Cybersecurity Implications in the US Chemical Industry. Modernization and Greenfield Opportunities



Similar documents
Logging In: Auditing Cybersecurity in an Unsecure World

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

NATIONAL CYBER SECURITY AWARENESS MONTH

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

Security Controls What Works. Southside Virginia Community College: Security Awareness

Microsoft s cybersecurity commitment

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Four Top Emagined Security Services

Suzanne B. Schwartz, MD, MBA Director Emergency Preparedness/Operations & Medical Countermeasures (EMCM Program) CDRH/FDA

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

State of Security Survey GLOBAL FINDINGS

ICS CYBER SECURITY RKNEAL, INC. Protecting Industrial Control Systems: An Integrated Approach. Critical Infrastructure Protection

Jort Kollerie SonicWALL

Preemptive security solutions for healthcare

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

OCIE CYBERSECURITY INITIATIVE

Cybersecurity and Privacy Hot Topics 2015

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

The Value of Vulnerability Management*

Cybersecurity and internal audit. August 15, 2014

Validating Enterprise Systems: A Practical Guide

FINRA Publishes its 2015 Report on Cybersecurity Practices

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

How To Protect Yourself From A Hacker Attack

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

White Paper. Architecting the security of the next-generation data center. why security needs to be a key component early in the design phase

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Are you prepared to be next? Invensys Cyber Security

Cloud Security Trust Cisco to Protect Your Data

Top five strategies for combating modern threats Is anti-virus dead?

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Considerations for Hybrid Communications Network Technology for Pipeline Monitoring

The Benefits of an Integrated Approach to Security in the Cloud

N-Dimension Solutions Cyber Security for Utilities

Managed Security Services for Data

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Defending against modern threats Kruger National Park ICCWS 2015

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

NNIT Cybersecurity. A new threat landscape requires a new approach

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Cyber Risk to Help Shape Industry Trends in 2014

Accelerate Your Enterprise Private Cloud Initiative

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

Big Data, Big Risk, Big Rewards. Hussein Syed

Verve Security Center

PCI Solution for Retail: Addressing Compliance and Security Best Practices

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

Cyber security tackling the risks with new solutions and co-operation Miikka Pönniö

Qualification Specification. Level 4 Certificate in Cyber Security and Intrusion For Business

National Cyber Security Policy -2013

What Data? I m A Trucking Company!

1851 (d) RULE OF CONSTRUCTION. Nothing in this section shall be construed to (1) require a State to report data under subsection

Guideline on Auditing and Log Management

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Why you should adopt the NIST Cybersecurity Framework

Local Patch Management Update Service

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s

Cybersecurity Issues for Community Banks

Middle Class Economics: Cybersecurity Updated August 7, 2015

Guideline on Vulnerability and Patch Management

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Third Annual Study: Is Your Company Ready for a Big Data Breach?

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

HP Security Solutions for Microsoft

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

Transcription:

Cybersecurity Implications in the US Chemical Industry Modernization and Greenfield Opportunities April 2015

Contents Section Slide Number Executive Summary 3 Research Scope, Objectives, Methodology, and Background 6 Definitions and Segmentation 13 Market Overview 17 Mega Trends and Industry Convergence Implications 22 Technology Analysis 29 Chemical Manufacturing and Processing Segment Analysis 35 Chemical Storage and Transportation Segments Analysis 40 Region Analysis The United States 45 Conclusions and Future Outlook Cybersecurity in the Chemical Industry 49 Appendix 53 2

Key Findings Cybersecurity in the Chemical Industry: Key Takeaways, US, 2014 1 Although the overall cybersecurity has improved in the US chemical industry, approximately two out of three attacks are not discovered internally, but are reported by an external agency. 2 The annual budget spent on cybersecurity for smaller companies ranges from to %, while the budget spent on larger companies ranges from to %. 3 Regulatory compliance with government agencies is crucial and chemical companies take penalties seriously because of potential government investigations and fines. 4 In order to combat cyber attacks, it is necessary to ensure the privacy of company data and cybersecurity information sharing within the industry, as well as provide clarity and compliance about regulations. 4

Key Findings and Future Outlook Cybersecurity in the Chemical Industry: Current and Future Outlook, US, 2014 and 2017 Parameters Current Outlook (2014) Future Outlook (2017) Market Status Although cybersecurity has improved, the security needs of small and medium-sized companies will have to be dealt with. Chemical factories of the future will be designed on standardized and modular platforms, requiring specialized and focused security solutions. Competition Solutions Customers focus on vendors with significant expertise and knowledge in the cybersecurity space that can also offer cost-effective solutions. Vendor strategies are more focused on risk assessments, audits, and evidence management. Implementation is taking a siloed approach; however, a more standardized and central approach will be required. Vendor strategies in the future will have to incorporate useful intelligence reporting, perimeter and intrusion management, protection management, and regulatory-change management solutions. Solutions will have to develop and follow Standard Operating Procedures (SOP) for routine functions such as backups, antivirus, user management, remote system access, removable media use, and access policy. Vendors will have to certify compliance with cybersecurity standards and include the tests as part of their Factory Acceptance Testing (FAT). Technology Value Proposition Market Entry Barriers Security intelligence, hot patching, intellectual property protection, penetration testing, and device control systems are frequently used technologies. The industry is slowly moving from a reactive approach to a proactive approach. Operational safety and information confidentiality are key factors driving cybersecurity investments. However, there is still an imbalance between the world of Information Technology (IT) and Operation Technology (OT). The complexity of regulations and lack of sufficient industry resources restricts the development of more proactive solutions. Adoption of intelligent devices will require focus on awareness and training to aid in the implementation, effective management, and prioritization of cybersecurity solutions. Virtualizing assets and placing them in isolated networks may also become a possibility. Operating systems will need to evolve to the point where they do not operate in silos. The industry will move towards a lifecycle model to manage control systems and safety systems. IT and OT will need to improve communication and awareness of the different requirements for each platform. The limited cybersecurity-focused workforce hampers implementation improvements and management of advanced defence solutions making it difficult for end users to continuously develop their security solutions. 5

Research Scope Base Year 2014 Industry Focus Chemicals Geographical Scope The United States Study Period 2014 2017 7

Research Aims and Objectives Aim The aim of this study is to research and analyze various parameters, such as industry drivers, challenges, customer behavior, vendor support, and best practices that influence the cybersecurity market in the chemical industry. Objectives To evaluate and assess the current state of cybersecurity preparedness To determine the unmet needs and pain points related to cybersecurity To understand buyer behavior To identify industry best-practices, next-generation practices, and new business models 8

Key Questions This Study Will Answer Cybersecurity in the Chemical Industry: Key Questions This Study Will Answer, US, 2014 What is the current state of awareness and concern regarding the issue of cybersecurity in the US chemical industry? What are some critical challenges regarding cybersecurity awareness and adoption that are facing the industry; how are these challenges being addressed? How can vendors optimize their support role in executing a cybersecurity strategy? What are the new business models emerging from the evolution of smart chemical plants? What are the best-practices related to cybersecurity within the chemical industry? 9