security Matters More Than Ever Traditional approaches to network security were designed for a single purpose: to protect resources inside the network from threats and malware

More information

A Security Mechanism for Remote Monitoring System Security using Smartphone

A Security Mechanism for Remote Monitoring System Security using Smartphone A Security Mechanism for Remote Monitoring System Security using Smartphone Sungjae Yu Chau Ngoc Tu Souhwan Jung School of Electronic Engineering Soongsil University SEOUL, KOREA {ysj77777, chaungoctu,

More information

Maximize Network Visibility with NetFlow Technology. Andy Wilson Senior Systems Engineer Lancope

Maximize Network Visibility with NetFlow Technology. Andy Wilson Senior Systems Engineer Lancope Maximize Network Visibility with NetFlow Technology Andy Wilson Senior Systems Engineer Lancope Agenda What is NetFlow Introduction to NetFlow NetFlow Examples NetFlow in Action Network Operations User

More information

Fast Lane México presenta su calendario de cursos:

Fast Lane México presenta su calendario de cursos: Communica ons & Services Certification & Recertification CI-CIERS1 Cisco Internetwork Expert Routing & Switching 1 14/05/2012 18/05/2012 CI-CIERS2 Cisco Internetwork Expert Routing & Switching 2 25/06/2012

More information

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop White Paper Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop What You Will Learn Cisco Virtualization Experience Infrastructure (VXI) delivers a service-optimized desktop virtualization

More information

ICT Infrastructure & Network Management

ICT Infrastructure & Network Management Context ICT Infrastructure & Network Management Postgraduate Degree Programme Hogeschool-Universiteit Brussel 2014-2015 The HUB University College offers a wide range of postgraduate and other courses

More information

ISACA rudens konference

ISACA rudens konference ISACA rudens konference 8 Novembris 2012 Procesa kontroles sistēmu drošība Andris Lauciņš Ievads Kāpēc tēma par procesa kontroles sistēmām? Statistics on incidents Reality of the environment of industrial

More information

Course Outline: 6435- Designing a Windows Server 2008 Network Infrastructure

Course Outline: 6435- Designing a Windows Server 2008 Network Infrastructure Course Outline: 6435- Designing a Network Infrastructure Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs Overview: This five-day course will provide students with an understanding

More information

MANAGED SECURITY SERVICES

MANAGED SECURITY SERVICES MANAGED SECURITY SERVICES Security first Safety first! Security is becoming increasingly important for companies, especially for the extension of networking to mission-critical environments, with new intranet

More information

GE Measurement & Control. Cyber Security for NERC CIP Compliance

GE Measurement & Control. Cyber Security for NERC CIP Compliance GE Measurement & Control Cyber Security for NERC CIP Compliance GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used for purposes

More information

Cisco Master Security Specialization Practice Areas Summary. June 2015

Cisco Master Security Specialization Practice Areas Summary. June 2015 Cisco Master Security Specialization Practice Areas Summary June 2015 New Master Security Model Prerequisites Advanced Security Architecture Specialization (ASAS) (1) CCIE Security (1) CCNP Security (1)

More information

Meeting the Cybersecurity Standards of ANSI/ISA 62443 with Data Diodes

Meeting the Cybersecurity Standards of ANSI/ISA 62443 with Data Diodes Meeting the Cybersecurity Standards of ANSI/ISA 62443 with Data Diodes Dennis Lanahan June 1, 2015 Securing the convergence of OT and IT with ST 1 Introduction to Owl US US Owned and & Operated Product

More information

INTRODUCTION TO VMWARE PRODUCT SUITE: VIRTUALIZATION SOLUTIONS

INTRODUCTION TO VMWARE PRODUCT SUITE: VIRTUALIZATION SOLUTIONS explore EXPO INTRODUCTION TO VMWARE PRODUCT SUITE: VIRTUALIZATION SOLUTIONS Jim Lass, Information Solutions Manager, Van Meter Inc. Jason Sinclair, IT Systems Engineer, Van Meter Inc. explore EXPO Agenda

More information

Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure

Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure White Paper Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure What You Will Learn The new Cisco Application Centric Infrastructure

More information

Critical Infrastructure Cybersecurity

Critical Infrastructure Cybersecurity Critical Infrastructure Cybersecurity Webinar July 23, 2014 Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Kim Legelis Vice President, Marketing Lockheed Martin Industrial Defender 2

More information

Cyber Security Seminar KTH 2011-04-14

Cyber Security Seminar KTH 2011-04-14 Cyber Security Seminar KTH 2011-04-14 Defending the Smart Grid erik.z.johansson@se.abb.com Appropriate Footer Information Here Table of content Business Drivers Compliance APT; Stuxnet and Night Dragon

More information

PCI Solution for Retail: Addressing Compliance and Security Best Practices

PCI Solution for Retail: Addressing Compliance and Security Best Practices PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment

More information

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous

More information

Are you prepared to be next? Invensys Cyber Security

Are you prepared to be next? Invensys Cyber Security Defense In Depth Are you prepared to be next? Invensys Cyber Security Sven Grone Critical Controls Solutions Consultant Presenting on behalf of Glen Bounds Global Modernization Consultant Agenda Cyber

More information

System 800xA Networks Control. Monitor. Communicate.

System 800xA Networks Control. Monitor. Communicate. System 800xA Networks Control. Monitor. Communicate. It's all about reliability Control of your network infrastructure is of great importance to ensure high performance of System 800xA. To achieve this,

More information

Mobile Device Strategy

Mobile Device Strategy Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.

More information

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..

More information

Industrial Security for Process Automation

Industrial Security for Process Automation Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

Symphony Plus Cyber security for the power and water industries

Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries

More information

The Importance of Cybersecurity Monitoring for Utilities

The Importance of Cybersecurity Monitoring for Utilities The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive

More information

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera rbarrera@grupo-dice.com. VERSION May, 2015

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera rbarrera@grupo-dice.com. VERSION May, 2015 Simplify IT With Cisco Application Centric Infrastructure Roberto Barrera rbarrera@grupo-dice.com VERSION May, 2015 Content Understanding Software Definded Network (SDN) Why SDN? What is SDN and Its Benefits?

More information

IP Telephony Management

IP Telephony Management IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient

More information

White Paper A Manufacturing Network Fabric Maturity Model

White Paper A Manufacturing Network Fabric Maturity Model White Paper October 2015 WP-24 A Manufacturing Network Fabric Maturity Model Simplify planning for an IoT information enabled manufacturing environment Introduction The Internet of Things (IoT) is expected

More information

Key Considerations for Operationalizing the Connected Industrial Enterprise

Key Considerations for Operationalizing the Connected Industrial Enterprise Key Considerations for Operationalizing the Connected Industrial Enterprise Improving Competitiveness with Information: Insights from the Rockwell Automation Connected Enterprise Journey 2 Key Considerations

More information

Data Security and Healthcare

Data Security and Healthcare Data Security and Healthcare Complex data flows Millions of electronic medical records across many systems New and emerging business relationships Changing and maturing compliance frameworks Diverse population

More information

Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education

Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education Cisco A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents

More information

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord Implementation of Cyber Security for Yara Glomfjord Speaker profile Olav Mo ABB

More information

Connect with Addressing Intelligence to Automate IPv6 Planning, Transition & Cyber Security

Connect with Addressing Intelligence to Automate IPv6 Planning, Transition & Cyber Security 2012 North American IPv6 Summit Connect with Addressing Intelligence to Automate IPv6 Planning, Transition & Cyber Security John L Lee, CTO Co-Chair, IPv6 Address Planning Team, ACT-IAC, Federal IPv6 Working

More information