Vision & Positioning Statement For Wurldtech Labs



Similar documents
Best Practices in ICS Security for System Operators. A Wurldtech White Paper

ARC INDUSTRY FORUM 2015

ACHILLES CERTIFICATION. SIS Module SLS 1508

Cybersecurity in a Mobile IP World

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

ISA Security. Compliance Institute. Role of Product Certification in an Overall Cyber Security Strategy

Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, 2014 Utilities Telecom Council

World-Renouned Services

The Art of Architecture Transformation. Copyright 2012, Oracle and/or its affiliates. All rights reserved.

NERC CIP VERSION 5 COMPLIANCE

Leveraging CMMI framework for Engineering Services

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, CASE: Implementation of Cyber Security for Yara Glomfjord

Semiconductor Equipment Security: Virus and Intellectual Property Protection Guidelines Harvey Wohlwend harvey.wohlwend ismi.sematech.

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

Enhancing Business Performance Through Innovative Technology Solutions

Global Industrial Cyber Security Professional GICSP

Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking

Accenture Technology Consulting. Clearing the Path for Business Growth

Enterprise Cybersecurity: Building an Effective Defense

Mobile and BYOD Strategy

Setting up an Effective Enterprise Architecture capability. Simon Townson Principal Enterprise Architect SAP

Network Test Labs (NTL) Software Testing Services for igaming

Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security

G-Cloud Service Definition. Atos SI Oracle CRM and CX Services

ISA-99 Industrial Automation & Control Systems Security

Emerson s Smart Wireless and WIB Requirements

ISA Security Compliance Institute ISASecure IACS Certification Programs

EDSA-300. ISA Security Compliance Institute Embedded Device Security Assurance ISASecure certification requirements

National Cyber Security Policy -2013

Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities

Agio Remote Monitoring and Management

PROCUREMENT OUTSOURCING: The 10 Things Companies Really Want to Know

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR

Retail. White Paper. Driving Strategic Sourcing Effectively with Supply Market Intelligence

1 ISA Security Compliance Institute

Secure Networks for Process Control

Cyber Security and Privacy - Program 183

GSA Services Catalog

Automating the IT Operations to Business Connection

Ernie Hayden CISSP CEH GICSP Executive Consultant

Rethinking Cyber Security for Industrial Control Systems (ICS)

On Premise Vs Cloud: Selection Approach & Implementation Strategies

RESEARCH CALL TO DOE/FEDERAL LABORATORIES. Cybersecurity for Energy Delivery Systems Research Call RC-CEDS

Click to edit Master title style

future data and infrastructure

IT Security & Compliance. On Time. On Budget. On Demand.

Need to reassure customers that your cloud services are secure? Inspire confidence with STAR Certification from BSI

Building Reliable, Scalable AR System Solutions. High-Availability. White Paper

Your asset is your business. The more challenging the economy, the more valuable the asset becomes. Decisions are magnified. Risk is amplified.

locuz.com Professional Services Security Audit Services

Cyber Security focus in ABB: a Key issue. 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division

Workflow Automation Solutions that Work

Medical Devices. Safe, but are they secure? Dan Stoker, Consultant Professional Services, Coalfire

Need to reassure customers that your cloud services are secure? Inspire confidence with STAR Certification from BSI

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

Facilitated Self-Evaluation v1.0

Building Security In:

Douglas County School District. Information Technology. Strategic Plan

Identity and Access. Management Services. HCL Information Security Practice. Terrorist Sabotage. Identity Theft. Credit Card Fraud

ENABLING TODAY S WIRELESS ENTERPRISE

Are you prepared to be next? Invensys Cyber Security

Firewall Administration and Management

TECHNOLOGY SOLUTIONS FOR THE INTERNAL AUDITOR

Implementing the U.S. Cybersecurity Framework at Intel A Case Study

Developing an Architectural Framework towards achieving Cyber Resiliency. Presented by Deepak Singh

UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC)

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

SECURITY. Risk & Compliance Services

Cyber Security for NERC CIP Version 5 Compliance

Contents. Evolving Trends in Core Banking Transformation (CBT) Challenges Faced in Core Banking Transformation (CBT)

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0

NICE and Framework Overview

Technology. Accenture Network Technology Services

Cyber Security Implications of SIS Integration with Control Networks

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Identifying critical success factors for. Enterprise Social Networks (ESNs)

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

Four Keys to Preparing for a PCI DSS 3.0 Assessment

IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY

Enterprise Security Tactical Plan

Managed Exchange TM Service. Dedicated pay-as-you-go Exchange TM 2003 Secure business data through automated backup and restore.

RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW. Version 1, Release July 2015

Defending Against Data Beaches: Internal Controls for Cybersecurity

The purpose of Capacity and Availability Management (CAM) is to plan and monitor the effective provision of resources to support service requirements.

Transcription:

Vision & Positioning Statement For Wurldtech Labs Wurldtech Security Technologies s Industrial Cyber Security Solutions For Global Process Automation & Control System Stakeholders

Presentation Purpose To introduce the Achilles Practices Certification program and provide WIB attendees with a clear understanding of the program s purpose and structure as well as the benefits and business case for global process automation and control stakeholders. Agenda 1. Section 1 Background & Catalyst 2. Section 2 The Achilles Practices Certification Program 3. Section 3 The Path To Success

The Landscape Until Now Too Much FUD, Not Enough Facts No Common Language Or Communications Framework Asymmetric Stakeholder Efforts Workinggroupitis No Data, No Business Case, No Budget, No Improvement Lack Of Economics & Incentives Product Pitches Instead Of Process Solutions Led To.

Consultants Vendors End-Users Wurldtech

Common Cyber Security Benchmarks Achilles Certified Industrial Devices, Systems & Applications Achilles Certified Cyber Security Best Practices Achilles Certified Industrial Automation Professionals

Before Product Certification Device Test Case Monitors Impacted Recovery Time Rank SIS PLC Arp Cache Saturation Storm Discrete, ICMP Requires Restart PLoV + PLoC

After Product Certification

Section 2: Practices Certification 1. Program Purpose & Success Criteria 2. The Model & Framework 3. The Business Case & Benefits 4. Status Update 5. The Roadmap

Certification Program Evolution To Date Phase 1 Finalize Shell DEP Requirements - Stakeholder Input & Revisions Phase 2 Make Requirements Generic For Wide Adoption - Vendor Agnostic - International Standards Alignment Phase 3 Create A Certification Program Framework - Simple, Scalable, Repeatable & Cost Effective - Maturity Model & Standards Alignment Phase 4 Pilot The Program & Launch

The Benchmark

The Reference Model The SSE-CMM has two dimensions, domain and capability. The domain dimension simply consists of all the practices that collectively define security engineering. These practices are called base practices. The capability dimension represents practices that indicate process management and institutionalization capability. These practices are called generic practices as they apply across a wide range of domains. The generic practices represent activities that should be performed as part of doing a base practice.

The Framework Wurldtech has tailored twenty three (23) Process Areas to be used by Vendors applicants. These PAs are organized into three logical categories: (1) Organization Process Level, (2) Product Process Area, and (3) Commissioning & Maintenance Process Area. Table 1 describes the Process Area within each category.

The Requirements

The Requirements

The Requirements

The Evidence The questionnaires are administered to collect the evidence needed for assessment. All questionnaires include the information shown in Table 1. When the questionnaire is administered, the respondent answers the question with a simple YES, NO, Don t Know by checking the appropriate box. If the answer is YES, the respondent cites the evidence by referring to a document ID.

The Process

The Result Bronze certification is awarded for successful completion of all applicable and approved Base Practices for Level 1 maturity. Silver certification is awarded for successful completion of all applicable and approved Base Practices for Level 1 maturity and those Base Practices applicable to Level 2 maturity. Gold certification is awarded for successful completion of all applicable and approved Base Practices for Level 1 maturity, those applicable to Level 2 maturity, and those applicable to Levels 3, 4 and 5 maturities.

Process Areas PA01 - Set The Stage PA02 Designate A Security Contact PA03 Get Certified PA04 Harden The System PA05 Protect From Malicious Code PA06 Implement Patch Management PA07 Secure Account Management PA08 Support Backup/Restore PA09 Increase Network Visibility PA10 Standardize On Historians PA11 Control Set Points PA12 Connect Wirelessly PA13 Fortify IPS Connectivity PA14 Provide Remote Access PA15 Set The Stage PA16 Manage The Deployment PA17 Harden The System PA18 Protect From Malicious Code PA19 Implement Patch Management PA20 Secure Account Management PA21 Support Backup/Restore PA22 Implement The Architecture PA23 Connect Wirelessly PA24 Provide Remote Access WIB 2010 Cyber Security Seminar Presentation The Result Level 5 Level 4 Level 3 Level 2 Level 1 Capability Levels Security Engineering Process Areas Commissioning & Maintenance Process Areas

The Status Pilot Program Five Global Suppliers Certified April 2010 Finalize Practices Certification & Go To Market

Section 3: The Path To Success

Wurldtech 1. Leverage Our Reputation To Drive Support 2. Increase Industry Stewardship 3. Lay The Foundation

Suppliers 1. Be Proactive & Get Involved 1. Use Security As A Differentiator 1. Align Internal Stakeholders

End Users 1. Stand On The Shoulders Of Giants 2. Mandate Conformance 3. Get Involved

Governments 1. Facilitate Information Sharing 1. Create Incentive Programs 2. Build The Business Case 1. Limit Involvement

Let s Recap The Final Requirements Were Created, Reviewed & Revised By Industry Stakeholders From Different Sectors & Regions The Certification Program Structure Is Simple, Scalable, Functional & Cost Effective The Program Model Follows International Certification Guidelines & Aligns With Current & Emerging Cyber Security Standards (NIST, ISA SP99) The Program Integrates A Internationally Recognized Maturity Concept To Enable Industry/Segment/Vendor Analysis

Questions?

Vision & Positioning Statement For Wurldtech Labs Wurldtech Security Technologies Suite 1680 401 West Georgia Street Vancouver BC Canada V6B 5A1 T 604 669 6674 F 604 669 2902 info@wurldtech.com Wurldtech Labs The Global Center Of Excellence For Securing Digital Energy Infrastructure Into The 21 st Century Perry A. Pederson, VP Wurldtech Labs Manager Of Centre Of Excellence Initiative * Strictly Confidential Must Not Be Distributed