ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things

Similar documents
A Modern Process Automation System Offers More than Process Control. Dick Hill Vice President ARC Advisory Group

Industrial Roadmap for Connected Machines. Sal Spada Research Director ARC Advisory Group

WORKSHOP Rethinking Cyber Security for Industrial Control Systems

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk

Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions

Rethinking Cyber Security for Industrial Control Systems (ICS)

A Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University

Industrial Internet of Things Bears Fruit with Connected Services for Plant Assets and Fleet Migration

Enterprise Application Enablement for the Internet of Things

Connected Manufacturing

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

ARC VIEW. OSIsoft-SAP Partnership Deepens SAP s Predictive Analytics at the Plant Floor. Keywords. Summary. By Peter Reynolds

ARC INDUSTRY FORUM 2015

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

District Energy and the Industrial IoT Benefits of a Connected System

How To Be Prepared For A Cybercrime

Assessing the strength of your security operating model

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.

Symantec Client Management Suite 8.0

ARC VIEW. Services Oriented Drives Support Critical Energy Management and Asset Management Applications through IT/OT Convergence. Keywords.

IoT R&I on IoT integration and platforms INTERNET OF THINGS FOCUS AREA

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business

Advanced Automation, Cloud Computing, and Recipe Management for Improving Batch Manufacturing Operations

Evolving from SCADA to IoT

The Internet of Things (IoT) Opportunities and Risks

Introduction to Cybersecurity Overview. October 2014

Security Coordination with IF-MAP

The Internet of Things and I4.0 is an Evolution. New Markets (e.g. maintenance hub operator) Data Driven. Services. (e.g. predictive.

Cybersecurity Strategic Consulting

Creating business outcomes for Building Operators with the Internet of Things

Security as Architecture A fine grained multi-tiered containment strategy

Smarter Infrastructure for a Smarter World

Now and Tomorrow. IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor

NNIT Cybersecurity. A new threat landscape requires a new approach

IoT in Logistics. An assessment of today s and tomorrows opportunities

Securing the Growth of IoT and M2M

THE FUTURE OF SMART GRID COMMUNICATIONS

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Un unica piattaforma per innovare il proprio business connettendo tutti i dispositivi M2M/IoT alle applicazioni aziendali. Tiziano Modotti EUROTECH

How To Understand And Understand Cyber Security

What is Really Needed to Secure the Internet of Things?

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

KSÖ-SICHERHEITSKONGRESS 2015

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk

Cybersecurity Implications in the US Chemical Industry. Modernization and Greenfield Opportunities

July 2016 Price List

Cyber Security for Advanced Manufacturing Next Steps

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014

T r a n s f o r m i ng Manufacturing w ith the I n t e r n e t o f Things

The Internet of Things... Hype or not?

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya

Some Thoughts on the Future of Cyber-security

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

Digital Business Services Topic Area Theaters May 17-19, 2016 Orlando, FL

Horizontal IoT Application Development using Semantic Web Technologies

How To Understand The Power Of The Internet Of Things

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

Oil and Gas Digital and Technology Trends Survey. Copyright 2015 Accenture. All Rights Reserved Microsoft Corporation. All rights reserved.

Mobility Solutions for Plant Personnel

The Internet of Things:

Leading The World Into Connected Security. Paolo Florian Sales Engineer

CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS

Internet of Things Michael Björkman, Technical Director, Marketing, Vacon Plc

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

Leveraging the Industrial Internet of Things (IOT) to Optimize Renewable Energy

Internet of Things (IoT): A vision, architectural elements, and future directions

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Smart Cities Canada Building a 21 st Century Smart Economy

Historians and Production Management as Cloud Applications

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led

SCADA Security Training

Industrie 4.0. Towards a Holistic Approach for Cyber Safety and Security

INDUSTRY BUSINESS. Clemens Blum, EVP Industry. February 19, 2015

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Reducing Configuration Complexity with Next Gen IoT Networks

How the Internet of Things Will Transform the Manufacturing Industry

Introduction to Runtime Application Self Protection (RASP) Making Applications Self Protecting, Self Diagnosing and Self Testing

Innovative Security for an Accelerating World New Approaches for Chief Security Officers

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

The Internet of Things (IoT) and Industrial Networks. Guy Denis Rockwell Automation Alliance Manager Europe 2015

Arrowhead - Smart integrated production management

Management of Security Information and Events in Future Internet

Transcription:

ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things Sid Snitkin Vice-President & GM Enterprise Advisory Services ARC Advisory Group srsnitkin@arcweb.com

Session Overview ARC Presentation of the Issues What s the Industrial Internet of Things? What are the Implications for ICS? What are the Implications for ICS Cyber Security? What s Needed to Secure Industry s Future? Cyber Security Expert Panel Discussion 2

What is the Industrial Internet of Things Remote Asset Management/Support Perspective XYZ Company XYZ Company XYZ Company XYZ Company Maintenance Engineering Purchasing Corporate Machine Mfr. Service Provider Enterprise New IoT Analytics and Applications Private Cloud Business Systems Private Cloud Share Asset Data with 3 rd Parties Secure Connection Monitor in-service Products Secure Network XYZ Company Smart Machine IoT Smart Module Local IoT Compute and Communicate module Physical asset with sensors, actuators Plant Operations Emerging Option: Connect Big Assets Using New Technologies 3

What is the Industrial Internet of Things Broad Connected Enterprise Perspective Most Industrial IoT Building Blocks are Already in Place 4

What is the Industrial Internet of Things The Enabling Technologies Smart, Autonomous Devices Smart Sensors Sending Asset Health/Performance to Remote Sites Intelligent Assets with Embedded Control & Communications Mobility & Ubiquitous Connectivity Use of Wireless Technologies and Mobile Devices Within Plants External Access to Plant Systems and Data Cloud Computing Use of the Cloud for Storing/Sharing of Operational Data Use of Cloud-Applications for Control & Process Improvements Cost and Performance Benefits Will Force Organizations to Exploit All of These Technology Developments! 5

What s the Implications for ICS? Today s ICS Landscape 6

What s the Implications for ICS? Tomorrow s ICS Landscape Oil & Gas Example Suppliers & Service Providers Enterprise Systems Smart Consumer Devices Cloud Applications Cloud Services ---------------------- Ubiquitous Connectivity Remote Smart Assets Mobile Devices Remote Operations Plants, Factories In-Plant Smart Assets 7

IIoT Implications for ICS Cybersecurity? A More Challenging Security Environment Technology Developments Smart Autonomous Devices Mobility and Ubiquitous Connectivity Cloud Computing New Control System Architectures More Integration with External Systems More Dynamic, Distributed Architectures More Reliance on External Services New ICS Cyber Security Challenges Exponential Increase in Attack Surface Increased Likelihood of Attacks Loss of Direct Control of Security Risk 8

What s the Implications for ICS Cybersecurity? New Challenges Require New Strategies Mission Scope People Processes Technology Today s Industrial Cyber Security Includes Protect Plants & Infrastructure AIC Systems Private Networks Internal ICS Groups ICS Supplier Service Groups Manage Security at Perimeter Secure Networks Secure Zones Authorize People Manage Software Vulnerabilities Endpoint Security Wrappers Network Firewalls Future Industrial Cyber Security Requires Protect Plants, Infra., External Resources AIC and CIA Systems, IIoT & Mobile Devices, Cloud Private & Public Networks Internal ICS & IT Groups ICS & IIoT Supplier Service Groups Public Networking Services Partners Cloud App & Data Services Partners Manage Security at Device Secure Networks and Messages Secure Zones, Devices, Messages, Data Authorize People & Devices Manage Software & Device Vulnerabilities Secure-by-Design Endpoint Devices Network and Device Firewalls The Future Requires Changes in Every Strategy Element! 9

What s the Implications for ICS Cybersecurity? An Expanded Cyber Security Landscape Systems Today s Scope Industrial Control Systems Enterprise Systems OT Cloud & Ubiquitous Connectivity IT Intelligent Assets Mobile Devices Devices 10

What s the Implications for ICS Cybersecurity? From ICS to Integrated Industrial Cyber Security ICS Cyber Security 11

Issues for the Panel Discussion What s your view of IIoT and its impact on industrial cyber security? What s needed for Secure-by-Design Devices? Who decides/verifies this? How should this status be sustained? What s needed for secure IIoT communications (from the device through the networks)? Who should be responsible for this? How do we ensure that security is being addressed and sustained? Are suppliers doing enough to address these emerging cyber security challenges? If not, what do they need to do differently? 12

Thank You. For more information, contact the author at srsnitkin@arcweb.com or visit our web pages at www.arcweb.com 13