ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things
|
|
|
- Lucinda Melanie Johnson
- 9 years ago
- Views:
Transcription
1 ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things Sid Snitkin Vice-President & GM Enterprise Advisory Services ARC Advisory Group [email protected]
2 Session Overview ARC Presentation of the Issues What s the Industrial Internet of Things? What are the Implications for ICS? What are the Implications for ICS Cyber Security? What s Needed to Secure Industry s Future? Cyber Security Expert Panel Discussion 2
3 What is the Industrial Internet of Things Remote Asset Management/Support Perspective XYZ Company XYZ Company XYZ Company XYZ Company Maintenance Engineering Purchasing Corporate Machine Mfr. Service Provider Enterprise New IoT Analytics and Applications Private Cloud Business Systems Private Cloud Share Asset Data with 3 rd Parties Secure Connection Monitor in-service Products Secure Network XYZ Company Smart Machine IoT Smart Module Local IoT Compute and Communicate module Physical asset with sensors, actuators Plant Operations Emerging Option: Connect Big Assets Using New Technologies 3
4 What is the Industrial Internet of Things Broad Connected Enterprise Perspective Most Industrial IoT Building Blocks are Already in Place 4
5 What is the Industrial Internet of Things The Enabling Technologies Smart, Autonomous Devices Smart Sensors Sending Asset Health/Performance to Remote Sites Intelligent Assets with Embedded Control & Communications Mobility & Ubiquitous Connectivity Use of Wireless Technologies and Mobile Devices Within Plants External Access to Plant Systems and Data Cloud Computing Use of the Cloud for Storing/Sharing of Operational Data Use of Cloud-Applications for Control & Process Improvements Cost and Performance Benefits Will Force Organizations to Exploit All of These Technology Developments! 5
6 What s the Implications for ICS? Today s ICS Landscape 6
7 What s the Implications for ICS? Tomorrow s ICS Landscape Oil & Gas Example Suppliers & Service Providers Enterprise Systems Smart Consumer Devices Cloud Applications Cloud Services Ubiquitous Connectivity Remote Smart Assets Mobile Devices Remote Operations Plants, Factories In-Plant Smart Assets 7
8 IIoT Implications for ICS Cybersecurity? A More Challenging Security Environment Technology Developments Smart Autonomous Devices Mobility and Ubiquitous Connectivity Cloud Computing New Control System Architectures More Integration with External Systems More Dynamic, Distributed Architectures More Reliance on External Services New ICS Cyber Security Challenges Exponential Increase in Attack Surface Increased Likelihood of Attacks Loss of Direct Control of Security Risk 8
9 What s the Implications for ICS Cybersecurity? New Challenges Require New Strategies Mission Scope People Processes Technology Today s Industrial Cyber Security Includes Protect Plants & Infrastructure AIC Systems Private Networks Internal ICS Groups ICS Supplier Service Groups Manage Security at Perimeter Secure Networks Secure Zones Authorize People Manage Software Vulnerabilities Endpoint Security Wrappers Network Firewalls Future Industrial Cyber Security Requires Protect Plants, Infra., External Resources AIC and CIA Systems, IIoT & Mobile Devices, Cloud Private & Public Networks Internal ICS & IT Groups ICS & IIoT Supplier Service Groups Public Networking Services Partners Cloud App & Data Services Partners Manage Security at Device Secure Networks and Messages Secure Zones, Devices, Messages, Data Authorize People & Devices Manage Software & Device Vulnerabilities Secure-by-Design Endpoint Devices Network and Device Firewalls The Future Requires Changes in Every Strategy Element! 9
10 What s the Implications for ICS Cybersecurity? An Expanded Cyber Security Landscape Systems Today s Scope Industrial Control Systems Enterprise Systems OT Cloud & Ubiquitous Connectivity IT Intelligent Assets Mobile Devices Devices 10
11 What s the Implications for ICS Cybersecurity? From ICS to Integrated Industrial Cyber Security ICS Cyber Security 11
12 Issues for the Panel Discussion What s your view of IIoT and its impact on industrial cyber security? What s needed for Secure-by-Design Devices? Who decides/verifies this? How should this status be sustained? What s needed for secure IIoT communications (from the device through the networks)? Who should be responsible for this? How do we ensure that security is being addressed and sustained? Are suppliers doing enough to address these emerging cyber security challenges? If not, what do they need to do differently? 12
13 Thank You. For more information, contact the author at or visit our web pages at 13
A Modern Process Automation System Offers More than Process Control. Dick Hill Vice President ARC Advisory Group [email protected]
A Modern Process Automation System Offers More than Process Control Dick Hill Vice President ARC Advisory Group [email protected] Modern Business Requirements Dynamic Customer Requirements Requiring Agility
Industrial Roadmap for Connected Machines. Sal Spada Research Director ARC Advisory Group [email protected]
Industrial Roadmap for Connected Machines Sal Spada Research Director ARC Advisory Group [email protected] Industrial Internet of Things (IoT) Based upon enhanced connectivity of this stuff Connecting
WORKSHOP Rethinking Cyber Security for Industrial Control Systems
WORKSHOP Rethinking Cyber Security for Industrial Control Systems Bob Mick, Workshop Moderator VP Emerging Technologies ARC Advisory Group [email protected] 1 Re-Thinking Cyber Security Why Re-Thinking?
Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk
Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Industrial Cyber Security Risk Industrial Attacks Continue to Increase in Frequency & Sophistication Today, industrial organizations
Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions
Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions Peter Reynolds Senior Consultant ARC Advisory Group [email protected] Twitter @PeterDReynolds The Hardware Layer
Rethinking Cyber Security for Industrial Control Systems (ICS)
Rethinking Cyber Security for Industrial Control Systems (ICS) Bob Mick VP Emerging Technologies ARC Advisory Group [email protected] 1 Rethinking Cyber Security We Now Have Years of Experience - Security
A Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University
A Systems of Systems perspective on The Internet of Things Johan Lukkien Eindhoven University System applications platform In-vehicle network network Local Control Local Control Local Control Reservations,
Industrial Internet of Things Bears Fruit with Connected Services for Plant Assets and Fleet Migration
Industrial Internet of Things Bears Fruit with Connected Services for Plant Assets and Fleet Migration Peter Reynolds Director of Consulting ARC Advisory Group [email protected] Twitter @PeterDReynolds
Enterprise Application Enablement for the Internet of Things
Enterprise Application Enablement for the Internet of Things Prof. Dr. Uwe Kubach VP Internet of Things Platform, P&I Technology, SAP SE Public Internet of Things (IoT) Trends 12 50 bn 40 50 % Devices
Connected Manufacturing
Connected Manufacturing The Internet of Things: Connecting the Unconnected Robert Dean, Executive Director, Business Transformation, Manufacturing Industry May 14, 2015 The Internet of Everything (IoE)
Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
ARC VIEW. OSIsoft-SAP Partnership Deepens SAP s Predictive Analytics at the Plant Floor. Keywords. Summary. By Peter Reynolds
ARC VIEW AUGUST 13, 2015 OSIsoft-SAP Partnership Deepens SAP s Predictive Analytics at the Plant Floor By Peter Reynolds Keywords SAP, OSIsoft, Oil & Gas, Internet of Things, SAP HANA, PI Server Summary
ARC INDUSTRY FORUM 2015
ARC INDUSTRY FORUM PRESENTATION TOPIC: MANAGING INDUSTRIAL CYBER SECURITY RISK Tyler Williams Manager, Industrial Cyber Security Shell Global Solutions [email protected] 1 THE TRADITIONAL APPROACH
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
District Energy and the Industrial IoT Benefits of a Connected System
District Energy and the Industrial IoT Benefits of a Connected System Presented by: Adam Strynadka Managing Director DeviceLynk What is the Industrial Internet of Things? The Internet of Things (IoT) can
How To Be Prepared For A Cybercrime
Cybersecurity and the Internet of Things June 2015 What is the Internet of Things? Agenda What is the Internet of Things?..2 The many and various benefits of IoT...7 The rise of the cyber threat..13 The
Assessing the strength of your security operating model
www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number
Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.
Cyber Security :: Insights & Recommendations for Secure Operations N-Dimension Solutions, Inc. Cyber Security Protection for Critical Infrastructure Assets Agenda: Cyber Landscape Cyber Threats to Your
Symantec Client Management Suite 8.0
IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,
ARC VIEW. Services Oriented Drives Support Critical Energy Management and Asset Management Applications through IT/OT Convergence. Keywords.
ARC VIEW OCTOBER 17, 2013 Services Oriented Drives Support Critical Energy Management and Asset Management Applications through IT/OT Convergence By Craig Resnick Keywords Information Technology, Services,
IoT-03-2017 R&I on IoT integration and platforms INTERNET OF THINGS FOCUS AREA
HORIZON 2020 WP 2016-17 IoT-03-2017 R&I on IoT integration and platforms INTERNET OF THINGS DG CONNECT European Commission Internet of Things As enabler of a future hyper-connected society, the Internet
SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business
SECURE YOUR BUSINESS WHEREVER IT TAKES YOU Protection Service for Business IT S A MOBILE WORLD Wifi Today, we use more devices over more connections than ever before. Choosing when, where and how to work
Advanced Automation, Cloud Computing, and Recipe Management for Improving Batch Manufacturing Operations
Advanced Automation, Cloud Computing, and Recipe Management for Improving Batch Manufacturing Operations Craig Resnick Vice President ARC Advisory Group [email protected] Batch Manufacturing Industries
Evolving from SCADA to IoT
Evolving from SCADA to IoT Evolving from SCADA to IoT Let s define Semantics IoT Objectives, chapters 1 and 2 Separating the hype from the reality Why IoT isn t easy An IoT roadmap & framework IoT vs.
The Internet of Things (IoT) Opportunities and Risks
Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance
Introduction to Cybersecurity Overview. October 2014
Introduction to Cybersecurity Overview October 2014 Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities,
Security Coordination with IF-MAP
Security Coordination with IF-MAP Matt Webster, Lumeta 28 Sept 2010 Copyright 2010 Trusted Computing Group Agenda Threat Landscape and Federal Networks Recap of TNC Explanation of IF-MAP What is IF-MAP?
The Internet of Things and I4.0 is an Evolution. New Markets (e.g. maintenance hub operator) Data Driven. Services. (e.g. predictive.
Industrie 4.0 and Internet of Things July 9, 2015 The Internet of Things and I4.0 is an Evolution Business Impact 40-50% CAGR for M2M market until 2020* IoT Space Data Driven Services (e.g. predictive
Cybersecurity Strategic Consulting
Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with
Creating business outcomes for Building Operators with the Internet of Things
Creating business outcomes for Building Operators with the Internet of Things Vertical case studies from Dubai Siemens Building Technologies IoT World Forum 2015, Dubai siemens.com Siemens Digitalization
Security as Architecture A fine grained multi-tiered containment strategy
1 Security as Architecture A fine grained multi-tiered containment strategy Andras R. Szakal IBM Distinguished Engineer Chief Software Architect, U.S. Federal SWG [email protected] 2 Objectives Cybersecurity
Smarter Infrastructure for a Smarter World
Smarter Infrastructure for a Smarter World Sam Fuller, Head of System Solutions, Digital Networking Geoff Waters, Senior Principal Engineer, Digital Networking The data networking infrastructure that connects
Now and Tomorrow. IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor
Now and Tomorrow IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor Hacktivism Regulatory/Compliance (local and international) Sophisticated Malware Data leakage Cybercriminal syndicates
NNIT Cybersecurity. A new threat landscape requires a new approach
NNIT Cybersecurity A new threat landscape requires a new approach Effective cybersecurity is not about spending more money. It s about aligning your security initiatives with the threats and priorities
IoT in Logistics. An assessment of today s and tomorrows opportunities
IoT in Logistics An assessment of today s and tomorrows opportunities DB Mobility Logistics AG Dr. Armin Günter Research and Innovation DB Schenker 03.03.2016 Logistics 4.0 will address strategic perspective,
Securing the Growth of IoT and M2M
Securing the Growth of IoT and M2M Svetlana Grant, Director, Future IoT Networks Connected Living Programme, GSMA 9 September 2015 Connected Living - Mobilising the Internet of Things GSMA VISION 2020
THE FUTURE OF SMART GRID COMMUNICATIONS
THE FUTURE OF SMART GRID COMMUNICATIONS KENNETH C. BUDKA CTO STRATEGIC INDUSTRIES MAY 2014 THE GRID OF THE FUTURE WIDE-SCALE DEPLOYMENT OF RENEWABLES INCREASED ENERGY EFFICIENCY PEAK POWER REDUCTION, DEMAND
Symantec Enterprise Security: Strategy and Roadmap Galin Grozev
Symantec Enterprise Security: Strategy and Roadmap Galin Grozev Senior Technology Consultant Symantec Bulgaria Enterprise Threat Landscape Attackers Moving Faster Digital extortion on the rise Malware
Un unica piattaforma per innovare il proprio business connettendo tutti i dispositivi M2M/IoT alle applicazioni aziendali. Tiziano Modotti EUROTECH
Un unica piattaforma per innovare il proprio business connettendo tutti i dispositivi M2M/IoT alle applicazioni aziendali. Tiziano Modotti EUROTECH Agenda IoT Business impact IT and OT fusion IOT as an
How To Understand And Understand Cyber Security
Special Sessions on Cybersecurity Research for Critical Infrastructure Thursday, February 12, 2015 In Oceans 12 Session 1, 8:30 10:00, Oceans 12 Michael Siegel Principal Research Scientist, and Associate
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems
Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex
KSÖ-SICHERHEITSKONGRESS 2015
KSÖ-SICHERHEITSKONGRESS 2015 Wachstum durch digitale Standortsicherung. Chancen und Herausforderungen auf dem Weg zu einem cyber-sicheren Österreich. Adapting IT Security to Digital Business Jeremy D'Hoinne
Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk
Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Cyber Security Risk With Today s Cyber Threats, How Secure is Your Control System? Today, industrial organizations are faced
Cybersecurity Implications in the US Chemical Industry. Modernization and Greenfield Opportunities
Cybersecurity Implications in the US Chemical Industry Modernization and Greenfield Opportunities April 2015 Contents Section Slide Number Executive Summary 3 Research Scope, Objectives, Methodology, and
July 2016 Price List
Data Acquisition and Visualization Solutions July 2016 Price List Software Custom Development Screen Design Training Beyond SCADA CONNECTING SENSORS, SYSTEMS, DEVICES AND DATABASES WITH THE PEOPLE WHO
Cyber Security for Advanced Manufacturing Next Steps
Status Update Cyber Security for Advanced Manufacturing Next Steps NDIA Manufacturing Division February 19, 2015 Michael McGrath Consultant, Analytic Services Inc. [email protected] NDIA White
NIST Cybersecurity Initiatives. ARC World Industry Forum 2014
NIST Cybersecurity Initiatives Keith Stouffer and Vicky Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL National Institute of Standards and Technology (NIST) NIST s mission
T r a n s f o r m i ng Manufacturing w ith the I n t e r n e t o f Things
M A R K E T S P O T L I G H T T r a n s f o r m i ng Manufacturing w ith the I n t e r n e t o f Things May 2015 Adapted from Perspective: The Internet of Things Gains Momentum in Manufacturing in 2015,
The Internet of Things... Hype or not?
The Internet of Things... Hype or not? Filip De Maeyer Philip Leenders 2013 global revenues of USD 5.8 billion Client-centric, services-focused business 73% of Global Fortune 100 and 59% of Global Fortune
Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya [email protected]
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya [email protected] Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
Some Thoughts on the Future of Cyber-security
Some Thoughts on the Future of Cyber-security Mike Thomas Information Assurance Directorate National Security Agency NSI IMPACT April 2015 1 Introduction, or Why are we here? National security missions
El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada
El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada The Traditional Approach is Changing. Security is no longer controlled and enforced through the
Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends
Frost & Sullivan s Aerospace, Defence & Security Practice Global Industrial Cyber Security Trends Presented by Philipp Reuter Director Frost & Sullivan, Turkey 1 Worth over $ 50 Billion globally in 2014
Digital Business Services Topic Area Theaters May 17-19, 2016 Orlando, FL
Digital Topic Area Theaters May 17-19, 2016 Orlando, FL Session ID Title Abstract Time and Location DB34027 Exploit Business Benefit Cases to Accelerate and Improve Processes DB34011* DB34008 DB34051*
Horizontal IoT Application Development using Semantic Web Technologies
Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: [email protected] Roadmap Introduction Challenges
How To Understand The Power Of The Internet Of Things
Next Internet Evolution: Getting Big Data insights from the Internet of Things Internet of things are fast becoming broadly accepted in the world of computing and they should be. Advances in Cloud computing,
2011 Cyber Security and the Advanced Persistent Threat A Holistic View
2011 Cyber and the Advanced Persistent Threat A Holistic View Thomas Varney Cybersecurity & Privacy BM Global Business Services 1 31/10/11 Agenda The Threat We Face A View to Addressing the Four Big Problem
Oil and Gas Digital and Technology Trends Survey. Copyright 2015 Accenture. All Rights Reserved. 2015 Microsoft Corporation. All rights reserved.
Oil and Gas Digital and Technology Trends Survey Copyright 2015 Accenture. All Rights Reserved. 2015 Microsoft Corporation. All rights reserved. Methodology Fourth Oil and Gas Digital and Technology Trends
Mobility Solutions for Plant Personnel
Mobility Solutions for Plant Personnel ARC Forum Orlando, February 2014 Greg Gorbach Vice President ARC Advisory Group [email protected] Introduction Mobile Devices play a key role in industrial operations
The Internet of Things:
The Internet of Things: What Does it Take to Make the Internet of Everything Real? Kip Compton, VP Internet of Things (IoT) Systems and Software Group @kipcompton www.linkedin.com/in/kipcompton/en Are
Leading The World Into Connected Security. Paolo Florian Sales Engineer
Leading The World Into Connected Security Paolo Florian Sales Engineer History of Defining Largest Dedicated Delivering a Next Generation Architecture Security Provider Security Architecture Inventor of
CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS
CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS Didier Mora System Engineer Cisco Mayo, 2015 Converging Digital Disruptions The Nexus of Forces The 3rd Platform The Industrial Internet IoT = $1.9
Internet of Things Michael Björkman, Technical Director, Marketing, Vacon Plc
Internet of Things Michael Björkman, Technical Director, Marketing, Vacon Plc Internet of Things, Meeting in Carnegie 12 March 2014 Internet of things In the twenty years of Vacon s existence electronics
BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective
BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective Kit Colbert CTO, End-User Computing 2014 VMware Inc. All rights reserved. VMware: Addressing the Market From Data Center
Leveraging the Industrial Internet of Things (IOT) to Optimize Renewable Energy
Leveraging the Industrial Internet of Things (IOT) to Optimize Renewable Energy Creating More Efficient and Connected Wind Turbines By: Brian Roth, Product Marketing Engineer February 1, 2016 Leveraging
Internet of Things (IoT): A vision, architectural elements, and future directions
SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: [email protected] Table of contents Open challenges
Next Generation Security Strategies. Marc Sarrias Regional Sales Manager [email protected]
Next Generation Security Strategies Marc Sarrias Regional Sales Manager [email protected] IT Ever-Evolving Challenges & Constraints Support IT Initiatives Minimize Business Risks from Cybersecurity
Smart Cities Canada Building a 21 st Century Smart Economy
Smart Cities Canada Building a 21 st Century Smart Economy Bill Bryans EFC VP, Technical Services Electrical Halifax, NS June 1, 2016 Agenda Building 21st Century Smart Economy Global Smart City Projects
Historians and Production Management as Cloud Applications
Historians and Production Management as Cloud Applications Harry Forbes Senior Analyst ARC Advisory Group [email protected] Emerging Technologies Enable Information- Driven Manufacturing Big Data Analytics
Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led
Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led About this Course Get expert instruction and hands-on practice configuring and managing
SCADA Security Training
SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,
Industrie 4.0. Towards a Holistic Approach for Cyber Safety and Security
Industrie 4.0 Towards a Holistic Approach for Cyber Safety and Security Prof. Dr.-Ing. Reiner Anderl Marco Grimm, M.Sc. Datenverarbeitung in der Konstruktion (DiK) Fachbereich Maschinenbau Technische Universität
INDUSTRY BUSINESS. Clemens Blum, EVP Industry. February 19, 2015
INDUSTRY BUSINESS Clemens Blum, EVP Industry February 19, 2015 1 Disclaimer All forward-looking statements are Schneider Electric management s present expectations of future events and are subject to a
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
Reducing Configuration Complexity with Next Gen IoT Networks
Reducing Configuration Complexity with Next Gen IoT Networks Orama Inc. November, 2015 1 Network Lighting Controls Low Penetration - Why? Commissioning is very time-consuming & expensive Network configuration
How the Internet of Things Will Transform the Manufacturing Industry
How the Internet of Things Will Transform the Manufacturing Industry Dinesh Malkani President, Cisco India & SAARC February 26, 2015 By 2018, Video will be 62% of India's mobile data traffic India Is Ready
Introduction to Runtime Application Self Protection (RASP) Making Applications Self Protecting, Self Diagnosing and Self Testing
Introduction to Runtime Application Self Protection (RASP) Making Applications Self Protecting, Self Diagnosing and Self Testing The cyber security landscape has become increasingly complex in recent years.
Innovative Security for an Accelerating World New Approaches for Chief Security Officers
Information Systems Security Association Innovative Security for an Accelerating World New Approaches for Chief Security Officers John N. Stewart Senior Vice President Chief Security and Trust Officer
Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd
Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd Symantec Endpoint Protection Product Roadmap 1 Safe Harbor Disclaimer Any information regarding pre-release Symantec offerings,
The Internet of Things (IoT) and Industrial Networks. Guy Denis [email protected] Rockwell Automation Alliance Manager Europe 2015
The Internet of Things (IoT) and Industrial Networks Guy Denis [email protected] Rockwell Automation Alliance Manager Europe 2015 Increasingly Everything will be interconnected 50 Billion Smart Objects
Arrowhead - Smart integrated production management
1 Arrowhead - Smart integrated production management Programvara för konkurrenskraft II - Innovativ mjukvara satt i system Arrowhead Process and energy system automation 4 years project 68 M 79 partners
Management of Security Information and Events in Future Internet
Management of Security Information and Events in Future Internet Who? Andrew Hutchison 1 Roland Rieke 2 From? 1 T-Systems South Africa 2 Fraunhofer Institute for Secure Information Technology SIT When?
